Debian Package Tracker
Register | Log in
Subscribe

cjson

Choose email to subscribe with

general
  • source: cjson (main)
  • version: 1.7.18-3.1
  • maintainer: Maytham Alsudany (DMD)
  • arch: any
  • std-ver: 4.7.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.7.14-1+deb11u1
  • o-o-sec: 1.7.14-1+deb11u2
  • o-o-p-u: 1.7.14-1+deb11u1
  • oldstable: 1.7.15-1+deb12u2
  • stable: 1.7.18-3.1
  • testing: 1.7.18-3.1
  • unstable: 1.7.18-3.1
versioned links
  • 1.7.14-1+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.7.14-1+deb11u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.7.15-1+deb12u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.7.18-3.1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libcjson-dev
  • libcjson1
action needed
A new upstream version is available: 1.7.19 high
A new upstream version 1.7.19 is available, you should consider packaging it.
Created: 2025-09-10 Last update: 2025-09-12 04:00
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2025-57052: cJSON 1.5.0 through 1.7.18 allows out-of-bounds access via the decode_array_index_from_pointer function in cJSON_Utils.c, allowing remote attackers to bypass array bounds checking and access restricted data via malformed JSON pointer strings containing alphanumeric characters.
Created: 2025-09-03 Last update: 2025-09-09 15:59
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2025-57052: cJSON 1.5.0 through 1.7.18 allows out-of-bounds access via the decode_array_index_from_pointer function in cJSON_Utils.c, allowing remote attackers to bypass array bounds checking and access restricted data via malformed JSON pointer strings containing alphanumeric characters.
Created: 2025-09-03 Last update: 2025-09-09 15:59
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2025-57052: cJSON 1.5.0 through 1.7.18 allows out-of-bounds access via the decode_array_index_from_pointer function in cJSON_Utils.c, allowing remote attackers to bypass array bounds checking and access restricted data via malformed JSON pointer strings containing alphanumeric characters.
Created: 2025-09-03 Last update: 2025-09-09 15:59
1 security issue in bullseye high

There is 1 open security issue in bullseye.

1 important issue:
  • CVE-2025-57052: cJSON 1.5.0 through 1.7.18 allows out-of-bounds access via the decode_array_index_from_pointer function in cJSON_Utils.c, allowing remote attackers to bypass array bounds checking and access restricted data via malformed JSON pointer strings containing alphanumeric characters.
Created: 2025-09-03 Last update: 2025-09-09 15:59
1 security issue in bookworm high

There is 1 open security issue in bookworm.

1 important issue:
  • CVE-2025-57052: cJSON 1.5.0 through 1.7.18 allows out-of-bounds access via the decode_array_index_from_pointer function in cJSON_Utils.c, allowing remote attackers to bypass array bounds checking and access restricted data via malformed JSON pointer strings containing alphanumeric characters.
Created: 2025-09-03 Last update: 2025-09-09 15:59
debian/patches: 1 patch to forward upstream low

Among the 1 debian patch available in version 1.7.18-3.1 of the package, we noticed the following issues:

  • 1 patch where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2025-06-15 Last update: 2025-06-15 00:01
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.7.0).
Created: 2025-02-21 Last update: 2025-06-14 20:03
news
[rss feed]
  • [2025-07-07] cjson 1.7.18-3.1 MIGRATED to testing (Debian testing watch)
  • [2025-06-19] Accepted cjson 1.7.15-1+deb12u3 (source) into proposed-updates (Debian FTP Masters) (signed by: Adrian Bunk)
  • [2025-06-15] Accepted cjson 1.7.14-1+deb11u2 (source) into oldstable-security (Adrian Bunk)
  • [2025-06-14] Accepted cjson 1.7.18-3.1 (source) into unstable (Adrian Bunk)
  • [2024-10-11] Accepted cjson 1.7.15-1+deb12u2 (source) into proposed-updates (Debian FTP Masters) (signed by: Boyuan Yang)
  • [2024-07-01] Accepted cjson 1.7.14-1+deb11u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Maytham Alsudany)
  • [2024-06-25] cjson 1.7.18-3 MIGRATED to testing (Debian testing watch)
  • [2024-06-23] Accepted cjson 1.7.18-3 (source) into unstable (Maytham Alsudany)
  • [2024-06-23] Accepted cjson 1.7.18-2 (source) into unstable (Maytham Alsudany)
  • [2024-06-22] Accepted cjson 1.7.18-1 (source) into unstable (Maytham Alsudany) (signed by: bage@debian.org)
  • [2024-06-19] Accepted cjson 1.7.15-1+deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: bage@debian.org)
  • [2024-03-28] cjson 1.7.17-2 MIGRATED to testing (Debian testing watch)
  • [2024-03-22] Accepted cjson 1.7.17-2 (source) into unstable (Boyuan Yang)
  • [2024-01-04] cjson 1.7.17-1 MIGRATED to testing (Debian testing watch)
  • [2023-12-30] Accepted cjson 1.7.10-1.1+deb10u2 (source) into oldoldstable (Thorsten Alteholz)
  • [2023-12-28] Accepted cjson 1.7.17-1 (source) into unstable (Boyuan Yang)
  • [2023-11-07] cjson 1.7.16-2 MIGRATED to testing (Debian testing watch)
  • [2023-11-01] Accepted cjson 1.7.16-2 (source) into unstable (Boyuan Yang)
  • [2023-07-17] cjson 1.7.16-1 MIGRATED to testing (Debian testing watch)
  • [2023-07-11] Accepted cjson 1.7.16-1 (source) into unstable (Boyuan Yang)
  • [2021-09-04] cjson 1.7.15-1 MIGRATED to testing (Debian testing watch)
  • [2021-08-29] Accepted cjson 1.7.15-1 (source) into unstable (Boyuan Yang)
  • [2021-01-30] Accepted cjson 1.7.10-1.1+deb10u1 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Boyuan Yang)
  • [2020-09-12] cjson 1.7.14-1 MIGRATED to testing (Debian testing watch)
  • [2020-09-06] Accepted cjson 1.7.14-1 (source) into unstable (Boyuan Yang)
  • [2020-05-29] cjson 1.7.13-1 MIGRATED to testing (Debian testing watch)
  • [2020-05-23] Accepted cjson 1.7.13-1 (source) into unstable (Boyuan Yang)
  • [2020-05-22] Accepted cjson 1.7.10-2 (source) into unstable (Boyuan Yang)
  • [2019-05-21] cjson 1.7.10-1.1 MIGRATED to testing (Debian testing watch)
  • [2019-05-16] Accepted cjson 1.7.10-1.1 (source amd64) into unstable (Gordon Ball) (signed by: Yanhao Mo)
  • 1
  • 2
bugs [bug history graph]
  • all: 2
  • RC: 0
  • I&N: 2
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.7.18-3.1
  • 1 bug

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing