USN-4787-1: jq vulnerability
15 March 2021
jq could be made to crash if it received specially crafted input.
Releases
Packages
- jq - lightweight and flexible command-line JSON processor
Details
It was discovered that jq did not perform sufficient bounds checking,
resulting in unbounded resource consumption. An attacker could use this
vulnerability to cause a denial of service.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
jq
-
1.5+dfsg-1ubuntu0.1+esm2
Available with Ubuntu Pro
Ubuntu 14.04
-
jq
-
1.3-1.1ubuntu1.1+esm3
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.