First published: Tue Apr 05 2022(Updated: )
_NOTE: A previous patch, 1.4.2, fixed the heap memory issue, but could still lead to a DoS infinite loop. Please update to version 1.4.3_ The 1.x branch and the 2.x branch of [yajl](https://github.com/lloyd/yajl) contain an integer overflow which leads to subsequent heap memory corruption when dealing with large (~2GB) inputs. ### Details The [reallocation logic at yajl_buf.c#L64](https://github.com/brianmario/yajl-ruby/blob/7168bd79b888900aa94523301126f968a93eb3a6/ext/yajl/yajl_buf.c#L64) may result in the `need` 32bit integer wrapping to 0 when `need` approaches a value of 0x80000000 (i.e. ~2GB of data), which results in a reallocation of buf->alloc into a small heap chunk. These integers are declared as `size_t` in the 2.x branch of `yajl`, which practically prevents the issue from triggering on 64bit platforms, however this does not preclude this issue triggering on 32bit builds on which `size_t` is a 32bit integer. Subsequent population of this under-allocated heap chunk is based on the original buffer size, leading to heap memory corruption. ### Impact We rate this as a moderate severity vulnerability which mostly impacts process availability as we believe exploitation for arbitrary code execution to be unlikely. ### Patches Patched in yajl-ruby 1.4.3 ### Workarounds Avoid passing large inputs to YAJL ### References https://github.com/brianmario/yajl-ruby/blob/7168bd79b888900aa94523301126f968a93eb3a6/ext/yajl/yajl_buf.c#L64 ### For more information If you have any questions or comments about this advisory: * Open an issue in [yajl-ruby](https://github.com/brianmario/yajl-ruby/issues)
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/yajl-ruby | <=1.4.2 | 1.4.3 |
Yajl-ruby Project Yajl-ruby | <1.4.2 | |
ubuntu/yajl | <2.0.4-4ubuntu0.1~ | 2.0.4-4ubuntu0.1~ |
ubuntu/yajl | <2.1.0-3+ | 2.1.0-3+ |
ubuntu/yajl | <2.1.0-2ubuntu0.16.04.1~ | 2.1.0-2ubuntu0.16.04.1~ |
ubuntu/yajl | <2.1.0-2ubuntu0.18.04.1~ | 2.1.0-2ubuntu0.18.04.1~ |
ubuntu/yajl | <2.1.0-3ubuntu0.23.04.1 | 2.1.0-3ubuntu0.23.04.1 |
ubuntu/yajl | <2.1.0-3ubuntu0.20.04.1 | 2.1.0-3ubuntu0.20.04.1 |
ubuntu/yajl | <2.1.0-3ubuntu0.22.04.1 | 2.1.0-3ubuntu0.22.04.1 |
debian/burp | <=2.1.32-2<=2.2.18-8<=3.1.4-1<=3.1.4-3.1 | 2.1.32-2+deb10u1 |
debian/epics-base | <=7.0.3.1-4<=7.0.8+dfsg1-1 | |
debian/r-cran-jsonlite | <=1.6+dfsg-1<=1.7.2+dfsg-1<=1.8.4+dfsg-1 | 1.8.8+dfsg-1 |
debian/ruby-yajl | <=1.3.1-1<=1.4.1-1 | 1.4.3-1 |
debian/xqilla | 2.3.4-1 | |
debian/yajl | <=2.1.0-3 | 2.1.0-3+deb10u2 2.1.0-3+deb11u2 2.1.0-3+deb12u2 2.1.0-5 |
redhat/yajl | <1.4.3 | 1.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.