Description
jq is a command-line JSON processor. Version 1.7 is vulnerable to heap-based buffer overflow. Version 1.7.1 contains a patch for this issue.
References (4)
Core 4
Core References
Mailing List, Patch, Third Party Advisory
http://www.openwall.com/lists/oss-security/2023/12/15/10
Exploit, Vendor Advisory x_refsource_confirm
https://github.com/jqlang/jq/security/advisories/GHSA-686w-5m7m-54vc
Patch x_refsource_misc
https://github.com/jqlang/jq/commit/71c2ab509a8628dbbad4bc7b3f98a64aa90d3297
Mailing List x_refsource_misc
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64574
Scores
CVSS v3
6.2
EPSS
0.0026
EPSS Percentile
49.3%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-122
CWE-120
CWE-787
Status
published
Products (1)
jqlang/jq
1.7 (3 CPE variants)
Published
Dec 13, 2023
Tracked Since
Feb 18, 2026