First published: Sun Oct 18 2015(Updated: )
Off-by-one error in the tokenadd function in jv_parse.c in jq allows remote attackers to cause a denial of service (crash) via a long JSON-encoded number, which triggers a heap-based buffer overflow.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/jq | <=1.5+dfsg-1<=1.4-2.1 | |
debian/jq | 1.6-2.1 1.7.1-3 | |
SUSE Linux | =42.1 | |
SUSE Linux | =13.2 | |
Ubuntu Jq | <=1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8863 has a medium severity rating because it can lead to a denial of service through a heap-based buffer overflow.
To fix CVE-2015-8863, upgrade jq to version 1.6-2.1 or later if you are using Debian or ensure you are using a version higher than 1.5 in other distributions.
CVE-2015-8863 affects jq versions up to and including 1.5 and versions of jq used in specific distributions like Debian and openSUSE.
CVE-2015-8863 allows remote attackers to execute a denial of service attack by exploiting an off-by-one error in the tokenadd function.
While CVE-2015-8863 has been addressed in newer versions, systems running vulnerable versions remain at risk if not updated.