Source: yajl
Severity: important
Tags: security upstream
X-Debbugs-Cc: Debian Security Team <t...@security.debian.org>

After preparing the LTS upload of yajl I've seen the following issues in
the upstream github issue tracker:

CVE-2017-16516 [1] portential buffer overread: A JSON file can cause denial of
 service.

CVE-2022-24795 [2] potential integer overflow which can lead to subsequent heap
  memory corruption when dealing with large (~2GB) input

The upstream issue tracker also indicates that there might be other 
vulnerabilies
(without CVEs or unknown CVEs), but I did not investiage further:
https://github.com/lloyd/yajl/issues/206 (double free)
https://github.com/lloyd/yajl/issues/204 (Uninitialized memory reads and 
out-of-bound)

It seems that the code is unmaintained upstream. It might be a good idea to 
evaluate
if any of the forks are more active and whether Debian should move there.

Cheers,
-- 
tobi

[1] https://github.com/lloyd/yajl/issues/248
    Potential fix: 
https://github.com/brianmario/yajl-ruby/commit/a8ca8f476655adaa187eedc60bdc770fff3c51ce

[2] https://github.com/lloyd/yajl/issues/239
    Potential fix (howver the use of abort() can cause issues.)
    https://github.com/lloyd/yajl/pull/240

-- System Information:
Debian Release: 12.0
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'oldstable-security'), (500, 
'oldoldstable'), (500, 'unstable'), (500, 'testing'), (500, 'oldstable'), (100, 
'bullseye-fasttrack'), (100, 'bullseye-backports-staging'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.1.0-9-amd64 (SMP w/12 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Reply via email to