Mageia 2024-0371: rapidjson Security Advisory Updates
Summary
Tencent RapidJSON is vulnerable to privilege escalation due to an
integer underflow in the `GenericReader::ParseNumber()` function of
`include/rapidjson/reader.h` when parsing JSON text from a stream. An
attacker needs to send the victim a crafted file which needs to be
opened; this triggers the integer underflow vulnerability (when the file
is parsed), leading to elevation of privilege. (CVE-2024-38517)
References
- https://bugs.mageia.org/show_bug.cgi?id=33803
- https://ubuntu.com/security/notices/USN-7125-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38517
Resolution
MGASA-2024-0371 - Updated rapidjson packages fix security vulnerability
SRPMS
- 9/core/rapidjson-1.1.0-6.1.mga9
![Dist Mageia](/images/distros/dist-mageia.jpg)