jq is a command-line JSON processor. In versions up to and including 1.7.1, a heap-buffer-overflow is present in function `jv_string_vfmt` in the jq_fuzz_execute harness from oss-fuzz. This crash happens on file jv.c, line 1456 `void* p = malloc(sz);`. As of time of publication, no patched versions are available.
References
Link | Resource |
---|---|
https://github.com/jqlang/jq/security/advisories/GHSA-p7rr-28xf-3m5w | Exploit Vendor Advisory |
https://github.com/jqlang/jq/security/advisories/GHSA-p7rr-28xf-3m5w | Exploit Vendor Advisory |
Configurations
History
20 Jun 2025, 17:39
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-21 18:15
Updated : 2025-06-20 17:39
NVD link : CVE-2025-48060
Mitre link : CVE-2025-48060
CVE.ORG link : CVE-2025-48060
JSON object : View
Products Affected
jqlang
- jq