Source: jq
Version: 1.7.1-3
Severity: important
Tags: security upstream
Forwarded: https://github.com/jqlang/jq/issues/3196
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Control: found -1 1.7.1-4

Hi,

The following vulnerability was published for jq.

CVE-2024-53427[0]:
| decNumberCopy in decNumber.c in jq through 1.7.1 does not properly
| consider that NaN is interpreted as numeric, which has a resultant
| stack-based buffer overflow and out-of-bounds write, as demonstrated
| by use of --slurp with subtraction, such as a filter of .-. when the
| input has a certain form of digit string with NaN (e.g., "1 NaN123"
| immediately followed by many more digits).


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-53427
    https://www.cve.org/CVERecord?id=CVE-2024-53427
[1] https://github.com/jqlang/jq/issues/3196
[2] https://github.com/jqlang/jq/security/advisories/GHSA-x6c3-qv5r-7q22
[3] https://github.com/jqlang/jq/commit/b86ff49f46a4a37e5a8e75a140cb5fd6e1331384
[4] https://github.com/jqlang/jq/commit/a09a4dfd55e6c24d04b35062ccfe4509748b1dd3

Regards,
Salvatore

Reply via email to