First published: Fri Nov 03 2017(Updated: )
In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is supplied to Yajl::Parser.new.parse, the whole ruby process crashes with a SIGABRT in the yajl_string_decode function in yajl_encode.c. This results in the whole ruby process terminating and potentially a denial of service.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yajl-ruby Project Yajl-ruby | =1.3.0 | |
Debian Debian Linux | =7.0 | |
rubygems/yajl-ruby | <1.3.1 | 1.3.1 |
ubuntu/ruby-yajl | <1.2.0-3.1 | 1.2.0-3.1 |
ubuntu/yajl | <2.1.0-3+ | 2.1.0-3+ |
ubuntu/yajl | <2.0.4-4ubuntu0.1~ | 2.0.4-4ubuntu0.1~ |
ubuntu/yajl | <2.1.0-3ubuntu0.22.04.1 | 2.1.0-3ubuntu0.22.04.1 |
ubuntu/yajl | <2.1.0-2ubuntu0.16.04.1~ | 2.1.0-2ubuntu0.16.04.1~ |
ubuntu/yajl | <2.1.0-2ubuntu0.18.04.1~ | 2.1.0-2ubuntu0.18.04.1~ |
ubuntu/yajl | <2.1.0-3ubuntu0.20.04.1 | 2.1.0-3ubuntu0.20.04.1 |
ubuntu/yajl | <2.1.0-3ubuntu0.23.04.1 | 2.1.0-3ubuntu0.23.04.1 |
debian/burp | <=2.1.32-2<=2.2.18-8<=3.1.4-1<=3.1.4-3.1 | 2.1.32-2+deb10u1 |
debian/epics-base | <=7.0.3.1-4<=7.0.8+dfsg1-1 | |
debian/r-cran-jsonlite | <=1.6+dfsg-1<=1.7.2+dfsg-1<=1.8.4+dfsg-1 | 1.8.8+dfsg-1 |
debian/ruby-yajl | 1.3.1-1 1.4.1-1 1.4.3-1 | |
debian/xqilla | 2.3.4-1 | |
debian/yajl | <=2.1.0-3 | 2.1.0-3+deb10u2 2.1.0-3+deb11u2 2.1.0-3+deb12u2 2.1.0-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.