Control: retitle -1 unblock: jq/1.7.1-6+deb13u1 On Mon, Jul 07, 2025 at 11:24:21PM +0800, ChangZhuo Chen (陳昌倬) wrote: > On Sun, Jul 06, 2025 at 09:18:00PM +0200, Sebastian Ramacher wrote: > > I think a targetted fix on top of 1.7.1 would be more appropriate. I > > don't expect all of " 190 files changed, 30175 insertions(+), 24688 > > deletions(-)" is needed to fix CVE-2025-49104. > > I agree with Sebastian. Let's aim for a targeted fix on top of 1.7.1.
I have prepare jq 1.7.1-6+deb13u1 for CVE-2025-49104, please see attachment for debdiff. -- ChangZhuo Chen (陳昌倬) czchen@{czchen,debian}.org Key fingerprint = BA04 346D C2E1 FE63 C790 8793 CC65 B0CD EC27 5D5B
diff -Nru jq-1.7.1/debian/changelog jq-1.7.1/debian/changelog --- jq-1.7.1/debian/changelog 2025-05-25 03:15:28.000000000 +0800 +++ jq-1.7.1/debian/changelog 2025-07-08 00:16:39.000000000 +0800 @@ -1,3 +1,9 @@ +jq (1.7.1-6+deb13u1) trixie; urgency=medium + + * Cherry-pick upstream commit for CVE-2025-48060. + + -- ChangZhuo Chen (陳昌倬) <czc...@debian.org> Tue, 08 Jul 2025 00:16:39 +0800 + jq (1.7.1-6) unstable; urgency=medium * Cherry-pick upstream commit for CVE-2024-23337 (Closes: #1106289) diff -Nru jq-1.7.1/debian/patches/CVE-2025-48060.patch jq-1.7.1/debian/patches/CVE-2025-48060.patch --- jq-1.7.1/debian/patches/CVE-2025-48060.patch 1970-01-01 08:00:00.000000000 +0800 +++ jq-1.7.1/debian/patches/CVE-2025-48060.patch 2025-07-08 00:16:25.000000000 +0800 @@ -0,0 +1,37 @@ +From: =?utf-8?b?IkNoYW5nWmh1byBDaGVuICjpmbPmmIzlgKwpIg==?= + <czc...@debian.org> +Date: Tue, 8 Jul 2025 00:09:51 +0800 +Subject: Fix heap buffer overflow when formatting an empty string + +--- + src/jv.c | 1 + + tests/jq.test | 4 ++++ + 2 files changed, 5 insertions(+) + +diff --git a/src/jv.c b/src/jv.c +index a8fbe48..c8e0c51 100644 +--- a/src/jv.c ++++ b/src/jv.c +@@ -1121,6 +1121,7 @@ static jv jvp_string_empty_new(uint32_t length) { + jvp_string* s = jvp_string_alloc(length); + s->length_hashed = 0; + memset(s->data, 0, length); ++ s->data[length] = 0; + jv r = {JVP_FLAGS_STRING, 0, 0, 0, {&s->refcnt}}; + return r; + } +diff --git a/tests/jq.test b/tests/jq.test +index 944f9da..b36e591 100644 +--- a/tests/jq.test ++++ b/tests/jq.test +@@ -2024,6 +2024,10 @@ map(try implode catch .) + [123,["a"],[nan]] + ["implode input must be an array","string (\"a\") can't be imploded, unicode codepoint needs to be numeric","number (null) can't be imploded, unicode codepoint needs to be numeric"] + ++try 0[implode] catch . ++[] ++"Cannot index number with string \"\"" ++ + # walk + walk(.) + {"x":0} diff -Nru jq-1.7.1/debian/patches/series jq-1.7.1/debian/patches/series --- jq-1.7.1/debian/patches/series 2025-05-25 03:11:23.000000000 +0800 +++ jq-1.7.1/debian/patches/series 2025-07-08 00:16:25.000000000 +0800 @@ -6,3 +6,4 @@ libtool.patch CVE-2024-53427.patch CVE-2024-23337.patch +CVE-2025-48060.patch
signature.asc
Description: PGP signature