DEBIAN-CVE-2022-31116

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2022-31116
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-31116.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2022-31116
Upstream
Published
2022-07-05T18:15:08Z
Modified
2025-09-19T06:23:18Z
Summary
[none]
Details

UltraJSON is a fast JSON encoder and decoder written in pure C with bindings for Python 3.7+. Affected versions were found to improperly decode certain characters. JSON strings that contain escaped surrogate characters not part of a proper surrogate pair were decoded incorrectly. Besides corrupting strings, this allowed for potential key confusion and value overwriting in dictionaries. All users parsing JSON from untrusted sources are vulnerable. From version 5.4.0, UltraJSON decodes lone surrogates in the same way as the standard library's json module does, preserving them in the parsed output. Users are advised to upgrade. There are no known workarounds for this issue.

References

Affected packages

Debian:12 / ujson

Package

Name
ujson
Purl
pkg:deb/debian/ujson?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / ujson

Package

Name
ujson
Purl
pkg:deb/debian/ujson?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / ujson

Package

Name
ujson
Purl
pkg:deb/debian/ujson?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}