[Git][security-tracker-team/security-tracker][master] xqilla's yajl is ancienct, around 0.2.2 and is not vulnerable to CVE-2017-16516 and CVE-2022-24795.

Tobias Frost (@tobi) tobi at debian.org
Sat Jul 15 14:23:35 BST 2023



Tobias Frost pushed to branch master at Debian Security Tracker / security-tracker


Commits:
c254af04 by Tobias Frost at 2023-07-15T15:23:12+02:00
xqilla's yajl is ancienct, around 0.2.2 and is not vulnerable to CVE-2017-16516 and CVE-2022-24795.

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -106402,12 +106402,13 @@ CVE-2022-24795 (yajl-ruby is a C binding to the YAJL JSON parsing and generation
 	[bookworm] - r-cran-jsonlite <no-dsa> (Minor issue)
 	[bullseye] - r-cran-jsonlite <no-dsa> (Minor issue)
 	[buster] - r-cran-jsonlite <no-dsa> (Minor issue)
-	- xqilla <unfixed> (bug #1040164)
+	- xqilla <not-affected> (embeds ancient yajl without the vulnerable code)
 	[bullseye] - xqilla <no-dsa> (Minor issue)
 	NOTE: https://github.com/brianmario/yajl-ruby/security/advisories/GHSA-jj47-x69x-mxrm
 	NOTE: https://github.com/brianmario/yajl-ruby/commit/7168bd79b888900aa94523301126f968a93eb3a6
 	NOTE: https://github.com/brianmario/yajl-ruby/commit/e8de283a6d64f0902740fd09e858fc3d7d803161
 	NOTE: https://github.com/lloyd/yajl/issues/239
+	NOTE: xquilla embeds ancient yail, likely 0.2.2 https://github.com/lloyd/yajl/tree/6efc79a
 CVE-2022-24794 (Express OpenID Connect is an Express JS middleware implementing sign o ...)
 	NOT-FOR-US: Express OpenID Connect
 CVE-2022-24793 (PJSIP is a free and open source multimedia communication library writt ...)
@@ -384163,11 +384164,11 @@ CVE-2017-16516 (In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is
 	[bookworm] - r-cran-jsonlite <no-dsa> (Minor issue)
 	[bullseye] - r-cran-jsonlite <no-dsa> (Minor issue)
 	[buster] - r-cran-jsonlite <no-dsa> (Minor issue)
-	- xqilla <unfixed> (bug #1040164)
+	- xqilla <not-affected> (embeds ancient yajl without the vulnerable code)
 	[bullseye] - xqilla <no-dsa> (Minor issue)
 	NOTE: https://github.com/brianmario/yajl-ruby/issues/176
 	NOTE: https://github.com/brianmario/yajl-ruby/commit/a8ca8f476655adaa187eedc60bdc770fff3c51ce
-	NOTE: yail: https://github.com/lloyd/yajl/issues/248
+	NOTE: xquilla embeds ancient yail, likely 0.2.2 https://github.com/lloyd/yajl/tree/6efc79a
 CVE-2017-16515
 	RESERVED
 CVE-2017-16514 (Multiple persistent stored Cross-Site-Scripting (XSS) vulnerabilities  ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c254af048d08433624f3c634462f0450aa2ce9a1

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c254af048d08433624f3c634462f0450aa2ce9a1
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230715/76c8448c/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list