ALT-PU-2019-3283-1
Closed vulnerabilities
Published: 2016-05-06
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2015-8863
Off-by-one error in the tokenadd function in jv_parse.c in jq allows remote attackers to cause a denial of service (crash) via a long JSON-encoded number, which triggers a heap-based buffer overflow.
Severity: CRITICAL (10.0)
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: CRITICAL (9.8)
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References:
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00012.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2016-1098.html
- http://rhn.redhat.com/errata/RHSA-2016-1099.html
- http://rhn.redhat.com/errata/RHSA-2016-1106.html
- http://www.openwall.com/lists/oss-security/2016/04/23/1
- http://www.openwall.com/lists/oss-security/2016/04/23/2
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=802231
- https://github.com/stedolan/jq/commit/8eb1367ca44e772963e704a700ef72ae2e12babd
- https://github.com/stedolan/jq/issues/995
- https://security.gentoo.org/glsa/201612-20
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00012.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2016-1098.html
- http://rhn.redhat.com/errata/RHSA-2016-1099.html
- http://rhn.redhat.com/errata/RHSA-2016-1106.html
- http://www.openwall.com/lists/oss-security/2016/04/23/1
- http://www.openwall.com/lists/oss-security/2016/04/23/2
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=802231
- https://github.com/stedolan/jq/commit/8eb1367ca44e772963e704a700ef72ae2e12babd
- https://github.com/stedolan/jq/issues/995
- https://security.gentoo.org/glsa/201612-20
Published: 2016-05-06
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2016-4074
The jv_dump_term function in jq 1.5 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted JSON file. This issue has been fixed in jq 1.6_rc1-r0.
Severity: HIGH (7.8)
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Severity: HIGH (7.5)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
References:
- http://www.openwall.com/lists/oss-security/2016/04/24/3
- http://www.openwall.com/lists/oss-security/2016/04/24/4
- https://github.com/NixOS/nixpkgs/pull/18908
- https://github.com/hashicorp/consul/issues/10263
- https://github.com/stedolan/jq/
- https://github.com/stedolan/jq/issues/1136
- http://www.openwall.com/lists/oss-security/2016/04/24/3
- http://www.openwall.com/lists/oss-security/2016/04/24/4
- https://github.com/NixOS/nixpkgs/pull/18908
- https://github.com/hashicorp/consul/issues/10263
- https://github.com/stedolan/jq/
- https://github.com/stedolan/jq/issues/1136