Vulnerability Description
jq is a command-line JSON processor. Version 1.7 is vulnerable to stack-based buffer overflow in builds using decNumber. Version 1.7.1 contains a patch for this issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jqlang | Jq | 1.7 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2023/12/15/10Mailing ListPatchThird Party Advisory
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64771Issue TrackingMailing List
- https://github.com/jqlang/jq/commit/c9a51565214eece8f1053089739aea73145bfd6bPatch
- https://github.com/jqlang/jq/pull/2804Issue TrackingPatch
- https://github.com/jqlang/jq/security/advisories/GHSA-7hmr-442f-qc8jExploitVendor Advisory
- http://www.openwall.com/lists/oss-security/2023/12/15/10Mailing ListPatchThird Party Advisory
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64771Issue TrackingMailing List
- https://github.com/jqlang/jq/commit/c9a51565214eece8f1053089739aea73145bfd6bPatch
- https://github.com/jqlang/jq/pull/2804Issue TrackingPatch
- https://github.com/jqlang/jq/security/advisories/GHSA-7hmr-442f-qc8jExploitVendor Advisory
FAQ
What is CVE-2023-50268?
CVE-2023-50268 is a vulnerability with a CVSS score of 6.2 (MEDIUM). jq is a command-line JSON processor. Version 1.7 is vulnerable to stack-based buffer overflow in builds using decNumber. Version 1.7.1 contains a patch for this issue.
How severe is CVE-2023-50268?
CVE-2023-50268 has been rated MEDIUM with a CVSS base score of 6.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-50268?
Check the references section above for vendor advisories and patch information. Affected products include: Jqlang Jq.