First published: Tue Jan 14 2025(Updated: )
Important: raptor2 security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/raptor2 | <2.0.9-5.el7_9 | 2.0.9-5.el7_9 |
redhat/raptor2 | <2.0.9-5.el7_9 | 2.0.9-5.el7_9 |
redhat/raptor2-debuginfo | <2.0.9-5.el7_9 | 2.0.9-5.el7_9 |
redhat/raptor2-debuginfo | <2.0.9-5.el7_9 | 2.0.9-5.el7_9 |
redhat/raptor2-devel | <2.0.9-5.el7_9 | 2.0.9-5.el7_9 |
redhat/raptor2-devel | <2.0.9-5.el7_9 | 2.0.9-5.el7_9 |
redhat/raptor2 | <2.0.9-5.el7_9 | 2.0.9-5.el7_9 |
redhat/raptor2-debuginfo | <2.0.9-5.el7_9 | 2.0.9-5.el7_9 |
redhat/raptor2-devel | <2.0.9-5.el7_9 | 2.0.9-5.el7_9 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian | ||
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) | ||
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) | ||
Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:0319 is classified as Important.
To fix RHSA-2025:0319, update the raptor2 package to version 2.0.9-5.el7_9.
RHSA-2025:0319 addresses an integer underflow vulnerability when normalizing a URI using the turtle parser.
The affected packages include raptor2, raptor2-debuginfo, and raptor2-devel, all requiring an update.
Yes, the recommended version to mitigate RHSA-2025:0319 is 2.0.9-5.el7_9.