#VU106250 Stack-based buffer overflow in jq - CVE-2023-50268
Published: March 28, 2025
jq
stedolan (Stephen Dolan)
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the command-line JSON processor. A remote attacker can pass specially crafted input to the application, trigger a stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- https://github.com/jqlang/jq/security/advisories/GHSA-7hmr-442f-qc8j
- https://github.com/jqlang/jq/pull/2804
- https://github.com/jqlang/jq/commit/c9a51565214eece8f1053089739aea73145bfd6b
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64771
- http://www.openwall.com/lists/oss-security/2023/12/15/10