{"id":"CVE-2015-8863","details":"Off-by-one error in the tokenadd function in jv_parse.c in jq allows remote attackers to cause a denial of service (crash) via a long JSON-encoded number, which triggers a heap-based buffer overflow.","modified":"2026-04-16T06:18:20.471578976Z","published":"2016-05-06T17:59:03Z","related":["openSUSE-SU-2024:10409-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1098.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1099.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1106.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201612-20"},{"type":"FIX","url":"https://github.com/stedolan/jq/commit/8eb1367ca44e772963e704a700ef72ae2e12babd"},{"type":"REPORT","url":"https://github.com/stedolan/jq/issues/995"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00012.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00014.html"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2016/04/23/1"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2016/04/23/2"},{"type":"WEB","url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=802231"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}