ALT-PU-2017-1589-1
Closed vulnerabilities
Published: 2016-05-06
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2015-8863
Off-by-one error in the tokenadd function in jv_parse.c in jq allows remote attackers to cause a denial of service (crash) via a long JSON-encoded number, which triggers a heap-based buffer overflow.
Severity: CRITICAL (10.0)
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: CRITICAL (9.8)
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References:
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00012.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2016-1098.html
- http://rhn.redhat.com/errata/RHSA-2016-1099.html
- http://rhn.redhat.com/errata/RHSA-2016-1106.html
- http://www.openwall.com/lists/oss-security/2016/04/23/1
- http://www.openwall.com/lists/oss-security/2016/04/23/2
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=802231
- https://github.com/stedolan/jq/commit/8eb1367ca44e772963e704a700ef72ae2e12babd
- https://github.com/stedolan/jq/issues/995
- https://security.gentoo.org/glsa/201612-20
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00012.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2016-1098.html
- http://rhn.redhat.com/errata/RHSA-2016-1099.html
- http://rhn.redhat.com/errata/RHSA-2016-1106.html
- http://www.openwall.com/lists/oss-security/2016/04/23/1
- http://www.openwall.com/lists/oss-security/2016/04/23/2
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=802231
- https://github.com/stedolan/jq/commit/8eb1367ca44e772963e704a700ef72ae2e12babd
- https://github.com/stedolan/jq/issues/995
- https://security.gentoo.org/glsa/201612-20