{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"unixODBC security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for unixODBC is now available for openEuler-22.03-LTS-SP1.",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"The unixODBC Project goals are to develop and promote unixODBC to be the definitive standard for ODBC on non MS Windows platforms. This is to include GUI support for both KDE and GNOME.\n\nSecurity Fix(es):\n\nAn out-of-bounds stack write flaw was found in unixODBC on 64-bit architectures where the caller has 4 bytes and callee writes 8 bytes. This issue may go unnoticed on little-endian architectures, while big-endian architectures can be broken.(CVE-2024-1013)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for unixODBC is now available for openEuler-22.03-LTS-SP1.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"unixODBC",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2024-1372",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1372"
			},
			{
				"summary":"CVE-2024-1013",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-1013&packageName=unixODBC"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-1013"
			},
			{
				"summary":"openEuler-SA-2024-1372 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2024/csaf-openeuler-sa-2024-1372.json"
			}
		],
		"title":"An update for unixODBC is now available for openEuler-22.03-LTS-SP1",
		"tracking":{
			"initial_release_date":"2024-04-12T09:14:28+08:00",
			"revision_history":[
				{
					"date":"2024-04-12T09:14:28+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				},
				{
					"date":"2024-10-31T09:14:28+08:00",
					"summary":"final",
					"number":"2.0.0"
				}
			],
			"generator":{
				"date":"2024-10-31T09:14:28+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-10-31T09:14:28+08:00",
			"id":"openEuler-SA-2024-1372",
			"version":"2.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"openEuler-22.03-LTS-SP1",
									"name":"openEuler-22.03-LTS-SP1"
								},
								"name":"openEuler-22.03-LTS-SP1",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"unixODBC-2.3.7-3.h1.oe2203sp1.aarch64.rpm",
									"name":"unixODBC-2.3.7-3.h1.oe2203sp1.aarch64.rpm"
								},
								"name":"unixODBC-2.3.7-3.h1.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"unixODBC-debugsource-2.3.7-3.h1.oe2203sp1.aarch64.rpm",
									"name":"unixODBC-debugsource-2.3.7-3.h1.oe2203sp1.aarch64.rpm"
								},
								"name":"unixODBC-debugsource-2.3.7-3.h1.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"unixODBC-devel-2.3.7-3.h1.oe2203sp1.aarch64.rpm",
									"name":"unixODBC-devel-2.3.7-3.h1.oe2203sp1.aarch64.rpm"
								},
								"name":"unixODBC-devel-2.3.7-3.h1.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"unixODBC-debuginfo-2.3.7-3.h1.oe2203sp1.aarch64.rpm",
									"name":"unixODBC-debuginfo-2.3.7-3.h1.oe2203sp1.aarch64.rpm"
								},
								"name":"unixODBC-debuginfo-2.3.7-3.h1.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"unixODBC-2.3.7-3.h1.oe2203sp1.src.rpm",
									"name":"unixODBC-2.3.7-3.h1.oe2203sp1.src.rpm"
								},
								"name":"unixODBC-2.3.7-3.h1.oe2203sp1.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"unixODBC-devel-2.3.7-3.h1.oe2203sp1.x86_64.rpm",
									"name":"unixODBC-devel-2.3.7-3.h1.oe2203sp1.x86_64.rpm"
								},
								"name":"unixODBC-devel-2.3.7-3.h1.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"unixODBC-debuginfo-2.3.7-3.h1.oe2203sp1.x86_64.rpm",
									"name":"unixODBC-debuginfo-2.3.7-3.h1.oe2203sp1.x86_64.rpm"
								},
								"name":"unixODBC-debuginfo-2.3.7-3.h1.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"unixODBC-debugsource-2.3.7-3.h1.oe2203sp1.x86_64.rpm",
									"name":"unixODBC-debugsource-2.3.7-3.h1.oe2203sp1.x86_64.rpm"
								},
								"name":"unixODBC-debugsource-2.3.7-3.h1.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"unixODBC-2.3.7-3.h1.oe2203sp1.x86_64.rpm",
									"name":"unixODBC-2.3.7-3.h1.oe2203sp1.x86_64.rpm"
								},
								"name":"unixODBC-2.3.7-3.h1.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"unixODBC-2.3.7-3.h1.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:unixODBC-2.3.7-3.h1.oe2203sp1.aarch64",
					"name":"unixODBC-2.3.7-3.h1.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"unixODBC-debugsource-2.3.7-3.h1.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:unixODBC-debugsource-2.3.7-3.h1.oe2203sp1.aarch64",
