Integer Overflow or Wraparound Affecting jq package, versions <0:1.7.1-8.el10_0.1


Severity

Recommended
0.0
medium
0
10

Based on CentOS security rating.

Threat Intelligence

EPSS
0.26% (50th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Integer Overflow or Wraparound vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CENTOS10-JQ-10304527
  • published6 Jun 2025
  • disclosed1 Jan 2024

Introduced: 1 Jan 2024

CVE-2024-23337  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

Upgrade Centos:10 jq to version 0:1.7.1-8.el10_0.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream jq package and not the jq package as distributed by Centos. See How to fix? for Centos:10 relevant fixed versions and status.

jq is a command-line JSON processor. In versions up to and including 1.7.1, an integer overflow arises when assigning value using an index of 2147483647, the signed integer limit. This causes a denial of service. Commit de21386681c0df0104a99d9d09db23a9b2a78b1e contains a patch for the issue.

CVSS Base Scores

version 3.1