Bug 1171479 (CVE-2020-12762) - VUL-0: CVE-2020-12762: json-c,libfastjson: integer overflow and out-of-bounds write via a large JSON file
Summary: VUL-0: CVE-2020-12762: json-c,libfastjson: integer overflow and out-of-bounds...
Status: RESOLVED FIXED
Alias: CVE-2020-12762
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P2 - High : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/259359/
Whiteboard: CVSSv3.1:SUSE:CVE-2020-12762:7.8:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2020-05-11 16:02 UTC by Alexandros Toptsoglou
Modified: 2024-07-19 12:34 UTC (History)
7 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexandros Toptsoglou 2020-05-11 16:02:19 UTC
CVE-2020-12762

json-c through 0.14 has an integer overflow and out-of-bounds write via a large
JSON file, as demonstrated by printbuf_memappend.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-12762
http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-12762.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12762
https://github.com/json-c/json-c/pull/592
Comment 1 Alexandros Toptsoglou 2020-05-27 14:57:05 UTC
Tracked as affected:

SLE11,12 and 15 

backports are available at [1] 

[1] https://github.com/json-c/json-c/pull/608
Comment 2 Alexandros Toptsoglou 2020-05-27 14:58:18 UTC
(In reply to Alexandros Toptsoglou from comment #1)
> Tracked as affected:
> 
> SLE11,12 and 15 
> 
> backports are available at [1] 
> 
> [1] https://github.com/json-c/json-c/pull/608

Correction 

SLE11-SP3, SLE12 and SLE15
Comment 8 Swamp Workflow Management 2022-01-25 20:24:12 UTC
openSUSE-SU-2022:0184-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1171479
CVE References: CVE-2020-12762
JIRA References: 
Sources used:
openSUSE Leap 15.3 (src):    json-c-0.13-3.3.1
Comment 9 Swamp Workflow Management 2022-01-25 20:28:13 UTC
SUSE-SU-2022:0184-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1171479
CVE References: CVE-2020-12762
JIRA References: 
Sources used:
SUSE MicroOS 5.1 (src):    json-c-0.13-3.3.1
SUSE MicroOS 5.0 (src):    json-c-0.13-3.3.1
SUSE Manager Server 4.1 (src):    json-c-0.13-3.3.1
SUSE Manager Retail Branch Server 4.1 (src):    json-c-0.13-3.3.1
SUSE Manager Proxy 4.1 (src):    json-c-0.13-3.3.1
SUSE Linux Enterprise Server for SAP 15-SP2 (src):    json-c-0.13-3.3.1
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    json-c-0.13-3.3.1
SUSE Linux Enterprise Server for SAP 15 (src):    json-c-0.13-3.3.1
SUSE Linux Enterprise Server 15-SP2-LTSS (src):    json-c-0.13-3.3.1
SUSE Linux Enterprise Server 15-SP2-BCL (src):    json-c-0.13-3.3.1
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    json-c-0.13-3.3.1
SUSE Linux Enterprise Server 15-SP1-BCL (src):    json-c-0.13-3.3.1
SUSE Linux Enterprise Server 15-LTSS (src):    json-c-0.13-3.3.1
SUSE Linux Enterprise Module for Basesystem 15-SP4 (src):    json-c-0.13-3.3.1
SUSE Linux Enterprise Module for Basesystem 15-SP3 (src):    json-c-0.13-3.3.1
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src):    json-c-0.13-3.3.1
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src):    json-c-0.13-3.3.1
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    json-c-0.13-3.3.1
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src):    json-c-0.13-3.3.1
SUSE Linux Enterprise High Performance Computing 15-LTSS (src):    json-c-0.13-3.3.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS (src):    json-c-0.13-3.3.1
SUSE Enterprise Storage 7 (src):    json-c-0.13-3.3.1
SUSE Enterprise Storage 6 (src):    json-c-0.13-3.3.1
SUSE CaaS Platform 4.0 (src):    json-c-0.13-3.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Swamp Workflow Management 2022-02-17 11:19:48 UTC
openSUSE-SU-2022:0184-2: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1171479
CVE References: CVE-2020-12762
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    json-c-0.13-3.3.1
Comment 11 Swamp Workflow Management 2022-02-17 11:20:40 UTC
SUSE-SU-2022:0184-2: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1171479
CVE References: CVE-2020-12762
JIRA References: 
Sources used:
SUSE Linux Enterprise Realtime Extension 15-SP2 (src):    json-c-0.13-3.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 20 Swamp Workflow Management 2022-09-02 16:25:38 UTC
SUSE-SU-2022:3001-1: An update that fixes one vulnerability, contains one feature is now available.

