jq: CVE-2023-50246 CVE-2023-50268

Related Vulnerabilities: CVE-2023-50246   CVE-2023-50268  

Debian Bug report logs - #1058763
jq: CVE-2023-50246 CVE-2023-50268

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Fri, 15 Dec 2023 19:57:01 UTC

Severity: important

Tags: security, upstream

Found in version jq/1.7-1

Fixed in version jq/1.7.1-1

Done: ChangZhuo Chen (陳昌倬) <czchen@debian.org>

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, ChangZhuo Chen (陳昌倬) <czchen@debian.org>:
Bug#1058763; Package src:jq. (Fri, 15 Dec 2023 19:57:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, ChangZhuo Chen (陳昌倬) <czchen@debian.org>. (Fri, 15 Dec 2023 19:57:03 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: jq: CVE-2023-50246 CVE-2023-50268
Date: Fri, 15 Dec 2023 20:53:01 +0100
Source: jq
Version: 1.7-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>

Hi,

The following vulnerabilities were published for jq.

CVE-2023-50246[0]:
| jq is a command-line JSON processor. Version 1.7 is vulnerable to
| heap-based buffer overflow. Version 1.7.1 contains a patch for this
| issue.


CVE-2023-50268[1]:
| jq is a command-line JSON processor. Version 1.7 is vulnerable to
| stack-based buffer overflow in builds using decNumber. Version 1.7.1
| contains a patch for this issue.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-50246
    https://www.cve.org/CVERecord?id=CVE-2023-50246
    https://github.com/jqlang/jq/security/advisories/GHSA-686w-5m7m-54vc
[1] https://security-tracker.debian.org/tracker/CVE-2023-50268
    https://www.cve.org/CVERecord?id=CVE-2023-50268
    https://github.com/jqlang/jq/security/advisories/GHSA-7hmr-442f-qc8j

Regards,
Salvatore



Reply sent to ChangZhuo Chen (陳昌倬) <czchen@debian.org>:
You have taken responsibility. (Fri, 15 Dec 2023 21:09:06 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Fri, 15 Dec 2023 21:09:06 GMT) (full text, mbox, link).


Message #10 received at 1058763-close@bugs.debian.org (full text, mbox, reply):

From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
To: 1058763-close@bugs.debian.org
Subject: Bug#1058763: fixed in jq 1.7.1-1
Date: Fri, 15 Dec 2023 21:05:14 +0000
Source: jq
Source-Version: 1.7.1-1
Done: ChangZhuo Chen (陳昌倬) <czchen@debian.org>

We believe that the bug you reported is fixed in the latest version of
jq, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1058763@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
ChangZhuo Chen (陳昌倬) <czchen@debian.org> (supplier of updated jq package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 16 Dec 2023 04:35:42 +0800
Source: jq
Architecture: source
Version: 1.7.1-1
Distribution: unstable
Urgency: high
Maintainer: ChangZhuo Chen (陳昌倬) <czchen@debian.org>
Changed-By: ChangZhuo Chen (陳昌倬) <czchen@debian.org>
Closes: 1058763
Changes:
 jq (1.7.1-1) unstable; urgency=high
 .
   * New upstream release. (Closes: #1058763)
     * Fix CVE-2023-50246, CVE-2023-50268.
   * Remove unused patch.
Checksums-Sha1:
 ee1ad84ee0ca383940f2d77bf9d7135b01ac0fba 2009 jq_1.7.1-1.dsc
 b84066c8abfda37b1eff2d4f9bc2187951e281e2 1323338 jq_1.7.1.orig.tar.gz
 c12fec78ce6b665ee9a7172405411603a5ce67b1 13792 jq_1.7.1-1.debian.tar.xz
 5c7cb5eebcad58022c970aac6275283884adabb9 7717 jq_1.7.1-1_amd64.buildinfo
Checksums-Sha256:
 8bffbcc9ccae2fe405ce05b4efe4607422f7b748cc50dd2fc2a0ca984af23f09 2009 jq_1.7.1-1.dsc
 fc75b1824aba7a954ef0886371d951c3bf4b6e0a921d1aefc553f309702d6ed1 1323338 jq_1.7.1.orig.tar.gz
 d4b0c7cce9463e7511fb89846e28c98c164289fe5e12765f40a58574bf27b300 13792 jq_1.7.1-1.debian.tar.xz
 5949328fefe5b50db4748ebeff5e83addfeac80610c99ddde2b40a40283ca47c 7717 jq_1.7.1-1_amd64.buildinfo
Files:
 55f854ad0023edd16d8f76daa6bbafb8 2009 utils optional jq_1.7.1-1.dsc
 6298967cd176a8e9f3e83b98f42295b6 1323338 utils optional jq_1.7.1.orig.tar.gz
 d85e4e71ed9250f05db7d8f780f7e39a 13792 utils optional jq_1.7.1-1.debian.tar.xz
 75cee463f0f36e25591e9e95af4119b0 7717 utils optional jq_1.7.1-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=A/UY
-----END PGP SIGNATURE-----




Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Sat Dec 16 08:18:20 2023; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.