-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat OpenStack Platform 16.2.4 (python-ujson) security update Advisory ID: RHSA-2022:8850-01 Product: Red Hat OpenStack Platform Advisory URL: https://access.redhat.com/errata/RHSA-2022:8850 Issue date: 2022-12-07 CVE Names: CVE-2022-31116 CVE-2022-31117 ==================================================================== 1. Summary: An update for python-ujson is now available for Red Hat OpenStack Platform 16.2.4 (Train) for Red Hat Enterprise Linux (RHEL) 8.4. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenStack Platform 16.2 - ppc64le, x86_64 3. Description: UltraJSON is an ultra fast JSON encoder and decoder Security Fix(es): * improper decoding of escaped surrogate characters may lead to string corruption key confusion or value overwriting (CVE-2022-31116) * Potential double free of buffer during string decoding (CVE-2022-31117) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2104739 - CVE-2022-31117 python-ujson: Potential double free of buffer during string decoding 2104740 - CVE-2022-31116 python-ujson: improper decoding of escaped surrogate characters may lead to string corruption, key confusion or value overwriting 6. Package List: Red Hat OpenStack Platform 16.2: Source: python-ujson-2.0.3-3.el8ost.src.rpm ppc64le: python-ujson-debugsource-2.0.3-3.el8ost.ppc64le.rpm python3-ujson-2.0.3-3.el8ost.ppc64le.rpm python3-ujson-debuginfo-2.0.3-3.el8ost.ppc64le.rpm x86_64: python-ujson-debugsource-2.0.3-3.el8ost.x86_64.rpm python3-ujson-2.0.3-3.el8ost.x86_64.rpm python3-ujson-debuginfo-2.0.3-3.el8ost.x86_64.rpm Red Hat OpenStack Platform 16.2: Source: python-ujson-2.0.3-3.el8ost.src.rpm x86_64: python-ujson-debugsource-2.0.3-3.el8ost.x86_64.rpm python3-ujson-2.0.3-3.el8ost.x86_64.rpm python3-ujson-debuginfo-2.0.3-3.el8ost.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-31116 https://access.redhat.com/security/cve/CVE-2022-31117 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBY5FpU9zjgjWX9erEAQgePQ//R/90C/KkI5xWF5CFQQamrW+QJlgeGt8G jZqqN53fcJ0SDL34KODJmkV0K6fwvrDp1U1Y75Uc5nM/5M1gUfHXxKC9RxT1wCtN qV2LhdlKDcdh7v1UAOGMS7Le58aPJlCbqaisMYJBf3hsGVdWMpNHYHLdGYmOLzGo H/vJP37QeO5GnvVQJ0gnFkGDaBlKsfk3zdsWZ1WQOLBRkWaounNNbMxmjjRcP525 FWHePYjAfkmcVcPl90LDQTDjyx/9dIV45P91VWEsATmOsnu409D5bgKKOcg2XsjD 5ZWsAXgfZkMh9WHGm71WGrfxB5DITxU5nGTIQWprGaUuBy+zSHeMLjbK3cTqeVCp vcIsl4lTVItHked590MLdQBPE5IQP7NI0oM+kfx4L8+XwTmepU/7aCZEYqjmiG3c gXV0AYdbprv95pitfIun1uuJs2/kawqrfIFU2NVhIHELXmmTKk1dFMjIZtye39bR uvhIUBxtsXmNZVkOcNfEaBw6IENxATFJmNkv25d5eApRAcxiIf8Y7WpPHi7oPI4+ adJJKkJUdIiC4cu3smmT7MklyTsf0rwLe5s3StDMtjFDd1BAG4wNICh5gMZKwcEq deWfTW/e+UF0jtqwMgPkp6kO39ww1rWCdNxGdaNZXSztpupoMRarJap5Vcl7tLQb NPlLZF07NJI=Sy8v -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce