{"affected":[{"ecosystem_specific":{"binaries":[{"libraptor-devel":"2.0.15-5.9.1","libraptor2-0":"2.0.15-5.9.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"raptor","purl":"pkg:rpm/suse/raptor&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0.15-5.9.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for raptor fixes the following issues:\n\n- CVE-2024-57823: Fixed integer underflow when normalizing a URI with the turtle parser (bsc#1235673).\n- CVE-2024-57822: Fixed heap buffer overread when parsing triples with the nquads parser (bsc#1235674).\n","id":"SUSE-SU-2025:03257-1","modified":"2025-09-17T19:01:57Z","published":"2025-09-17T19:01:57Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202503257-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235673"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235674"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57822"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57823"}],"related":["CVE-2024-57822","CVE-2024-57823"],"summary":"Security update for raptor","upstream":["CVE-2024-57822","CVE-2024-57823"]}