Bugzilla – Bug 1171479
VUL-0: CVE-2020-12762: json-c,libfastjson: integer overflow and out-of-bounds write via a large JSON file
Last modified: 2024-07-19 12:34:44 UTC
CVE-2020-12762 json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-12762 http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-12762.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12762 https://github.com/json-c/json-c/pull/592
Tracked as affected: SLE11,12 and 15 backports are available at [1] [1] https://github.com/json-c/json-c/pull/608
(In reply to Alexandros Toptsoglou from comment #1) > Tracked as affected: > > SLE11,12 and 15 > > backports are available at [1] > > [1] https://github.com/json-c/json-c/pull/608 Correction SLE11-SP3, SLE12 and SLE15
openSUSE-SU-2022:0184-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1171479 CVE References: CVE-2020-12762 JIRA References: Sources used: openSUSE Leap 15.3 (src): json-c-0.13-3.3.1
SUSE-SU-2022:0184-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1171479 CVE References: CVE-2020-12762 JIRA References: Sources used: SUSE MicroOS 5.1 (src): json-c-0.13-3.3.1 SUSE MicroOS 5.0 (src): json-c-0.13-3.3.1 SUSE Manager Server 4.1 (src): json-c-0.13-3.3.1 SUSE Manager Retail Branch Server 4.1 (src): json-c-0.13-3.3.1 SUSE Manager Proxy 4.1 (src): json-c-0.13-3.3.1 SUSE Linux Enterprise Server for SAP 15-SP2 (src): json-c-0.13-3.3.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): json-c-0.13-3.3.1 SUSE Linux Enterprise Server for SAP 15 (src): json-c-0.13-3.3.1 SUSE Linux Enterprise Server 15-SP2-LTSS (src): json-c-0.13-3.3.1 SUSE Linux Enterprise Server 15-SP2-BCL (src): json-c-0.13-3.3.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): json-c-0.13-3.3.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): json-c-0.13-3.3.1 SUSE Linux Enterprise Server 15-LTSS (src): json-c-0.13-3.3.1 SUSE Linux Enterprise Module for Basesystem 15-SP4 (src): json-c-0.13-3.3.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): json-c-0.13-3.3.1 SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src): json-c-0.13-3.3.1 SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src): json-c-0.13-3.3.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): json-c-0.13-3.3.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): json-c-0.13-3.3.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): json-c-0.13-3.3.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): json-c-0.13-3.3.1 SUSE Enterprise Storage 7 (src): json-c-0.13-3.3.1 SUSE Enterprise Storage 6 (src): json-c-0.13-3.3.1 SUSE CaaS Platform 4.0 (src): json-c-0.13-3.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-SU-2022:0184-2: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1171479 CVE References: CVE-2020-12762 JIRA References: Sources used: openSUSE Leap 15.4 (src): json-c-0.13-3.3.1
SUSE-SU-2022:0184-2: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1171479 CVE References: CVE-2020-12762 JIRA References: Sources used: SUSE Linux Enterprise Realtime Extension 15-SP2 (src): json-c-0.13-3.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:3001-1: An update that fixes one vulnerability, contains one feature is now available. Category: security (important) Bug References: 1171479 CVE References: CVE-2020-12762 JIRA References: PED-1778 Sources used: SUSE OpenStack Cloud Crowbar 9 (src): json-c-0.12.1-4.3.1 SUSE OpenStack Cloud 9 (src): json-c-0.12.1-4.3.1 SUSE Linux Enterprise Software Development Kit 12-SP5 (src): json-c-0.12.1-4.3.1 SUSE Linux Enterprise Server for SAP 12-SP4 (src): json-c-0.12.1-4.3.1 SUSE Linux Enterprise Server 12-SP5 (src): json-c-0.12.1-4.3.1 SUSE Linux Enterprise Server 12-SP4-LTSS (src): json-c-0.12.1-4.3.1 SUSE Linux Enterprise Server 12-SP3-BCL (src): json-c-0.12.1-4.3.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): json-c-0.12.1-4.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
done
Also looks affected: SUSE:SLE-15-SP4:GA/libfastjson 0.99.9 as per statement and fix https://github.com/rsyslog/libfastjson/commit/f51fcd59a8bbeb60eaf8ae0e398556be2fa3317a v0.99.9.1...v1.2304.0 Added to SLE via jsc#SLE-21679, unsure if this is in a product. No SLE bugowner known. Assigning to SLE rsyslog maintainer, community maintainer is not in bugzilla
https://build.opensuse.org/request/show/1084479
(In reply to Andreas Stieger from comment #24) > Also looks affected: SUSE:SLE-15-SP4:GA/libfastjson 0.99.9 as per statement > and fix > https://github.com/rsyslog/libfastjson/commit/ > f51fcd59a8bbeb60eaf8ae0e398556be2fa3317a > v0.99.9.1...v1.2304.0 > Added to SLE via jsc#SLE-21679, unsure if this is in a product. > No SLE bugowner known. Assigning to SLE rsyslog maintainer, community > maintainer is not in bugzilla Patch submitted: https://build.suse.de/request/show/297086 reassigning to security-team to wrap it up.
TW: https://build.opensuse.org/request/show/1084815
SUSE-SU-2023:2135-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1171479 CVE References: CVE-2020-12762 Sources used: openSUSE Leap 15.4 (src): libfastjson-0.99.9-150400.3.3.1 Basesystem Module 15-SP4 (src): libfastjson-0.99.9-150400.3.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:1775-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1171479 CVE References: CVE-2020-12762 Maintenance Incident: [SUSE:Maintenance:33982](https://smelt.suse.de/incident/33982/) Sources used: SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): libfastjson-0.99.8-150000.3.3.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): libfastjson-0.99.8-150000.3.3.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): libfastjson-0.99.8-150000.3.3.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): libfastjson-0.99.8-150000.3.3.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): libfastjson-0.99.8-150000.3.3.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): libfastjson-0.99.8-150000.3.3.1 SUSE Enterprise Storage 7.1 (src): libfastjson-0.99.8-150000.3.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
reassigning to security team
SUSE-SU-2024:1846-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1171479 CVE References: CVE-2020-12762 Maintenance Incident: [SUSE:Maintenance:33981](https://smelt.suse.de/incident/33981/) Sources used: SUSE Linux Enterprise High Performance Computing 12 SP5 (src): libfastjson-0.99.8-3.6.1 SUSE Linux Enterprise Server 12 SP5 (src): libfastjson-0.99.8-3.6.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): libfastjson-0.99.8-3.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
All done, closing.