|
|
Subscribe / Log in / New account

Mageia alert MGASA-2024-0066 (yajl)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2024-0066: Updated yajl packages fix security vulnerabilities
Date:  Fri, 15 Mar 2024 23:52:54 +0100
Message-ID:  <20240315225254.9E6279FD40@duvel.mageia.org>
Archive-link:  Article

MGASA-2024-0066 - Updated yajl packages fix security vulnerabilities Publication date: 15 Mar 2024 URL: https://advisories.mageia.org/MGASA-2024-0066.html Type: security Affected Mageia releases: 9 CVE: CVE-2017-16516, CVE-2023-33460 Description: The updated packages fix security vulnerabilities: In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is supplied to Yajl::Parser.new.parse, the whole ruby process crashes with a SIGABRT in the yajl_string_decode function in yajl_encode.c. This results in the whole ruby process terminating and potentially a denial of service. (CVE-2017-16516) There's a memory leak in yajl 2.1.0 with use of yajl_tree_parse function. which will cause out-of-memory in server and cause crash. (CVE-2023-33460) References: - https://bugs.mageia.org/show_bug.cgi?id=32072 - https://www.debian.org/lts/security/2023/dla-3478 - https://www.debian.org/lts/security/2023/dla-3492 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3... SRPMS: - 9/core/yajl-2.1.0-6.1.mga9


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds