{ "document":{ "aggregate_severity":{ "namespace":"https://nvd.nist.gov/vuln-metrics/cvss", "text":"High" }, "category":"csaf_vex", "csaf_version":"2.0", "distribution":{ "tlp":{ "label":"WHITE", "url":"https:/www.first.org/tlp/" } }, "lang":"en", "notes":[ { "text":"rapidjson security update", "category":"general", "title":"Synopsis" }, { "text":"An update for rapidjson is now available for openEuler-24.03-LTS,openEuler-22.03-LTS-SP4,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP3,openEuler-20.03-LTS-SP4", "category":"general", "title":"Summary" }, { "text":"RapidJSON as a fast JSON parser which generator for c++. It`s inspired by RapidXML. It`s supports both SAX & DOM style API. It`s small but complete. It`s fast, It`s preformance can be comparabel to strlen(). It`s self-contained. It doesn`t depend on external libraries such as BOOST. It`s Unicode and memory friendly, each JSON valude occupies exactly 16/20 bytes for most 32/64-bit machines. It`s suport UTF-8 UTF-16 UTF-32 (LE & BE).\n\nSecurity Fix(es):\n\nTencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.(CVE-2024-38517)", "category":"general", "title":"Description" }, { "text":"An update for rapidjson is now available for openEuler-24.03-LTS.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.", "category":"general", "title":"Topic" }, { "text":"High", "category":"general", "title":"Severity" }, { "text":"rapidjson", "category":"general", "title":"Affected Component" } ], "publisher":{ "issuing_authority":"openEuler security committee", "name":"openEuler", "namespace":"https://www.openeuler.org", "contact_details":"openeuler-security@openeuler.org", "category":"vendor" }, "references":[ { "summary":"openEuler-SA-2024-1857", "category":"self", "url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1857" }, { "summary":"CVE-2024-38517", "category":"self", "url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38517&packageName=rapidjson" }, { "summary":"nvd cve", "category":"external", "url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38517" }, { "summary":"openEuler-SA-2024-1857 vex file", "category":"self", "url":"https://repo.openeuler.org/security/data/csaf/advisories/2024/csaf-openEuler-SA-2024-1857.json" } ], "title":"An update for rapidjson is now available for openEuler-24.03-LTS,openEuler-22.03-LTS-SP4,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP3,openEuler-20.03-LTS-SP4", "tracking":{ "initial_release_date":"2024-07-19T21:23:56+08:00", "revision_history":[ { "date":"2024-07-19T21:23:56+08:00", "summary":"Initial", "number":"1.0.0" } ], "generator":{ "date":"2024-07-19T21:23:56+08:00", "engine":{ "name":"openEuler CSAF Tool V1.0" } }, "current_release_date":"2024-07-19T21:23:56+08:00", "id":"openEuler-SA-2024-1857", "version":"1.0.0", "status":"final" } }, "product_tree":{ "branches":[ { "name":"openEuler", "category":"vendor", "branches":[ { "name":"openEuler", "branches":[ { "product":{ "product_identification_helper":{ "cpe":"cpe:/a:openEuler:openEuler:24.03-LTS" }, "product_id":"openEuler-24.03-LTS", "name":"openEuler-24.03-LTS" }, "name":"openEuler-24.03-LTS", "category":"product_version" }, { "product":{ "product_identification_helper":{ "cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4" }, "product_id":"openEuler-22.03-LTS-SP4", "name":"openEuler-22.03-LTS-SP4" }, "name":"openEuler-22.03-LTS-SP4", "category":"product_version" }, { "product":{ "product_identification_helper":{ "cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1" }, "product_id":"openEuler-22.03-LTS-SP1", "name":"openEuler-22.03-LTS-SP1" }, "name":"openEuler-22.03-LTS-SP1", "category":"product_version" }, { "product":{ "product_identification_helper":{ "cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3" }, "product_id":"openEuler-22.03-LTS-SP3", "name":"openEuler-22.03-LTS-SP3" }, "name":"openEuler-22.03-LTS-SP3", "category":"product_version" }, { "product":{ "product_identification_helper":{ "cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4" }, "product_id":"openEuler-20.03-LTS-SP4", "name":"openEuler-20.03-LTS-SP4" }, "name":"openEuler-20.03-LTS-SP4", "category":"product_version" } ], "category":"product_name" }, { "name":"src", "branches":[ { "product":{ "product_identification_helper":{ "cpe":"cpe:/a:openEuler:openEuler:24.03-LTS" }, "product_id":"rapidjson-1.1.0-13.oe2403.src.rpm", "name":"rapidjson-1.1.0-13.oe2403.src.rpm" }, "name":"rapidjson-1.1.0-13.oe2403.src.rpm", "category":"product_version" }, { "product":{ "product_identification_helper":{ "cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4" }, "product_id":"rapidjson-1.1.0-12.oe2203sp4.src.rpm", "name":"rapidjson-1.1.0-12.oe2203sp4.src.rpm" }, "name":"rapidjson-1.1.0-12.oe2203sp4.src.rpm", "category":"product_version" }, { "product":{ "product_identification_helper":{ "cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1" }, "product_id":"rapidjson-1.1.0-11.oe2203sp1.src.rpm", "name":"rapidjson-1.1.0-11.oe2203sp1.src.rpm" }, "name":"rapidjson-1.1.0-11.oe2203sp1.src.rpm", "category":"product_version" }, { "product":{ "product_identification_helper":{ "cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3" }, "product_id":"rapidjson-1.1.0-12.oe2203sp3.src.rpm", "name":"rapidjson-1.1.0-12.oe2203sp3.src.rpm" }, "name":"rapidjson-1.1.0-12.oe2203sp3.src.rpm", "category":"product_version" }, { "product":{ "product_identification_helper":{ "cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4" }, "product_id":"rapidjson-1.1.0-12.oe2003sp4.src.rpm", "name":"rapidjson-1.1.0-12.oe2003sp4.src.rpm" }, "name":"rapidjson-1.1.0-12.oe2003sp4.src.rpm", "category":"product_version" } ], "category":"product_name" }, { "name":"noarch", "branches":[ { "product":{ "product_identification_helper":{ "cpe":"cpe:/a:openEuler:openEuler:24.03-LTS" }, "product_id":"rapidjson-devel-1.1.0-13.oe2403.noarch.rpm", "name":"rapidjson-devel-1.1.0-13.oe2403.noarch.rpm" }, "name":"rapidjson-devel-1.1.0-13.oe2403.noarch.rpm", "category":"product_version" }, { "product":{ "product_identification_helper":{ "cpe":"cpe:/a:openEuler:openEuler:24.03-LTS" }, "product_id":"rapidjson-help-1.1.0-13.oe2403.noarch.rpm", "name":"rapidjson-help-1.1.0-13.oe2403.noarch.rpm" }, "name":"rapidjson-help-1.1.0-13.oe2403.noarch.rpm", "category":"product_version" }, { "product":{ "product_identification_helper":{ "cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4" }, "product_id":"rapidjson-devel-1.1.0-12.oe2203sp4.noarch.rpm", "name":"rapidjson-devel-1.1.0-12.oe2203sp4.noarch.rpm" }, "name":"rapidjson-devel-1.1.0-12.oe2203sp4.noarch.rpm", "category":"product_version" }, { "product":{ "product_identification_helper":{ "cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4" }, "product_id":"rapidjson-help-1.1.0-12.oe2203sp4.noarch.rpm", "name":"rapidjson-help-1.1.0-12.oe2203sp4.noarch.rpm" }, "name":"rapidjson-help-1.1.0-12.oe2203sp4.noarch.rpm", "category":"product_version" }, { "product":{ "product_identification_helper":{ "cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1" }, "product_id":"rapidjson-devel-1.1.0-11.oe2203sp1.noarch.rpm", "name":"rapidjson-devel-1.1.0-11.oe2203sp1.noarch.rpm" }, "name":"rapidjson-devel-1.1.0-11.oe2203sp1.noarch.rpm", "category":"product_version" }, { "product":{ "product_identification_helper":{ "cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1" }, "product_id":"rapidjson-help-1.1.0-11.oe2203sp1.noarch.rpm", "name":"rapidjson-help-1.1.0-11.oe2203sp1.noarch.rpm" }, "name":"rapidjson-help-1.1.0-11.oe2203sp1.noarch.rpm", "category":"product_version" }, { "product":{ "product_identification_helper":{ "cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3" }, "product_id":"rapidjson-devel-1.1.0-12.oe2203sp3.noarch.rpm", "name":"rapidjson-devel-1.1.0-12.oe2203sp3.noarch.rpm" }, "name":"rapidjson-devel-1.1.0-12.oe2203sp3.noarch.rpm", "category":"product_version" }, { "product":{ "product_identification_helper":{ "cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3" }, "product_id":"rapidjson-help-1.1.0-12.oe2203sp3.noarch.rpm", "name":"rapidjson-help-1.1.0-12.oe2203sp3.noarch.rpm" }, "name":"rapidjson-help-1.1.0-12.oe2203sp3.noarch.rpm", "category":"product_version" }, { "product":{ "product_identification_helper":{ "cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4" }, "product_id":"rapidjson-devel-1.1.0-12.oe2003sp4.noarch.rpm", "name":"rapidjson-devel-1.1.0-12.oe2003sp4.noarch.rpm" }, "name":"rapidjson-devel-1.1.0-12.oe2003sp4.noarch.rpm", "category":"product_version" }, { "product":{ "product_identification_helper":{ "cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4" }, "product_id":"rapidjson-help-1.1.0-12.oe2003sp4.noarch.rpm", "name":"rapidjson-help-1.1.0-12.oe2003sp4.noarch.rpm" }, "name":"rapidjson-help-1.1.0-12.oe2003sp4.noarch.rpm", "category":"product_version" } ], "category":"product_name" } ] } ], "relationships":[ { "relates_to_product_reference":"openEuler-24.03-LTS", "product_reference":"rapidjson-1.1.0-13.oe2403.src.rpm", "full_product_name":{ "product_id":"openEuler-24.03-LTS:rapidjson-1.1.0-13.oe2403.src", "name":"rapidjson-1.1.0-13.oe2403.src as a component of openEuler-24.03-LTS" }, "category":"default_component_of" }, { "relates_to_product_reference":"openEuler-22.03-LTS-SP4", "product_reference":"rapidjson-1.1.0-12.oe2203sp4.src.rpm", "full_product_name":{ "product_id":"openEuler-22.03-LTS-SP4:rapidjson-1.1.0-12.oe2203sp4.src", "name":"rapidjson-1.1.0-12.oe2203sp4.src as a component of openEuler-22.03-LTS-SP4" }, "category":"default_component_of" }, { "relates_to_product_reference":"openEuler-22.03-LTS-SP1", "product_reference":"rapidjson-1.1.0-11.oe2203sp1.src.rpm", "full_product_name":{ "product_id":"openEuler-22.03-LTS-SP1:rapidjson-1.1.0-11.oe2203sp1.src", "name":"rapidjson-1.1.0-11.oe2203sp1.src as a component of openEuler-22.03-LTS-SP1" }, "category":"default_component_of" }, { "relates_to_product_reference":"openEuler-22.03-LTS-SP3", "product_reference":"rapidjson-1.1.0-12.oe2203sp3.src.rpm", "full_product_name":{ "product_id":"openEuler-22.03-LTS-SP3:rapidjson-1.1.0-12.oe2203sp3.src", "name":"rapidjson-1.1.0-12.oe2203sp3.src as a component of openEuler-22.03-LTS-SP3" }, "category":"default_component_of" }, { "relates_to_product_reference":"openEuler-20.03-LTS-SP4", "product_reference":"rapidjson-1.1.0-12.oe2003sp4.src.rpm", "full_product_name":{ "product_id":"openEuler-20.03-LTS-SP4:rapidjson-1.1.0-12.oe2003sp4.src", "name":"rapidjson-1.1.0-12.oe2003sp4.src as a component of openEuler-20.03-LTS-SP4" }, "category":"default_component_of" }, { "relates_to_product_reference":"openEuler-24.03-LTS", "product_reference":"rapidjson-devel-1.1.0-13.oe2403.noarch.rpm", "full_product_name":{ "product_id":"openEuler-24.03-LTS:rapidjson-devel-1.1.0-13.oe2403.noarch", "name":"rapidjson-devel-1.1.0-13.oe2403.noarch as a component of openEuler-24.03-LTS" }, "category":"default_component_of" }, { "relates_to_product_reference":"openEuler-24.03-LTS", "product_reference":"rapidjson-help-1.1.0-13.oe2403.noarch.rpm", "full_product_name":{ "product_id":"openEuler-24.03-LTS:rapidjson-help-1.1.0-13.oe2403.noarch", "name":"rapidjson-help-1.1.0-13.oe2403.noarch as a component of openEuler-24.03-LTS" }, "category":"default_component_of" }, { "relates_to_product_reference":"openEuler-22.03-LTS-SP4", "product_reference":"rapidjson-devel-1.1.0-12.oe2203sp4.noarch.rpm", "full_product_name":{ "product_id":"openEuler-22.03-LTS-SP4:rapidjson-devel-1.1.0-12.oe2203sp4.noarch", "name":"rapidjson-devel-1.1.0-12.oe2203sp4.noarch as a component of openEuler-22.03-LTS-SP4" }, "category":"default_component_of" }, { "relates_to_product_reference":"openEuler-22.03-LTS-SP4", "product_reference":"rapidjson-help-1.1.0-12.oe2203sp4.noarch.rpm", "full_product_name":{ "product_id":"openEuler-22.03-LTS-SP4:rapidjson-help-1.1.0-12.oe2203sp4.noarch", "name":"rapidjson-help-1.1.0-12.oe2203sp4.noarch as a component of openEuler-22.03-LTS-SP4" }, "category":"default_component_of" }, { "relates_to_product_reference":"openEuler-22.03-LTS-SP1", "product_reference":"rapidjson-devel-1.1.0-11.oe2203sp1.noarch.rpm", "full_product_name":{ "product_id":"openEuler-22.03-LTS-SP1:rapidjson-devel-1.1.0-11.oe2203sp1.noarch", "name":"rapidjson-devel-1.1.0-11.oe2203sp1.noarch as a component of openEuler-22.03-LTS-SP1" }, "category":"default_component_of" }, { "relates_to_product_reference":"openEuler-22.03-LTS-SP1", "product_reference":"rapidjson-help-1.1.0-11.oe2203sp1.noarch.rpm", "full_product_name":{ "product_id":"openEuler-22.03-LTS-SP1:rapidjson-help-1.1.0-11.oe2203sp1.noarch", "name":"rapidjson-help-1.1.0-11.oe2203sp1.noarch as a component of openEuler-22.03-LTS-SP1" }, "category":"default_component_of" }, { "relates_to_product_reference":"openEuler-22.03-LTS-SP3", "product_reference":"rapidjson-devel-1.1.0-12.oe2203sp3.noarch.rpm", "full_product_name":{ "product_id":"openEuler-22.03-LTS-SP3:rapidjson-devel-1.1.0-12.oe2203sp3.noarch", "name":"rapidjson-devel-1.1.0-12.oe2203sp3.noarch as a component of openEuler-22.03-LTS-SP3" }, "category":"default_component_of" }, { "relates_to_product_reference":"openEuler-22.03-LTS-SP3", "product_reference":"rapidjson-help-1.1.0-12.oe2203sp3.noarch.rpm", "full_product_name":{ "product_id":"openEuler-22.03-LTS-SP3:rapidjson-help-1.1.0-12.oe2203sp3.noarch", "name":"rapidjson-help-1.1.0-12.oe2203sp3.noarch as a component of openEuler-22.03-LTS-SP3" }, "category":"default_component_of" }, { "relates_to_product_reference":"openEuler-20.03-LTS-SP4", "product_reference":"rapidjson-devel-1.1.0-12.oe2003sp4.noarch.rpm", "full_product_name":{ "product_id":"openEuler-20.03-LTS-SP4:rapidjson-devel-1.1.0-12.oe2003sp4.noarch", "name":"rapidjson-devel-1.1.0-12.oe2003sp4.noarch as a component of openEuler-20.03-LTS-SP4" }, "category":"default_component_of" }, { "relates_to_product_reference":"openEuler-20.03-LTS-SP4", "product_reference":"rapidjson-help-1.1.0-12.oe2003sp4.noarch.rpm", "full_product_name":{ "product_id":"openEuler-20.03-LTS-SP4:rapidjson-help-1.1.0-12.oe2003sp4.noarch", "name":"rapidjson-help-1.1.0-12.oe2003sp4.noarch as a component of openEuler-20.03-LTS-SP4" }, "category":"default_component_of" } ] }, "vulnerabilities":[ { "cve":"CVE-2024-38517", "notes":[ { "text":"Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.", "category":"description", "title":"Vulnerability Description" } ], "product_status":{ "fixed":[ "openEuler-24.03-LTS:rapidjson-1.1.0-13.oe2403.src", "openEuler-22.03-LTS-SP4:rapidjson-1.1.0-12.oe2203sp4.src", "openEuler-22.03-LTS-SP1:rapidjson-1.1.0-11.oe2203sp1.src", "openEuler-22.03-LTS-SP3:rapidjson-1.1.0-12.oe2203sp3.src", "openEuler-20.03-LTS-SP4:rapidjson-1.1.0-12.oe2003sp4.src", "openEuler-24.03-LTS:rapidjson-devel-1.1.0-13.oe2403.noarch", "openEuler-24.03-LTS:rapidjson-help-1.1.0-13.oe2403.noarch", "openEuler-22.03-LTS-SP4:rapidjson-devel-1.1.0-12.oe2203sp4.noarch", "openEuler-22.03-LTS-SP4:rapidjson-help-1.1.0-12.oe2203sp4.noarch", "openEuler-22.03-LTS-SP1:rapidjson-devel-1.1.0-11.oe2203sp1.noarch", "openEuler-22.03-LTS-SP1:rapidjson-help-1.1.0-11.oe2203sp1.noarch", "openEuler-22.03-LTS-SP3:rapidjson-devel-1.1.0-12.oe2203sp3.noarch", "openEuler-22.03-LTS-SP3:rapidjson-help-1.1.0-12.oe2203sp3.noarch", "openEuler-20.03-LTS-SP4:rapidjson-devel-1.1.0-12.oe2003sp4.noarch", "openEuler-20.03-LTS-SP4:rapidjson-help-1.1.0-12.oe2003sp4.noarch" ] }, "remediations":[ { "product_ids":[ "openEuler-24.03-LTS:rapidjson-1.1.0-13.oe2403.src", "openEuler-22.03-LTS-SP4:rapidjson-1.1.0-12.oe2203sp4.src", "openEuler-22.03-LTS-SP1:rapidjson-1.1.0-11.oe2203sp1.src", "openEuler-22.03-LTS-SP3:rapidjson-1.1.0-12.oe2203sp3.src", "openEuler-20.03-LTS-SP4:rapidjson-1.1.0-12.oe2003sp4.src", "openEuler-24.03-LTS:rapidjson-devel-1.1.0-13.oe2403.noarch", "openEuler-24.03-LTS:rapidjson-help-1.1.0-13.oe2403.noarch", "openEuler-22.03-LTS-SP4:rapidjson-devel-1.1.0-12.oe2203sp4.noarch", "openEuler-22.03-LTS-SP4:rapidjson-help-1.1.0-12.oe2203sp4.noarch", "openEuler-22.03-LTS-SP1:rapidjson-devel-1.1.0-11.oe2203sp1.noarch", "openEuler-22.03-LTS-SP1:rapidjson-help-1.1.0-11.oe2203sp1.noarch", "openEuler-22.03-LTS-SP3:rapidjson-devel-1.1.0-12.oe2203sp3.noarch", "openEuler-22.03-LTS-SP3:rapidjson-help-1.1.0-12.oe2203sp3.noarch", "openEuler-20.03-LTS-SP4:rapidjson-devel-1.1.0-12.oe2003sp4.noarch", "openEuler-20.03-LTS-SP4:rapidjson-help-1.1.0-12.oe2003sp4.noarch" ], "details":"rapidjson security update", "category":"vendor_fix", "url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1857" } ], "scores":[ { "cvss_v3":{ "baseSeverity":"HIGH", "baseScore":7.8, "vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version":"3.1" }, "products":[ "openEuler-24.03-LTS:rapidjson-1.1.0-13.oe2403.src", "openEuler-22.03-LTS-SP4:rapidjson-1.1.0-12.oe2203sp4.src", "openEuler-22.03-LTS-SP1:rapidjson-1.1.0-11.oe2203sp1.src", "openEuler-22.03-LTS-SP3:rapidjson-1.1.0-12.oe2203sp3.src", "openEuler-20.03-LTS-SP4:rapidjson-1.1.0-12.oe2003sp4.src", "openEuler-24.03-LTS:rapidjson-devel-1.1.0-13.oe2403.noarch", "openEuler-24.03-LTS:rapidjson-help-1.1.0-13.oe2403.noarch", "openEuler-22.03-LTS-SP4:rapidjson-devel-1.1.0-12.oe2203sp4.noarch", "openEuler-22.03-LTS-SP4:rapidjson-help-1.1.0-12.oe2203sp4.noarch", "openEuler-22.03-LTS-SP1:rapidjson-devel-1.1.0-11.oe2203sp1.noarch", "openEuler-22.03-LTS-SP1:rapidjson-help-1.1.0-11.oe2203sp1.noarch", "openEuler-22.03-LTS-SP3:rapidjson-devel-1.1.0-12.oe2203sp3.noarch", "openEuler-22.03-LTS-SP3:rapidjson-help-1.1.0-12.oe2203sp3.noarch", "openEuler-20.03-LTS-SP4:rapidjson-devel-1.1.0-12.oe2003sp4.noarch", "openEuler-20.03-LTS-SP4:rapidjson-help-1.1.0-12.oe2003sp4.noarch" ] } ], "threats":[ { "details":"High", "category":"impact" } ], "title":"CVE-2024-38517" } ] }