CVE-2023-50246

jq is a command-line JSON processor. Version 1.7 is vulnerable to heap-based buffer overflow. Version 1.7.1 contains a patch for this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jqlang:jq:1.7:*:*:*:*:*:*:*

History

21 Nov 2024, 08:36

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.5
v2 : unknown
v3 : 6.2
References () http://www.openwall.com/lists/oss-security/2023/12/15/10 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2023/12/15/10 - Mailing List, Patch, Third Party Advisory
References () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64574 - Mailing List () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64574 - Mailing List
References () https://github.com/jqlang/jq/commit/71c2ab509a8628dbbad4bc7b3f98a64aa90d3297 - Patch () https://github.com/jqlang/jq/commit/71c2ab509a8628dbbad4bc7b3f98a64aa90d3297 - Patch
References () https://github.com/jqlang/jq/security/advisories/GHSA-686w-5m7m-54vc - Exploit, Vendor Advisory () https://github.com/jqlang/jq/security/advisories/GHSA-686w-5m7m-54vc - Exploit, Vendor Advisory

19 Dec 2023, 01:30

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2023/12/15/10 - () http://www.openwall.com/lists/oss-security/2023/12/15/10 - Mailing List, Patch, Third Party Advisory
References () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64574 - () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64574 - Mailing List
References () https://github.com/jqlang/jq/security/advisories/GHSA-686w-5m7m-54vc - () https://github.com/jqlang/jq/security/advisories/GHSA-686w-5m7m-54vc - Exploit, Vendor Advisory
References () https://github.com/jqlang/jq/commit/71c2ab509a8628dbbad4bc7b3f98a64aa90d3297 - () https://github.com/jqlang/jq/commit/71c2ab509a8628dbbad4bc7b3f98a64aa90d3297 - Patch
CPE cpe:2.3:a:jqlang:jq:1.7:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-122
CWE-120
CWE-787
First Time Jqlang
Jqlang jq

16 Dec 2023, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-13 21:15

Updated : 2024-11-21 08:36


NVD link : CVE-2023-50246

Mitre link : CVE-2023-50246

CVE.ORG link : CVE-2023-50246


JSON object : View

Products Affected

jqlang

  • jq
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-122

Heap-based Buffer Overflow

CWE-787

Out-of-bounds Write