jq is a command-line JSON processor. In versions up to and including 1.7.1, a heap-buffer-overflow is present in function `jv_string_vfmt` in the jq_fuzz_execute harness from oss-fuzz. This crash happens on file jv.c, line 1456 `void* p = malloc(sz);`. As of time of publication, no patched versions are available.
References
| Link | Resource |
|---|---|
| https://github.com/jqlang/jq/security/advisories/GHSA-p7rr-28xf-3m5w | Exploit Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2025/09/msg00022.html | |
| https://github.com/jqlang/jq/security/advisories/GHSA-p7rr-28xf-3m5w | Exploit Vendor Advisory |
Configurations
History
03 Nov 2025, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
20 Jun 2025, 17:39
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-21 18:15
Updated : 2025-11-03 19:16
NVD link : CVE-2025-48060
Mitre link : CVE-2025-48060
CVE.ORG link : CVE-2025-48060
JSON object : View
Products Affected
jqlang
- jq
