json-c is vulnerable to arbitrary code execution. The vulnerability exists through an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.
cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
github.com/json-c/json-c/pull/592
github.com/rsyslog/libfastjson/issues/161
lists.debian.org/debian-lts-announce/2020/05/msg00032.html
lists.debian.org/debian-lts-announce/2020/05/msg00034.html
lists.debian.org/debian-lts-announce/2020/07/msg00031.html
lists.fedoraproject.org/archives/list/[email protected]/message/CBR36IXYBHITAZFB5PFBJTED22WO5ONB/
lists.fedoraproject.org/archives/list/[email protected]/message/CQQRRGBQCAWNCCJ2HN3W5SSCZ4QGMXQI/
lists.fedoraproject.org/archives/list/[email protected]/message/W226TSCJBEOXDUFVKNWNH7ETG7AR6MCS/
security.gentoo.org/glsa/202006-13
security.netapp.com/advisory/ntap-20210521-0001/
usn.ubuntu.com/4360-1/
usn.ubuntu.com/4360-4/
www.debian.org/security/2020/dsa-4741