vulnerability

Red Hat: CVE-2025-48060: jq: AddressSanitizer: stack-buffer-overflow in jq_fuzz_execute (jv_string_vfmt) (Multiple Advisories)

Severity
5
CVSS
(AV:L/AC:M/Au:N/C:N/I:N/A:C)
Published
May 21, 2025
Added
Jul 9, 2025
Modified
Jan 28, 2026

Description

jq is a command-line JSON processor. In versions up to and including 1.7.1, a heap-buffer-overflow is present in function `jv_string_vfmt` in the jq_fuzz_execute harness from oss-fuzz. This crash happens on file jv.c, line 1456 `void* p = malloc(sz);`. As of time of publication, no patched versions are available.

Solutions

redhat-upgrade-jqredhat-upgrade-jq-debuginforedhat-upgrade-jq-debugsourceredhat-upgrade-jq-devel
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.