CVE-2023-50246

jq is a command-line JSON processor. Version 1.7 is vulnerable to heap-based buffer overflow. Version 1.7.1 contains a patch for this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jqlang:jq:1.7:-:*:*:*:*:*:*
cpe:2.3:a:jqlang:jq:1.7:rc1:*:*:*:*:*:*
cpe:2.3:a:jqlang:jq:1.7:rc2:*:*:*:*:*:*

History

25 Apr 2025, 18:54

Type Values Removed Values Added
CPE cpe:2.3:a:jqlang:jq:1.7:*:*:*:*:*:*:* cpe:2.3:a:jqlang:jq:1.7:rc1:*:*:*:*:*:*
cpe:2.3:a:jqlang:jq:1.7:rc2:*:*:*:*:*:*
cpe:2.3:a:jqlang:jq:1.7:-:*:*:*:*:*:*

Information

Published : 2023-12-13 21:15

Updated : 2025-04-25 18:54


NVD link : CVE-2023-50246

Mitre link : CVE-2023-50246

CVE.ORG link : CVE-2023-50246


JSON object : View

Products Affected

jqlang

  • jq
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-122

Heap-based Buffer Overflow

CWE-787

Out-of-bounds Write