Vulnerabilities (CVE)

Filtered by vendor Jqlang Subscribe
Filtered by product Jq
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-53427 1 Jqlang 1 Jq 2025-07-01 N/A 8.1 HIGH
decNumberCopy in decNumber.c in jq through 1.7.1 does not properly consider that NaN is interpreted as numeric, which has a resultant stack-based buffer overflow and out-of-bounds write, as demonstrated by use of --slurp with subtraction, such as a filter of .-. when the input has a certain form of digit string with NaN (e.g., "1 NaN123" immediately followed by many more digits).
CVE-2024-23337 1 Jqlang 1 Jq 2025-06-20 N/A 4.3 MEDIUM
jq is a command-line JSON processor. In versions up to and including 1.7.1, an integer overflow arises when assigning value using an index of 2147483647, the signed integer limit. This causes a denial of service. Commit de21386681c0df0104a99d9d09db23a9b2a78b1e contains a patch for the issue.
CVE-2025-48060 1 Jqlang 1 Jq 2025-06-20 N/A 7.5 HIGH
jq is a command-line JSON processor. In versions up to and including 1.7.1, a heap-buffer-overflow is present in function `jv_string_vfmt` in the jq_fuzz_execute harness from oss-fuzz. This crash happens on file jv.c, line 1456 `void* p = malloc(sz);`. As of time of publication, no patched versions are available.
CVE-2023-50246 1 Jqlang 1 Jq 2025-04-25 N/A 6.2 MEDIUM
jq is a command-line JSON processor. Version 1.7 is vulnerable to heap-based buffer overflow. Version 1.7.1 contains a patch for this issue.
CVE-2023-50268 1 Jqlang 1 Jq 2024-11-21 N/A 6.2 MEDIUM
jq is a command-line JSON processor. Version 1.7 is vulnerable to stack-based buffer overflow in builds using decNumber. Version 1.7.1 contains a patch for this issue.