Home

Description

jq is a command-line JSON processor. In 1.8.1 and earlier, when decNumberFromString is given a number literal of INT_MAX-1 (2147483646) digits, the D2U() macro overflows during signed-int arithmetic. The wrapped negative value bypasses the heap-allocation size check, causes the function to use a 30-byte stack buffer, and then writes ≈715 million 16-bit units (≈1.4 GiB) at an offset 1.43 GiB below the stack frame. The written content is fully attacker-controlled (the parsed decimal digits, packed 3-per-unit).

PUBLISHED Reserved 2026-05-04 | Published 2026-05-11 | Updated 2026-05-11 | Assigner GitHub_M




MEDIUM: 6.2CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-190: Integer Overflow or Wraparound

Product status

<= 1.8.1
affected

References

github.com/jqlang/jq/security/advisories/GHSA-5v7p-2r57-2g4g exploit

github.com/jqlang/jq/security/advisories/GHSA-5v7p-2r57-2g4g

cve.org (CVE-2026-43894)

nvd.nist.gov (CVE-2026-43894)

Download JSON