Debian Package Tracker
Register | Log in
Subscribe

ujson

Choose email to subscribe with

general
  • source: ujson (main)
  • version: 5.4.0-1
  • maintainer: Debian Python Team (DMD)
  • uploaders: Mo Zhou [DMD]
  • arch: any
  • std-ver: 4.5.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.35-1
  • o-o-sec: 1.35-1+deb9u1
  • oldstable: 1.35-3
  • stable: 4.0.2-1
  • testing: 5.4.0-1
  • unstable: 5.4.0-1
versioned links
  • 1.35-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.35-1+deb9u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.35-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.0.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.4.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • python3-ujson
action needed
Debci reports failed tests high
  • unstable: fail (log)
    The tests ran in 0:00:47
    Last run: 2020-05-14T16:03:58.000Z
    Previous status: neutral

Created: 2020-05-14 Last update: 2022-08-14 03:35
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2022-07-13 Last update: 2022-08-14 00:32
lintian reports 2 warnings normal
Lintian reports 2 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2022-07-30 Last update: 2022-07-30 12:17
3 low-priority security issues in bullseye low

There are 3 open security issues in bullseye.

3 issues left for the package maintainer to handle:
  • CVE-2021-45958: (needs triaging) UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation.
  • CVE-2022-31116: (needs triaging) UltraJSON is a fast JSON encoder and decoder written in pure C with bindings for Python 3.7+. Affected versions were found to improperly decode certain characters. JSON strings that contain escaped surrogate characters not part of a proper surrogate pair were decoded incorrectly. Besides corrupting strings, this allowed for potential key confusion and value overwriting in dictionaries. All users parsing JSON from untrusted sources are vulnerable. From version 5.4.0, UltraJSON decodes lone surrogates in the same way as the standard library's `json` module does, preserving them in the parsed output. Users are advised to upgrade. There are no known workarounds for this issue.
  • CVE-2022-31117: (needs triaging) UltraJSON is a fast JSON encoder and decoder written in pure C with bindings for Python 3.7+. In versions prior to 5.4.0 an error occurring while reallocating a buffer for string decoding can cause the buffer to get freed twice. Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. This issue has been resolved in version 5.4.0 and all users should upgrade to UltraJSON 5.4.0. There are no known workarounds for this issue.

You can find information about how to handle these issues in the security team's documentation.

Created: 2022-07-04 Last update: 2022-08-01 13:40
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.5.1).
Created: 2020-11-17 Last update: 2022-07-07 15:11
news
[rss feed]
  • [2022-07-13] ujson 5.4.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-07-07] Accepted ujson 5.4.0-1 (source) into unstable (Mo Zhou)
  • [2022-06-05] ujson 5.3.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-05-31] Accepted ujson 5.3.0-1 (source) into unstable (Mo Zhou)
  • [2022-04-15] ujson 5.2.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-04-08] Accepted ujson 5.2.0-1 (source) into unstable (Mo Zhou)
  • [2022-02-26] Accepted ujson 1.35-1+deb9u1 (source) into oldoldstable (Anton Gladky)
  • [2022-01-10] ujson 5.1.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-01-04] Accepted ujson 5.1.0-1 (source) into unstable (Mo Zhou)
  • [2021-11-18] ujson 4.2.0-1 MIGRATED to testing (Debian testing watch)
  • [2021-11-12] Accepted ujson 4.2.0-1 (source) into unstable (Mo Zhou)
  • [2021-02-27] ujson 4.0.2-1 MIGRATED to testing (Debian testing watch)
  • [2021-02-17] Accepted ujson 4.0.2-1 (source) into unstable (Mo Zhou)
  • [2020-10-20] ujson 4.0.1-1 MIGRATED to testing (Debian testing watch)
  • [2020-10-15] Accepted ujson 4.0.1-1 (source) into unstable (Mo Zhou)
  • [2019-12-23] ujson 1.35-4 MIGRATED to testing (Debian testing watch)
  • [2019-12-13] Accepted ujson 1.35-4 (source) into unstable (Sandro Tosi)
  • [2018-08-24] ujson 1.35-3 MIGRATED to testing (Debian testing watch)
  • [2018-08-18] Accepted ujson 1.35-3 (source amd64) into unstable (Mo Zhou) (signed by: Aron Xu)
  • [2018-01-29] ujson 1.35-2 MIGRATED to testing (Debian testing watch)
  • [2018-01-24] Accepted ujson 1.35-2 (source amd64) into unstable (Sandro Tosi)
  • [2016-06-20] ujson 1.35-1 MIGRATED to testing (Debian testing watch)
  • [2016-06-14] Accepted ujson 1.35-1 (source amd64) into unstable (Sandro Tosi)
  • [2015-07-27] ujson 1.33-1 MIGRATED to testing (Britney)
  • [2015-07-16] Accepted ujson 1.33-1 (source amd64) into unstable, unstable (Sandro Tosi)
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian (0, 2)
  • buildd: logs, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 5.4.0-1

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing