Security update for libyajl

SUSE Security Update: Security update for libyajl
Announcement ID: SUSE-SU-2022:1746-1
Rating: moderate
References: #1198405
Cross-References:CVE-2022-24795
Affected Products:
  • SUSE Linux Enterprise Server 12-SP5
  • SUSE Linux Enterprise Server for SAP Applications 12-SP5
  • SUSE Linux Enterprise Software Development Kit 12-SP5

An update that fixes one vulnerability is now available.

Description:


This update for libyajl fixes the following issue:

  • CVE-2022-24795: Fixed a heap-based buffer overflow when handling large inputs due to an integer overflow (bsc#1198405)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Software Development Kit 12-SP5:
    zypper in -t patch SUSE-SLE-SDK-12-SP5-2022-1746=1
  • SUSE Linux Enterprise Server 12-SP5:
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-1746=1

Package List:

  • SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64):
    • libyajl-debugsource-2.0.1-18.7.1
    • libyajl-devel-2.0.1-18.7.1
    • libyajl-devel-static-2.0.1-18.7.1
  • SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):
    • libyajl-debugsource-2.0.1-18.7.1
    • libyajl2-2.0.1-18.7.1
    • libyajl2-debuginfo-2.0.1-18.7.1
  • SUSE Linux Enterprise Server 12-SP5 (s390x x86_64):
    • libyajl2-32bit-2.0.1-18.7.1
    • libyajl2-debuginfo-32bit-2.0.1-18.7.1

References: