Memory Management Vulnerability in jq Command-Line JSON Processor by jqlang
CVE-2026-39956

6.1MEDIUM

Key Information:

Vendor

Jqlang

Status
Vendor
CVE Published:
13 April 2026

What is CVE-2026-39956?

There is a vulnerability in jq, the command-line JSON processor, where the _strindices builtin incorrectly passes unverified arguments to the jv_string_indexes() function. This oversight means that non-string inputs can lead to a controlled pointer dereference, which could allow an attacker to manipulate memory and potentially crash the application. Such attacks become feasible when evaluating untrusted filters against jq's release builds, where the assert checks are disabled. The vulnerability has been addressed in a subsequent commit.

Affected Version(s)

jq >= 69785bf77f86e2ea1b4a20ca86775916889e91c9, < fdf8ef0f0810e3d365cdd5160de43db46f57ed03

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.