{ "schema_version": "1.4.0", "id": "GHSA-j4rg-46c3-r5vq", "modified": "2022-05-14T02:08:03Z", "published": "2022-05-14T02:08:03Z", "aliases": [ "CVE-2015-8863" ], "details": "Off-by-one error in the tokenadd function in jv_parse.c in jq allows remote attackers to cause a denial of service (crash) via a long JSON-encoded number, which triggers a heap-based buffer overflow.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8863" }, { "type": "WEB", "url": "https://github.com/stedolan/jq/issues/995" }, { "type": "WEB", "url": "https://github.com/stedolan/jq/commit/8eb1367ca44e772963e704a700ef72ae2e12babd" }, { "type": "WEB", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=802231" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201612-20" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00012.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00014.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1098.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1099.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1106.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/04/23/1" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/04/23/2" } ], "database_specific": { "cwe_ids": [ "CWE-119" ], "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-05-06T17:59:00Z" } }