Category: security (important)
Bug References: 1171479
CVE References: CVE-2020-12762
JIRA References: PED-1778
Sources used:
SUSE OpenStack Cloud Crowbar 9 (src):    json-c-0.12.1-4.3.1
SUSE OpenStack Cloud 9 (src):    json-c-0.12.1-4.3.1
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    json-c-0.12.1-4.3.1
SUSE Linux Enterprise Server for SAP 12-SP4 (src):    json-c-0.12.1-4.3.1
SUSE Linux Enterprise Server 12-SP5 (src):    json-c-0.12.1-4.3.1
SUSE Linux Enterprise Server 12-SP4-LTSS (src):    json-c-0.12.1-4.3.1
SUSE Linux Enterprise Server 12-SP3-BCL (src):    json-c-0.12.1-4.3.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    json-c-0.12.1-4.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 23 Marcus Meissner 2022-09-30 07:02:21 UTC
done
Comment 24 Andreas Stieger 2023-05-03 20:08:08 UTC
Also looks affected: SUSE:SLE-15-SP4:GA/libfastjson 0.99.9 as per statement and fix https://github.com/rsyslog/libfastjson/commit/f51fcd59a8bbeb60eaf8ae0e398556be2fa3317a
v0.99.9.1...v1.2304.0  
Added to SLE via jsc#SLE-21679, unsure if this is in a product.
No SLE bugowner known. Assigning to SLE rsyslog maintainer, community maintainer is not in bugzilla
Comment 25 Andreas Stieger 2023-05-03 20:17:07 UTC
https://build.opensuse.org/request/show/1084479
Comment 26 Thomas Blume 2023-05-04 07:32:37 UTC
(In reply to Andreas Stieger from comment #24)
> Also looks affected: SUSE:SLE-15-SP4:GA/libfastjson 0.99.9 as per statement
> and fix
> https://github.com/rsyslog/libfastjson/commit/
> f51fcd59a8bbeb60eaf8ae0e398556be2fa3317a
> v0.99.9.1...v1.2304.0  
> Added to SLE via jsc#SLE-21679, unsure if this is in a product.
> No SLE bugowner known. Assigning to SLE rsyslog maintainer, community
> maintainer is not in bugzilla

Patch submitted:

https://build.suse.de/request/show/297086

reassigning to security-team to wrap it up.
Comment 27 Andreas Stieger 2023-05-04 17:31:31 UTC
TW: https://build.opensuse.org/request/show/1084815
Comment 28 Maintenance Automation 2023-05-09 12:30:03 UTC
SUSE-SU-2023:2135-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1171479
CVE References: CVE-2020-12762
Sources used:
openSUSE Leap 15.4 (src): libfastjson-0.99.9-150400.3.3.1
Basesystem Module 15-SP4 (src): libfastjson-0.99.9-150400.3.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 35 Maintenance Automation 2024-05-24 16:30:08 UTC
SUSE-SU-2024:1775-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1171479
CVE References: CVE-2020-12762
Maintenance Incident: [SUSE:Maintenance:33982](https://smelt.suse.de/incident/33982/)
Sources used:
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src):
 libfastjson-0.99.8-150000.3.3.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src):
 libfastjson-0.99.8-150000.3.3.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src):
 libfastjson-0.99.8-150000.3.3.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src):
 libfastjson-0.99.8-150000.3.3.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src):
 libfastjson-0.99.8-150000.3.3.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src):
 libfastjson-0.99.8-150000.3.3.1
SUSE Enterprise Storage 7.1 (src):
 libfastjson-0.99.8-150000.3.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 36 Thomas Blume 2024-05-24 18:20:58 UTC
reassigning to security team
Comment 37 Maintenance Automation 2024-05-29 20:30:07 UTC
SUSE-SU-2024:1846-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1171479
CVE References: CVE-2020-12762
Maintenance Incident: [SUSE:Maintenance:33981](https://smelt.suse.de/incident/33981/)
Sources used:
SUSE Linux Enterprise High Performance Computing 12 SP5 (src):
 libfastjson-0.99.8-3.6.1
SUSE Linux Enterprise Server 12 SP5 (src):
 libfastjson-0.99.8-3.6.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src):
 libfastjson-0.99.8-3.6.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 38 Andrea Mattiazzo 2024-07-19 12:34:44 UTC
All done, closing.