It was discovered that jq did not perform sufficient bounds checking, resulting in unbounded resource consumption. An attacker could use this vulnerability to cause a denial of service.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "1.3-1.1ubuntu1.1+esm3", "binary_name": "jq" }, { "binary_version": "1.3-1.1ubuntu1.1+esm3", "binary_name": "jq-dbgsym" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "1.5+dfsg-1ubuntu0.1+esm2", "binary_name": "jq" }, { "binary_version": "1.5+dfsg-1ubuntu0.1+esm2", "binary_name": "jq-dbgsym" } ] }