Bug 2336921 (CVE-2024-57823)

Summary: CVE-2024-57823 raptor: integer underflow when normalizing a URI with the turtle parser
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A security issue was discovered in the Raptor RDF syntax library (librdf). An integer underflow condition may be triggered when normalizing a URI with the turtle parser. This can potentially cause memory corruption or an application crash leading to a denial of service or other undefined behavior.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2337003, 2337001, 2337002    
Bug Blocks:    

Description OSIDB Bzimport 2025-01-10 14:01:09 UTC
In Raptor RDF Syntax Library through 2.0.16, there is an integer underflow when normalizing a URI with the turtle parser in raptor_uri_normalize_path().

Comment 2 errata-xmlrpc 2025-01-14 11:09:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2025:0311 https://access.redhat.com/errata/RHSA-2025:0311

Comment 3 errata-xmlrpc 2025-01-14 11:17:35 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2025:0310 https://access.redhat.com/errata/RHSA-2025:0310

Comment 4 errata-xmlrpc 2025-01-14 15:16:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2025:0315 https://access.redhat.com/errata/RHSA-2025:0315

Comment 5 errata-xmlrpc 2025-01-14 15:20:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions

Via RHSA-2025:0313 https://access.redhat.com/errata/RHSA-2025:0313

Comment 6 errata-xmlrpc 2025-01-14 15:43:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:0316 https://access.redhat.com/errata/RHSA-2025:0316

Comment 7 errata-xmlrpc 2025-01-14 15:44:54 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:0312 https://access.redhat.com/errata/RHSA-2025:0312

Comment 8 errata-xmlrpc 2025-01-14 15:56:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:0314 https://access.redhat.com/errata/RHSA-2025:0314

Comment 9 errata-xmlrpc 2025-01-14 16:06:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extended Lifecycle Support

Via RHSA-2025:0319 https://access.redhat.com/errata/RHSA-2025:0319

Comment 10 errata-xmlrpc 2025-01-14 16:15:14 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2025:0318 https://access.redhat.com/errata/RHSA-2025:0318

Comment 11 errata-xmlrpc 2025-01-15 08:56:23 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2025:0326 https://access.redhat.com/errata/RHSA-2025:0326