Bug 2104739 (CVE-2022-31117)

Summary: CVE-2022-31117 python-ujson: Potential double free of buffer during string decoding
Product: [Other] Security Response Reporter: Avinash Hanwate <ahanwate>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: apevec, code, eglynn, fedora, jjoyce, jschluet, lhh, mail, mburns, python-sig, rhos-maint, spower
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: ujson 5.4.0 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-12-10 01:03:00 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2106986, 2106987, 2106988, 2106989, 2106991    
Bug Blocks: 2103714    

Description Avinash Hanwate 2022-07-07 04:34:51 UTC
UltraJSON is a fast JSON encoder and decoder written in pure C with bindings for Python 3.7+. In versions prior to 5.4.0 an error occurring while reallocating a buffer for string decoding can cause the buffer to get freed twice. Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. This issue has been resolved in version 5.4.0 and all users should upgrade to UltraJSON 5.4.0. There are no known workarounds for this issue.

https://github.com/ultrajson/ultrajson/security/advisories/GHSA-fm67-cv37-96ff
https://github.com/ultrajson/ultrajson/commit/9c20de0f77b391093967e25d01fb48671104b15b

Comment 1 Avinash Hanwate 2022-07-14 05:14:43 UTC
Created python-ujson tracking bugs for this issue:

Affects: epel-all [bug 2106987]
Affects: fedora-all [bug 2106986]
Affects: openstack-rdo [bug 2106988]

Comment 3 errata-xmlrpc 2022-12-07 19:25:31 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 16.2

Via RHSA-2022:8850 https://access.redhat.com/errata/RHSA-2022:8850

Comment 4 errata-xmlrpc 2022-12-07 20:26:49 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 16.1

Via RHSA-2022:8864 https://access.redhat.com/errata/RHSA-2022:8864

Comment 5 Product Security DevOps Team 2022-12-10 01:02:58 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-31117