CVE-2024-57822
Published: January 13, 2025Last modified: June 24, 2025
Description
In Raptor RDF Syntax Library through 2.0.16, there is a heap-based buffer over-read when parsing triples with the nquads parser in raptor_ntriples_parse_term_internal().
Severity score breakdown
Parameter | Value |
---|---|
Base score | 4 |
Attack Vector | LOCAL |
Attack complexity | LOW |
Privileges required | NONE |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | NONE |
Integrity impact | NONE |
Availability impact | LOW |
Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
Notes
There are commits by upstream that implies it fixes CVE-2024-57823( https://github.com/dajobe/raptor/commit/da7a79976bd0314c23cce55d22495e7d29301c44 ) and CVE-2024-57823( https://github.com/dajobe/raptor/commit/ece2c79df43091686a538b8231cf387d84bfa60e ), but the GitHub issue is still open https://github.com/dajobe/raptor/issues/70
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | raptor2 | Vulnerable (2.0.16-r1) |
Stream | raptor2 | Vulnerable (2.0.16-r1) |