Source: jq
Version: 1.8.0-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for jq.

CVE-2025-49014[0]:
| jq is a command-line JSON processor. In version 1.8.0 a heap use
| after free vulnerability exists within the function f_strflocaltime
| of /src/builtin.c. This issue has been patched in commit 499c91b, no
| known fix version exists at time of publication.

Note, while the severity as RC is disputable to some extend, this
issue is introduced in the new upstream version uploaded recently, so
1.8.0-1 should not migrate to trixie in this form ideally.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-49014
    https://www.cve.org/CVERecord?id=CVE-2025-49014
[1] https://github.com/jqlang/jq/security/advisories/GHSA-rmjp-cr27-wpg2
[2] https://github.com/jqlang/jq/commit/499c91bca9d4d027833bc62787d1bb075c03680e

Regards,
Salvatore

Reply via email to