CVE-2023-50268

jq is a command-line JSON processor. Version 1.7 is vulnerable to stack-based buffer overflow in builds using decNumber. Version 1.7.1 contains a patch for this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jqlang:jq:1.7:*:*:*:*:*:*:*

History

19 Dec 2023, 01:32

Type Values Removed Values Added
First Time Jqlang
Jqlang jq
CPE cpe:2.3:a:jqlang:jq:1.7:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://github.com/jqlang/jq/security/advisories/GHSA-7hmr-442f-qc8j - () https://github.com/jqlang/jq/security/advisories/GHSA-7hmr-442f-qc8j - Exploit, Vendor Advisory
References () https://github.com/jqlang/jq/pull/2804 - () https://github.com/jqlang/jq/pull/2804 - Issue Tracking, Patch
References () https://github.com/jqlang/jq/commit/c9a51565214eece8f1053089739aea73145bfd6b - () https://github.com/jqlang/jq/commit/c9a51565214eece8f1053089739aea73145bfd6b - Patch
References () http://www.openwall.com/lists/oss-security/2023/12/15/10 - () http://www.openwall.com/lists/oss-security/2023/12/15/10 - Mailing List, Patch, Third Party Advisory
References () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64771 - () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64771 - Issue Tracking, Mailing List
CWE CWE-121
CWE-120
CWE-787

16 Dec 2023, 01:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2023/12/15/10 -

13 Dec 2023, 21:25

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-13 21:15

Updated : 2023-12-19 01:32


NVD link : CVE-2023-50268

Mitre link : CVE-2023-50268


JSON object : View

Products Affected

jqlang

  • jq
CWE
CWE-787

Out-of-bounds Write