openSUSE 15 Security Update : cJSON (openSUSE-SU-2024:0139-1)

high Nessus Plugin ID 197933

Language:

Synopsis

The remote openSUSE host is missing one or more security updates.

Description

The remote openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the openSUSE-SU-2024:0139-1 advisory.

- Update to 1.7.18:
* CVE-2024-31755: NULL pointer dereference via cJSON_SetValuestring() (boo#1223420)
* Remove non-functional list handling of compiler flags
* Fix heap buffer overflow
* remove misused optimization flag -01
* Set free'd pointers to NULL whenever they are not reassigned immediately after

- Update to version 1.7.17 (boo#1218098, CVE-2023-50472, boo#1218099, CVE-2023-50471):
* Fix null reference in cJSON_SetValuestring (CVE-2023-50472).
* Fix null reference in cJSON_InsertItemInArray (CVE-2023-50471).

- Update to 1.7.16:
* Add an option for ENABLE_CJSON_VERSION_SO in CMakeLists.txt
* Add cmake_policy to CMakeLists.txt
* Add cJSON_SetBoolValue
* Add meson documentation
* Fix memory leak in merge_patch
* Fix conflicting target names 'uninstall'
* Bump cmake version to 3.0 and use new version syntax
* Print int without decimal places
* Fix 'cjson_utils-static' target not exist
* Add allocate check for replace_item_in_object
* Fix a null pointer crash in cJSON_ReplaceItemViaPointer

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected cJSON-devel and / or libcjson1 packages.

See Also

https://bugzilla.suse.com/1218098

https://bugzilla.suse.com/1218099

https://bugzilla.suse.com/1223420

http://www.nessus.org/u?29a0ba71

https://www.suse.com/security/cve/CVE-2023-50471

https://www.suse.com/security/cve/CVE-2023-50472

https://www.suse.com/security/cve/CVE-2024-31755

Plugin Details

Severity: High

ID: 197933

File Name: openSUSE-2024-0139-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 5/27/2024

Updated: 5/27/2024

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.7

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2023-50472

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:novell:opensuse:15.5, p-cpe:/a:novell:opensuse:cjson-devel, p-cpe:/a:novell:opensuse:libcjson1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/25/2024

Vulnerability Publication Date: 12/14/2023

Reference Information

CVE: CVE-2023-50471, CVE-2023-50472, CVE-2024-31755