Bug 2367807 (CVE-2024-23337)

Summary: CVE-2024-23337 jq: jq has signed integer overflow in jv.c:jvp_array_write
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: adudiak, amctagga, aoconnor, bniver, crizzo, flucifre, gmeno, haoli, hkataria, jajackso, jcammara, jmitchel, jneedle, jtanner, kegrant, koliveir, kshier, mabashia, mbenjamin, mhackett, omaciel, pbraun, shvarugh, simaishi, smcdonal, sostapov, stcannon, teagle, tfister, thavo, vereddy, yguenane
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in jq, a command line JSON processor. An integer overflow can occur when attempting to assign a value using an array index of 2147483647 or when creating an array with 2147483647 elements, the maximum value for a 32-bit signed integer. This issue causes out-of-bounds memory access and results in a denial of service.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2370297, 2370298    
Bug Blocks:    

Description OSIDB Bzimport 2025-05-21 15:01:17 UTC
jq is a command-line JSON processor. In versions up to and including 1.7.1, an integer overflow arises when assigning value using an index of 2147483647, the signed integer limit. This causes a denial of service. Commit de21386681c0df0104a99d9d09db23a9b2a78b1e contains a patch for the issue.

Comment 3 errata-xmlrpc 2025-07-08 11:02:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:10585 https://access.redhat.com/errata/RHSA-2025:10585

Comment 4 errata-xmlrpc 2025-07-08 12:08:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:10613 https://access.redhat.com/errata/RHSA-2025:10613

Comment 5 errata-xmlrpc 2025-07-08 12:24:09 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2025:10616 https://access.redhat.com/errata/RHSA-2025:10616

Comment 6 errata-xmlrpc 2025-07-08 12:30:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2025:10615 https://access.redhat.com/errata/RHSA-2025:10615

Comment 7 errata-xmlrpc 2025-07-08 12:30:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2025:10619 https://access.redhat.com/errata/RHSA-2025:10619

Comment 8 errata-xmlrpc 2025-07-08 12:32:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support

Via RHSA-2025:10621 https://access.redhat.com/errata/RHSA-2025:10621

Comment 9 errata-xmlrpc 2025-07-08 12:33:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2025:10622 https://access.redhat.com/errata/RHSA-2025:10622

Comment 10 errata-xmlrpc 2025-07-08 12:36:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:10618 https://access.redhat.com/errata/RHSA-2025:10618

Comment 11 errata-xmlrpc 2025-07-08 12:39:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service
  Red Hat Enterprise Linux 8.6 Extended Update Support EXTENSION

Via RHSA-2025:10620 https://access.redhat.com/errata/RHSA-2025:10620

Comment 12 errata-xmlrpc 2025-08-05 03:13:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:12882 https://access.redhat.com/errata/RHSA-2025:12882