CVE-2026-39979Out-of-bounds Read in JQ

CWE-125Out-of-bounds Read5 documents4 sources
Severity
6.9MEDIUMNVD
EPSS
0.0%
top 87.26%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 13
Latest updateApr 14

Description

jq is a command-line JSON processor. In commits before 2f09060afab23fe9390cce7cb860b10416e1bf5f, the jv_parse_sized() API in libjq accepts a counted buffer with an explicit length parameter, but its error-handling path formats the input buffer using %s in jv_string_fmt(), which reads until a NUL terminator is found rather than respecting the caller-supplied length. This means that when malformed JSON is passed in a non-NUL-terminated buffer, the error construction logic performs an out-of-bounds

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Packages1 packages

CVEListV5jqlang/jq< 2f09060afab23fe9390cce7cb860b10416e1bf5f

🔴Vulnerability Details

1
CVEList
jq: Out-of-Bounds Read in jv_parse_sized() Error Formatting for Non-NUL-Terminated Counted Buffers2026-04-13

📋Vendor Advisories

1
Red Hat
jq: out-of-bounds read in jv_parse_sized() on error formatting for non-NUL-terminated buffers2026-04-13

💬Community

2
Bugzilla
CVE-2026-39979 jq: out-of-bounds read in jv_parse_sized() on error formatting for non-NUL-terminated buffers [fedora-all]2026-04-14
Bugzilla
CVE-2026-39979 jq: out-of-bounds read in jv_parse_sized() on error formatting for non-NUL-terminated buffers2026-04-13
CVE-2026-39979 — Out-of-bounds Read in Jqlang JQ | cvebase