Bug 1218034 (CVE-2023-50246) - VUL-0: CVE-2023-50246: jq: Version 1.7 is vulnerable to heap-based buffer overflow. Version 1.7.1 contains a patch for this issue.
Summary: VUL-0: CVE-2023-50246: jq: Version 1.7 is vulnerable to heap-based buffer ove...
Status: RESOLVED INVALID
Alias: CVE-2023-50246
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/387951/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-50246:6.2:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-12-14 04:44 UTC by SMASH SMASH
Modified: 2024-05-15 14:06 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2023-12-14 04:44:37 UTC
jq is a command-line JSON processor. Version 1.7 is vulnerable to heap-based buffer overflow. Version 1.7.1 contains a patch for this issue.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-50246
Comment 2 Nathan Cutler 2023-12-14 08:35:09 UTC
SLE (12 and 15) are on jq 1.6, so this bug is valid for Factory only.
Comment 5 Camila Camargo de Matos 2024-05-15 14:06:26 UTC
openSUSE:Factory is not affected by this issue, as it contains version 1.7.1 of package jq, which is already fixed for this issue.