CVE-2022-31117 – ujson
Package
Manager: pip
Name: ujson
Vulnerable Version: >=0 <5.4.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00111 pctl0.30135
Details
Potential double free of buffer during string decoding ### Impact _What kind of vulnerability is it? Who is impacted?_ When an error occurs while reallocating the buffer for string decoding, the buffer gets freed twice. Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Users should upgrade to UltraJSON 5.4.0. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ There is no workaround. ### For more information If you have any questions or comments about this advisory: * Open an issue in [UltraJSON](http://github.com/ultrajson/ultrajson/issues)
Metadata
Created: 2022-07-05T21:05:59Z
Modified: 2022-07-15T20:48:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/07/GHSA-fm67-cv37-96ff/GHSA-fm67-cv37-96ff.json
CWE IDs: ["CWE-415"]
Alternative ID: GHSA-fm67-cv37-96ff
Finding: F138
Auto approve: 1