Ubuntu has issued an advisory on November 25: https://ubuntu.com/security/notices/USN-7125-1
CVE: (none) => CVE-2024-38517Source RPM: (none) => rapidjson-1.1.0-7.mga10.src.rpm, rapidjson-1.1.0-6.mga9.src.rpmWhiteboard: (none) => MGA9TOOStatus comment: (none) => Patch available from Ubuntu
Fixed both Cauldron and mga9!
Version: Cauldron => 9Whiteboard: MGA9TOO => (none)CC: (none) => geiger.david68210
Suggested advisory: ======================== The updated package fixes a security vulnerability: Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege. (CVE-2024-38517) References: https://ubuntu.com/security/notices/USN-7125-1 ======================== Updated package in core/updates_testing: ======================== rapidjson-1.1.0-6.1.mga9 from SRPM: rapidjson-1.1.0-6.1.mga9.src.rpm
Source RPM: rapidjson-1.1.0-7.mga10.src.rpm, rapidjson-1.1.0-6.mga9.src.rpm => rapidjson-1.1.0-6.mga9.src.rpmStatus: NEW => ASSIGNEDAssignee: bugsquad => qa-bugsStatus comment: Patch available from Ubuntu => (none)
Keywords: (none) => advisory
RH x86_64 installing rapidjson-1.1.0-6.1.mga9.x86_64.rpm from //home/katnatek/qa-testing/x86_64 Preparing... ################################################################################################## 1/1: rapidjson ################################################################################################## 1/1: removing rapidjson-1.1.0-6.mga9.x86_64 ################################################################################################## This looks like devs territory, but feel free to provide additional test
According to bug 20566 comment 20, "rapidjson is only a build time dependency for ppsspp - it's used when building the package, but does not need to be installed on the users' system afterwards." So it is indeed dev territory, and is good on a clean install over the older version. Validating.
Whiteboard: (none) => MGA9-64-OKKeywords: (none) => validated_updateCC: (none) => andrewsfarm, sysadmin-bugs
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2024-0371.html
Resolution: (none) => FIXEDStatus: ASSIGNED => RESOLVED