Bugzilla – Bug 1014176
VUL-1: CVE-2016-4074: jq: stack exhaustion using jv_dump_term() function
Last modified: 2022-02-13 11:15:25 UTC
+++ This bug was initially created as a clone of Bug #976992 +++ stack exhaustion using jv_dump_term() function CVE-2016-4074: http://seclists.org/oss-sec/2016/q2/140 There was previously no patch, there is one now: https://github.com/stedolan/jq/issues/1136 Reproducer: https://gist.githubusercontent.com/gaa-cifasis/b064ac55dd2a6660ebcd1cbbc72f3939/raw/f6d7d34674e47d777372082d823ac5faa39c9176/qcufnzxcnp.json.4167733746247029131 References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-4074 http://seclists.org/oss-sec/2016/q2/141
This is 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C) on NVD, vector is untrusted JSON input
First of all I don't really see the security aspect, is any code execution possible here? Also, I only see a patch in an unofficial fork: https://github.com/wmark/jq/commit/2d38a12d686a5156d4e7afb1fed7851805590582 is that what you meant as fix available?
According to https://github.com/NixOS/nixpkgs/pull/18908/commits/c38d3b64e457537eee3db3cabff0e7950aff5fc7 the NixOS project is using this patch: https://patch-diff.githubusercontent.com/raw/stedolan/jq/pull/1214.diff
(In reply to Ismail Donmez from comment #2) > First of all I don't really see the security aspect, is any code execution > possible here? The affected security goal for this issue is availability. > Also, I only see a patch in an unofficial fork: > https://github.com/wmark/jq/commit/2d38a12d686a5156d4e7afb1fed7851805590582 > is that what you meant as fix available? Yes I was referring this proposed fix, to be investigated.
Upstream PR is https://github.com/stedolan/jq/pull/1214 and is still open.
bugbot adjusting priority
On SUSE products and the openSUSE distribution, this issue is considered to have very low impact. The CVE was assigned for the scenario of an unattended process accepting untrusted input over the network. This issue may be fixed in a future update.
The upstream PR (see URL field) was just merged.
This is an autogenerated message for OBS integration: This bug (1014176) was mentioned in https://build.opensuse.org/request/show/454381 Factory / jq
Factory fixed, leaving open for Nathan to fix for Storage_4 product.
MR is open https://build.suse.de/request/show/127987 Re-assigning to security team.
openSUSE-SU-2017:2833-1: An update that solves one vulnerability and has one errata is now available. Category: security (low) Bug References: 1014176,1017157 CVE References: CVE-2016-4074 Sources used: openSUSE Leap 42.2 (src): jq-1.5-8.3.1
openSUSE-SU-2017:2834-1: An update that solves one vulnerability and has one errata is now available. Category: security (low) Bug References: 1014176,1017157 CVE References: CVE-2016-4074 Sources used: SUSE Package Hub for SUSE Linux Enterprise 12 (src): jq-1.5-5.1
SUSE-SU-2017:2950-1: An update that solves one vulnerability and has one errata is now available. Category: security (moderate) Bug References: 1014176,1017157 CVE References: CVE-2016-4074 Sources used: SUSE Enterprise Storage 4 (src): jq-1.5-3.5.7
released