CVE-2022-31117

NameCVE-2022-31117
DescriptionUltraJSON is a fast JSON encoder and decoder written in pure C with bindings for Python 3.7+. In versions prior to 5.4.0 an error occurring while reallocating a buffer for string decoding can cause the buffer to get freed twice. Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. This issue has been resolved in version 5.4.0 and all users should upgrade to UltraJSON 5.4.0. There are no known workarounds for this issue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ujson (PTS)buster1.35-3vulnerable
bullseye4.0.2-1vulnerable
bookworm, sid5.6.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ujsonsource(unstable)5.4.0-1

Notes

[bullseye] - ujson <no-dsa> (Minor issue)
[buster] - ujson <no-dsa> (Minor issue)
https://github.com/ultrajson/ultrajson/security/advisories/GHSA-fm67-cv37-96ff
https://github.com/ultrajson/ultrajson/commit/9c20de0f77b391093967e25d01fb48671104b15b (5.4.0)

Search for package or bug name: Reporting problems