					"name":"unixODBC-debugsource-2.3.7-3.h1.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"unixODBC-devel-2.3.7-3.h1.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:unixODBC-devel-2.3.7-3.h1.oe2203sp1.aarch64",
					"name":"unixODBC-devel-2.3.7-3.h1.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"unixODBC-debuginfo-2.3.7-3.h1.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:unixODBC-debuginfo-2.3.7-3.h1.oe2203sp1.aarch64",
					"name":"unixODBC-debuginfo-2.3.7-3.h1.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"unixODBC-2.3.7-3.h1.oe2203sp1.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:unixODBC-2.3.7-3.h1.oe2203sp1.src",
					"name":"unixODBC-2.3.7-3.h1.oe2203sp1.src as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"unixODBC-devel-2.3.7-3.h1.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:unixODBC-devel-2.3.7-3.h1.oe2203sp1.x86_64",
					"name":"unixODBC-devel-2.3.7-3.h1.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"unixODBC-debuginfo-2.3.7-3.h1.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:unixODBC-debuginfo-2.3.7-3.h1.oe2203sp1.x86_64",
					"name":"unixODBC-debuginfo-2.3.7-3.h1.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"unixODBC-debugsource-2.3.7-3.h1.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:unixODBC-debugsource-2.3.7-3.h1.oe2203sp1.x86_64",
					"name":"unixODBC-debugsource-2.3.7-3.h1.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"unixODBC-2.3.7-3.h1.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:unixODBC-2.3.7-3.h1.oe2203sp1.x86_64",
					"name":"unixODBC-2.3.7-3.h1.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2024-1013",
			"notes":[
				{
					"text":"An out-of-bounds stack write flaw was found in unixODBC on 64-bit architectures where the caller has 4 bytes and callee writes 8 bytes. This issue may go unnoticed on little-endian architectures, while big-endian architectures can be broken.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:unixODBC-2.3.7-3.h1.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:unixODBC-debugsource-2.3.7-3.h1.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:unixODBC-devel-2.3.7-3.h1.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:unixODBC-debuginfo-2.3.7-3.h1.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:unixODBC-2.3.7-3.h1.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:unixODBC-devel-2.3.7-3.h1.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:unixODBC-debuginfo-2.3.7-3.h1.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:unixODBC-debugsource-2.3.7-3.h1.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:unixODBC-2.3.7-3.h1.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:unixODBC-2.3.7-3.h1.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:unixODBC-debugsource-2.3.7-3.h1.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:unixODBC-devel-2.3.7-3.h1.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:unixODBC-debuginfo-2.3.7-3.h1.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:unixODBC-2.3.7-3.h1.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:unixODBC-devel-2.3.7-3.h1.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:unixODBC-debuginfo-2.3.7-3.h1.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:unixODBC-debugsource-2.3.7-3.h1.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:unixODBC-2.3.7-3.h1.oe2203sp1.x86_64"
					],
					"details":"unixODBC security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1372"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:unixODBC-2.3.7-3.h1.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:unixODBC-debugsource-2.3.7-3.h1.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:unixODBC-devel-2.3.7-3.h1.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:unixODBC-debuginfo-2.3.7-3.h1.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:unixODBC-2.3.7-3.h1.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:unixODBC-devel-2.3.7-3.h1.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:unixODBC-debuginfo-2.3.7-3.h1.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:unixODBC-debugsource-2.3.7-3.h1.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:unixODBC-2.3.7-3.h1.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-1013"
		}
	]
}