We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-23337

jq has signed integer overflow in jv.c:jvp_array_write



Description

jq is a command-line JSON processor. In versions up to and including 1.7.1, an integer overflow arises when assigning value using an index of 2147483647, the signed integer limit. This causes a denial of service. Commit de21386681c0df0104a99d9d09db23a9b2a78b1e contains a patch for the issue.

Reserved 2024-01-15 | Published 2025-05-21 | Updated 2025-05-21 | Assigner GitHub_M


MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

Problem types

CWE-190: Integer Overflow or Wraparound

Product status

<= 1.7.1
affected

References

github.com/jqlang/jq/security/advisories/GHSA-2q6r-344g-cx46

github.com/jqlang/jq/issues/3262

github.com/...ommit/de21386681c0df0104a99d9d09db23a9b2a78b1e

cve.org (CVE-2024-23337)

nvd.nist.gov (CVE-2024-23337)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-23337

Support options

Helpdesk Chat, Email, Knowledgebase