CVE-2020-12762

Name
CVE-2020-12762
Description
json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Exploit https://github.com/json-c/json-c/pull/592
MISC https://github.com/rsyslog/libfastjson/issues/161
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CQQRRGBQCAWNCCJ2HN3W5SSCZ4QGMXQI/
vendor-advisory https://usn.ubuntu.com/4360-1/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBR36IXYBHITAZFB5PFBJTED22WO5ONB/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W226TSCJBEOXDUFVKNWNH7ETG7AR6MCS/
mailing-list https://lists.debian.org/debian-lts-announce/2020/05/msg00032.html
mailing-list https://lists.debian.org/debian-lts-announce/2020/05/msg00034.html
vendor-advisory https://usn.ubuntu.com/4360-4/
vendor-advisory https://security.gentoo.org/glsa/202006-13
mailing-list https://lists.debian.org/debian-lts-announce/2020/07/msg00031.html
vendor-advisory https://www.debian.org/security/2020/dsa-4741
CONFIRM https://security.netapp.com/advisory/ntap-20210521-0001/
Third Party Advisory https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
mailing-list https://lists.debian.org/debian-lts-announce/2023/06/msg00023.html
vendor-advisory https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CBR36IXYBHITAZFB5PFBJTED22WO5ONB/
vendor-advisory https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CQQRRGBQCAWNCCJ2HN3W5SSCZ4QGMXQI/
vendor-advisory https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W226TSCJBEOXDUFVKNWNH7ETG7AR6MCS/
af854a3a-2127-422b-91ae-364da2661108 https://lists.debian.org/debian-lts-announce/2025/07/msg00021.html

Match rules

CPE URI Source package Min version Max version
n/a == n/a == n/a

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
libfastjson edge-main 1.2304.0-r0 Ashley Sommer <ashleysommer@gmail.com> fixed
libfastjson 3.22-main 1.2304.0-r0 None fixed
libfastjson 3.21-main 1.2304.0-r0 None fixed
libfastjson 3.20-main 1.2304.0-r0 None fixed
libfastjson 3.19-main 1.2304.0-r0 None fixed
libfastjson 3.18-main 1.2304.0-r0 None fixed
libfastjson 3.17-main 1.2304.0-r0 Ashley Sommer <ashleysommer@gmail.com> fixed
json-c edge-main 0.14-r1 None fixed
json-c 3.22-main 0.14-r1 None fixed
json-c 3.21-main 0.14-r1 None fixed
json-c 3.20-main 0.14-r1 None fixed
json-c 3.19-main 0.14-r1 None fixed
json-c 3.18-main 0.14-r1 None fixed
json-c 3.17-main 0.14-r1 None fixed
json-c 3.12-main 0.14-r1 Natanael Copa <ncopa@alpinelinux.org> fixed
json-c 3.11-main 0.13.1-r1 Natanael Copa <ncopa@alpinelinux.org> fixed
json-c 3.10-main 0.13.1-r1 Natanael Copa <ncopa@alpinelinux.org> fixed