Thursday, December 14, 2023

[USN-6233-2] YAJL vulnerabilities

-----BEGIN PGP SIGNATURE-----
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=MHr4
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6233-2
December 14, 2023

yajl vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.04
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in YAJL.

Software Description:
- yajl: Yet Another JSON Library

Details:

USN-6233-1 fixed vulnerabilities in YAJL. This update provides the
corresponding updates for Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu
23.04.

Original advisory details:

 It was discovered that YAJL was not properly performing bounds checks when
 decoding a string with escape sequences. If a user or automated system
 using YAJL were tricked into processing specially crafted input, an
 attacker could possibly use this issue to cause a denial of service
 (application abort). (CVE-2017-16516)

 It was discovered that YAJL was not properly handling memory allocation
 when dealing with large inputs, which could lead to heap memory
 corruption. If a user or automated system using YAJL were tricked into
 running a specially crafted large input, an attacker could possibly use
 this issue to cause a denial of service. (CVE-2022-24795)

 It was discovered that memory leaks existed in one of the YAJL parsing
 functions. An attacker could possibly use this issue to cause a denial of
 service (memory exhaustion). (CVE-2023-33460)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.04:
  libyajl2                        2.1.0-3ubuntu0.23.04.1

Ubuntu 22.04 LTS:
  libyajl2                        2.1.0-3ubuntu0.22.04.1

Ubuntu 20.04 LTS:
  libyajl2                        2.1.0-3ubuntu0.20.04.1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6233-2
  https://ubuntu.com/security/notices/USN-6233-1
  CVE-2017-16516, CVE-2022-24795, CVE-2023-33460

Package Information:
  https://launchpad.net/ubuntu/+source/yajl/2.1.0-3ubuntu0.23.04.1
  https://launchpad.net/ubuntu/+source/yajl/2.1.0-3ubuntu0.22.04.1
  https://launchpad.net/ubuntu/+source/yajl/2.1.0-3ubuntu0.20.04.1

No comments:

Post a Comment