Lucene search

K
ubuntuUbuntuUSN-6233-2
HistoryDec 14, 2023 - 12:00 a.m.

YAJL vulnerabilities

2023-12-1400:00:00
ubuntu.com
54
ubuntu
yajl
json library
bounds checks
memory allocation
memory leaks
vulnerabilities
denial of service

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.01 Low

EPSS

Percentile

83.5%

Releases

  • Ubuntu 23.04
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS

Packages

  • yajl - Yet Another JSON Library

Details

USN-6233-1 fixed vulnerabilities in YAJL. This update provides the
corresponding updates for Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu
23.04.

Original advisory details:

It was discovered that YAJL was not properly performing bounds checks when
decoding a string with escape sequences. If a user or automated system
using YAJL were tricked into processing specially crafted input, an
attacker could possibly use this issue to cause a denial of service
(application abort). (CVE-2017-16516)

It was discovered that YAJL was not properly handling memory allocation
when dealing with large inputs, which could lead to heap memory
corruption. If a user or automated system using YAJL were tricked into
running a specially crafted large input, an attacker could possibly use
this issue to cause a denial of service. (CVE-2022-24795)

It was discovered that memory leaks existed in one of the YAJL parsing
functions. An attacker could possibly use this issue to cause a denial of
service (memory exhaustion). (CVE-2023-33460)

OSVersionArchitecturePackageVersionFilename
Ubuntu23.04noarchlibyajl2< 2.1.0-3ubuntu0.23.04.1UNKNOWN
Ubuntu23.04noarchlibyajl-dev< 2.1.0-3ubuntu0.23.04.1UNKNOWN
Ubuntu23.04noarchlibyajl-doc< 2.1.0-3ubuntu0.23.04.1UNKNOWN
Ubuntu23.04noarchlibyajl2-dbgsym< 2.1.0-3ubuntu0.23.04.1UNKNOWN
Ubuntu23.04noarchyajl-tools< 2.1.0-3ubuntu0.23.04.1UNKNOWN
Ubuntu23.04noarchyajl-tools-dbgsym< 2.1.0-3ubuntu0.23.04.1UNKNOWN
Ubuntu22.04noarchlibyajl2< 2.1.0-3ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchlibyajl-dev< 2.1.0-3ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchlibyajl-doc< 2.1.0-3ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchlibyajl2-dbgsym< 2.1.0-3ubuntu0.22.04.1UNKNOWN
Rows per page:
1-10 of 181

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.01 Low

EPSS

Percentile

83.5%