USN-8202-1

Source
https://ubuntu.com/security/notices/USN-8202-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8202-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-8202-1
Published
2026-04-23T07:35:38Z
Modified
2026-04-24T08:40:11.598600Z
Summary
jq vulnerabilities
Details

It was discovered that jq did not correctly handle certain string concatenations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue was addressed in Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 25.10. (CVE-2026-32316)

It was discovered that jq did not correctly handle recursion in certain circumstances. An attacker could possibly use this issue to cause a denial of service. (CVE-2026-33947)

It was discovered that jq did not correctly handle improperly terminated strings. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue was addressed in Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 25.10. (CVE-2026-33948)

It was discovered that jq did not correctly handle checking certain variable types. An attacker could possibly use this issue to cause a denial of service or leak sensitive information. This issue was addressed in Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 25.10. (CVE-2026-39956)

It was discovered that jq did not correctly handle certain string formatting. An attacker could possibly use this issue to leak sensitive information or cause a denial of service. (CVE-2026-39979)

It was discovered that jq used a fixed seed for hash table operations. An attacker could possibly use this issue to cause a denial of service. This issue was addressed in Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 25.10. (CVE-2026-40164)

References

Affected packages

Ubuntu:22.04:LTS
jq

Package

Name
jq
Purl
pkg:deb/ubuntu/jq@1.6-2.1ubuntu3.2?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6-2.1ubuntu3.2

Affected versions

1.*
1.6-2.1ubuntu2
1.6-2.1ubuntu3
1.6-2.1ubuntu3.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "jq",
            "binary_version": "1.6-2.1ubuntu3.2"
        },
        {
            "binary_name": "libjq1",
            "binary_version": "1.6-2.1ubuntu3.2"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:22.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8202-1.json"
Ubuntu:24.04:LTS
jq

Package

Name
jq
Purl
pkg:deb/ubuntu/jq@1.7.1-3ubuntu0.24.04.2?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.1-3ubuntu0.24.04.2

Affected versions

1.*
1.6-3
1.7-1
1.7.1-2
1.7.1-3
1.7.1-3build1
1.7.1-3ubuntu0.24.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "jq",
            "binary_version": "1.7.1-3ubuntu0.24.04.2"
        },
        {
            "binary_name": "libjq1",
            "binary_version": "1.7.1-3ubuntu0.24.04.2"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:24.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8202-1.json"
Ubuntu:25.10
jq

Package

Name
jq
Purl
pkg:deb/ubuntu/jq@1.8.1-3ubuntu1.1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.1-3ubuntu1.1

Affected versions

1.*
1.7.1-3ubuntu1
1.7.1-6ubuntu1
1.8.1-3ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "jq",
            "binary_version": "1.8.1-3ubuntu1.1"
        },
        {
            "binary_name": "libjq1",
            "binary_version": "1.8.1-3ubuntu1.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:25.10"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8202-1.json"
Ubuntu:Pro:14.04:LTS
jq

Package

Name
jq
Purl
pkg:deb/ubuntu/jq@1.3-1.1ubuntu1.1+esm4?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3-1.1ubuntu1.1+esm4

Affected versions

1.*
1.2-8
1.3-1
1.3-1.1ubuntu1
1.3-1.1ubuntu1.1
1.3-1.1ubuntu1.1+esm3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "jq",
            "binary_version": "1.3-1.1ubuntu1.1+esm4"
        }
    ],
    "availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:Pro:14.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8202-1.json"
Ubuntu:Pro:16.04:LTS
jq

Package

Name
jq
Purl
pkg:deb/ubuntu/jq@1.5+dfsg-1ubuntu0.1+esm4?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5+dfsg-1ubuntu0.1+esm4

Affected versions

1.*
1.4-2.1
1.5+dfsg-1
1.5+dfsg-1ubuntu0.1
1.5+dfsg-1ubuntu0.1+esm2
1.5+dfsg-1ubuntu0.1+esm3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "jq",
            "binary_version": "1.5+dfsg-1ubuntu0.1+esm4"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:Pro:16.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8202-1.json"
Ubuntu:Pro:18.04:LTS
jq

Package

Name
jq
Purl
pkg:deb/ubuntu/jq@1.5+dfsg-2ubuntu0.1~esm2?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5+dfsg-2ubuntu0.1~esm2

Affected versions

1.*
1.5+dfsg-2
1.5+dfsg-2ubuntu0.1~esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "jq",
            "binary_version": "1.5+dfsg-2ubuntu0.1~esm2"
        },
        {
            "binary_name": "libjq1",
            "binary_version": "1.5+dfsg-2ubuntu0.1~esm2"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:Pro:18.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8202-1.json"
Ubuntu:Pro:20.04:LTS
jq

Package

Name
jq
Purl
pkg:deb/ubuntu/jq@1.6-1ubuntu0.20.04.1+esm2?arch=source&distro=esm-infra/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6-1ubuntu0.20.04.1+esm2

Affected versions

1.*
1.5+dfsg-2build1
1.6-1
1.6-1ubuntu0.20.04.1
1.6-1ubuntu0.20.04.1+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "jq",
            "binary_version": "1.6-1ubuntu0.20.04.1+esm2"
        },
        {
            "binary_name": "libjq1",
            "binary_version": "1.6-1ubuntu0.20.04.1+esm2"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:Pro:20.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8202-1.json"