-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: yajl security update
Advisory ID:       RHSA-2022:7524-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:7524
Issue date:        2022-11-08
CVE Names:         CVE-2022-24795 
====================================================================
1. Summary:

An update for yajl is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat CodeReady Linux Builder (v. 8) - aarch64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64

3. Description:

Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON
parser written in ANSI C and a small validating JSON generator.

Security Fix(es):

* yajl: heap-based buffer overflow when handling large inputs due to an
integer overflow (CVE-2022-24795)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.7 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

2072912 - CVE-2022-24795 yajl: heap-based buffer overflow when handling large inputs due to an integer overflow

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
yajl-2.1.0-11.el8.src.rpm

aarch64:
yajl-2.1.0-11.el8.aarch64.rpm
yajl-debuginfo-2.1.0-11.el8.aarch64.rpm
yajl-debugsource-2.1.0-11.el8.aarch64.rpm

ppc64le:
yajl-2.1.0-11.el8.ppc64le.rpm
yajl-debuginfo-2.1.0-11.el8.ppc64le.rpm
yajl-debugsource-2.1.0-11.el8.ppc64le.rpm

s390x:
yajl-2.1.0-11.el8.s390x.rpm
yajl-debuginfo-2.1.0-11.el8.s390x.rpm
yajl-debugsource-2.1.0-11.el8.s390x.rpm

x86_64:
yajl-2.1.0-11.el8.i686.rpm
yajl-2.1.0-11.el8.x86_64.rpm
yajl-debuginfo-2.1.0-11.el8.i686.rpm
yajl-debuginfo-2.1.0-11.el8.x86_64.rpm
yajl-debugsource-2.1.0-11.el8.i686.rpm
yajl-debugsource-2.1.0-11.el8.x86_64.rpm

Red Hat CodeReady Linux Builder (v. 8):

aarch64:
yajl-debuginfo-2.1.0-11.el8.aarch64.rpm
yajl-debugsource-2.1.0-11.el8.aarch64.rpm
yajl-devel-2.1.0-11.el8.aarch64.rpm

ppc64le:
yajl-debuginfo-2.1.0-11.el8.ppc64le.rpm
yajl-debugsource-2.1.0-11.el8.ppc64le.rpm
yajl-devel-2.1.0-11.el8.ppc64le.rpm

s390x:
yajl-debuginfo-2.1.0-11.el8.s390x.rpm
yajl-debugsource-2.1.0-11.el8.s390x.rpm
yajl-devel-2.1.0-11.el8.s390x.rpm

x86_64:
yajl-debuginfo-2.1.0-11.el8.i686.rpm
yajl-debuginfo-2.1.0-11.el8.x86_64.rpm
yajl-debugsource-2.1.0-11.el8.i686.rpm
yajl-debugsource-2.1.0-11.el8.x86_64.rpm
yajl-devel-2.1.0-11.el8.i686.rpm
yajl-devel-2.1.0-11.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2022-24795
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBY2pSj9zjgjWX9erEAQhNHQ/+NmD/kowonHJ8LFS8NxvSBg7CI5R3lXw5
mInDFqY9V6giZ/6ljuvM5wPGupf0o08fYLKukbcSPHbM9niZidXNhOiE68euQT1R
tWiwoNvz2cGJ5A/PorVeuTeqUz+xDUljDHenc+YKpVHGx6+OjSTLL+CT0plpcy2d
APJOAa8s4ta+7lBGw3DYyQZkPNcgFdJYRsw9BGtDPkNjpnfsWKTCErvpbKmINaAO
iavmeVlSUqiPzuMu2Xez15NMGdbiTgqi5hJ/KhPjRAbqrvFFhewEmiFszyjuUlGs
XAvAO2vBB8L2uZH4x6RnijBfouvWZbT1mAbh+goE6eVKJRf/F5kAG+ZYG48le9fh
gFNBltaqCqeergu8g1/rsbHfwacpAjkkIookrK/QMgXcn7j09mK5kuR9lGi3wo+S
U/S4JnGAzHo1ytl0Flk9nIjKhf24a3BH5DDlUR3dR56OqzMJ64co/DB6RZWEWf4t
mwpOgDHkrKW7JBp74nX8owLg71SM0knv2nSmhla4hL0fEd7q+W+Ypjc/QLSDDb0J
C67zsAmcyXDz96Gpz0v2bgpMperdhJ9ggmtYIp4RlgFL0DagWQRc0FAp52GsVu9u
e+c0mTlCHeoaCDumnvxs2FQtwvbFogkc5MllZ3jB+IdbQbxSbJQpGt/QkLtPauaU
9YBoCjrUFPw=nzh9
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2022-7524:01 Moderate: yajl security update

An update for yajl is now available for Red Hat Enterprise Linux 8

Summary

Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C and a small validating JSON generator.
Security Fix(es):
* yajl: heap-based buffer overflow when handling large inputs due to an integer overflow (CVE-2022-24795)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2022-24795 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index

Package List

Red Hat Enterprise Linux AppStream (v. 8):
Source: yajl-2.1.0-11.el8.src.rpm
aarch64: yajl-2.1.0-11.el8.aarch64.rpm yajl-debuginfo-2.1.0-11.el8.aarch64.rpm yajl-debugsource-2.1.0-11.el8.aarch64.rpm
ppc64le: yajl-2.1.0-11.el8.ppc64le.rpm yajl-debuginfo-2.1.0-11.el8.ppc64le.rpm yajl-debugsource-2.1.0-11.el8.ppc64le.rpm
s390x: yajl-2.1.0-11.el8.s390x.rpm yajl-debuginfo-2.1.0-11.el8.s390x.rpm yajl-debugsource-2.1.0-11.el8.s390x.rpm
x86_64: yajl-2.1.0-11.el8.i686.rpm yajl-2.1.0-11.el8.x86_64.rpm yajl-debuginfo-2.1.0-11.el8.i686.rpm yajl-debuginfo-2.1.0-11.el8.x86_64.rpm yajl-debugsource-2.1.0-11.el8.i686.rpm yajl-debugsource-2.1.0-11.el8.x86_64.rpm
Red Hat CodeReady Linux Builder (v. 8):
aarch64: yajl-debuginfo-2.1.0-11.el8.aarch64.rpm yajl-debugsource-2.1.0-11.el8.aarch64.rpm yajl-devel-2.1.0-11.el8.aarch64.rpm
ppc64le: yajl-debuginfo-2.1.0-11.el8.ppc64le.rpm yajl-debugsource-2.1.0-11.el8.ppc64le.rpm yajl-devel-2.1.0-11.el8.ppc64le.rpm
s390x: yajl-debuginfo-2.1.0-11.el8.s390x.rpm yajl-debugsource-2.1.0-11.el8.s390x.rpm yajl-devel-2.1.0-11.el8.s390x.rpm
x86_64: yajl-debuginfo-2.1.0-11.el8.i686.rpm yajl-debuginfo-2.1.0-11.el8.x86_64.rpm yajl-debugsource-2.1.0-11.el8.i686.rpm yajl-debugsource-2.1.0-11.el8.x86_64.rpm yajl-devel-2.1.0-11.el8.i686.rpm yajl-devel-2.1.0-11.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2022:7524-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2022:7524
Issued Date: : 2022-11-08
CVE Names: CVE-2022-24795

Topic

An update for yajl is now available for Red Hat Enterprise Linux 8.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat CodeReady Linux Builder (v. 8) - aarch64, ppc64le, s390x, x86_64

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64


Bugs Fixed

2072912 - CVE-2022-24795 yajl: heap-based buffer overflow when handling large inputs due to an integer overflow


Related News