{"id":"MGASA-2014-0286","summary":"Updated python-simplejson package fixes security vulnerability","details":"Python 2 and 3 are susceptible to arbitrary process memory reading by a user\nor adversary due to a bug in the _json module caused by insufficient bounds\nchecking. The bug is caused by allowing the user to supply a negative value\nthat is used as an array index, causing the scanstring function to access\nprocess memory outside of the string it is intended to access\n(CVE-2014-4616).\n\nThis issue also affected the python-simplejson package, which has been\npatched to fix the bug.\n","modified":"2026-04-16T06:26:11.016760709Z","published":"2014-07-08T22:38:10Z","upstream":["CVE-2014-4616"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0286.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=13601"},{"type":"REPORT","url":"http://bugs.python.org/issue21529"},{"type":"WEB","url":"http://openwall.com/lists/oss-security/2014/06/24/7"},{"type":"WEB","url":"https://lists.fedoraproject.org/pipermail/package-announce/2014-June/134761.html"}],"affected":[{"package":{"name":"python-simplejson","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/python-simplejson?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.6.0-2.1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0286.json"}},{"package":{"name":"python-simplejson","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/python-simplejson?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.3.0-3.1.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0286.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}