CVE-2023-50268

jq is a command-line JSON processor. Version 1.7 is vulnerable to stack-based buffer overflow in builds using decNumber. Version 1.7.1 contains a patch for this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jqlang:jq:1.7:*:*:*:*:*:*:*

History

21 Nov 2024, 08:36

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.5
v2 : unknown
v3 : 6.2
References () http://www.openwall.com/lists/oss-security/2023/12/15/10 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2023/12/15/10 - Mailing List, Patch, Third Party Advisory
References () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64771 - Issue Tracking, Mailing List () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64771 - Issue Tracking, Mailing List
References () https://github.com/jqlang/jq/commit/c9a51565214eece8f1053089739aea73145bfd6b - Patch () https://github.com/jqlang/jq/commit/c9a51565214eece8f1053089739aea73145bfd6b - Patch
References () https://github.com/jqlang/jq/pull/2804 - Issue Tracking, Patch () https://github.com/jqlang/jq/pull/2804 - Issue Tracking, Patch
References () https://github.com/jqlang/jq/security/advisories/GHSA-7hmr-442f-qc8j - Exploit, Vendor Advisory () https://github.com/jqlang/jq/security/advisories/GHSA-7hmr-442f-qc8j - Exploit, Vendor Advisory

19 Dec 2023, 01:32

Type Values Removed Values Added
First Time Jqlang
Jqlang jq
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:a:jqlang:jq:1.7:*:*:*:*:*:*:*
CWE CWE-121
CWE-120
CWE-787
References () https://github.com/jqlang/jq/commit/c9a51565214eece8f1053089739aea73145bfd6b - () https://github.com/jqlang/jq/commit/c9a51565214eece8f1053089739aea73145bfd6b - Patch
References () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64771 - () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64771 - Issue Tracking, Mailing List
References () https://github.com/jqlang/jq/security/advisories/GHSA-7hmr-442f-qc8j - () https://github.com/jqlang/jq/security/advisories/GHSA-7hmr-442f-qc8j - Exploit, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2023/12/15/10 - () http://www.openwall.com/lists/oss-security/2023/12/15/10 - Mailing List, Patch, Third Party Advisory
References () https://github.com/jqlang/jq/pull/2804 - () https://github.com/jqlang/jq/pull/2804 - Issue Tracking, Patch

16 Dec 2023, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-13 21:15

Updated : 2024-11-21 08:36


NVD link : CVE-2023-50268

Mitre link : CVE-2023-50268

CVE.ORG link : CVE-2023-50268


JSON object : View

Products Affected

jqlang

  • jq
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write