CVE-2023-50268

MEDIUM

JQ - Out-of-Bounds Write

Title source: rule
STIX 2.1

Description

jq is a command-line JSON processor. Version 1.7 is vulnerable to stack-based buffer overflow in builds using decNumber. Version 1.7.1 contains a patch for this issue.

References (5)

Core 5
Core References
Mailing List, Patch, Third Party Advisory
http://www.openwall.com/lists/oss-security/2023/12/15/10
Exploit, Vendor Advisory x_refsource_confirm
https://github.com/jqlang/jq/security/advisories/GHSA-7hmr-442f-qc8j
Issue Tracking, Patch x_refsource_misc
https://github.com/jqlang/jq/pull/2804
Issue Tracking, Mailing List x_refsource_misc
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64771

Scores

CVSS v3 6.2
EPSS 0.0010
EPSS Percentile 27.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-121 CWE-120 CWE-787
Status published
Products (1)
jqlang/jq 1.7
Published Dec 13, 2023
Tracked Since Feb 18, 2026