CVE-2024-38517

Publication date 9 July 2024

Last updated 25 November 2024


Ubuntu priority

Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.

Status

Package Ubuntu Release Status
rapidjson 24.10 oracular
Fixed 1.1.0+dfsg2-7.3ubuntu0.1
24.04 LTS noble
Fixed 1.1.0+dfsg2-7.2ubuntu0.1~esm1
23.10 mantic Ignored end of life, was needs-triage
22.04 LTS jammy
Fixed 1.1.0+dfsg2-7ubuntu0.1~esm1
20.04 LTS focal
Fixed 1.1.0+dfsg2-5ubuntu1+esm1
18.04 LTS bionic
Fixed 1.1.0+dfsg2-3ubuntu0.1~esm1
16.04 LTS xenial
Fixed 0.12~git20141031-3ubuntu0.1~esm1

Get expanded security coverage with Ubuntu Pro

Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.

Get Ubuntu Pro