Bug 1218038 (CVE-2023-50268) - VUL-0: CVE-2023-50268: jq: stack-based buffer overflow in builds using decNumber
Summary: VUL-0: CVE-2023-50268: jq: stack-based buffer overflow in builds using decNumber
Status: RESOLVED INVALID
Alias: CVE-2023-50268
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/387954/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-50268:6.2:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-12-14 07:34 UTC by SMASH SMASH
Modified: 2024-05-30 14:37 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2023-12-14 07:34:47 UTC
jq is a command-line JSON processor. Version 1.7 is vulnerable to stack-based buffer overflow in builds using decNumber. Version 1.7.1 contains a patch for this issue.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-50268
https://github.com/jqlang/jq/security/advisories/GHSA-7hmr-442f-qc8j
https://github.com/jqlang/jq/pull/2804
https://github.com/jqlang/jq/commit/c9a51565214eece8f1053089739aea73145bfd6b