Out-of-Bounds Read Vulnerability in jq Command-Line JSON Processor by JQLang
CVE-2026-39979

6.9MEDIUM

Key Information:

Vendor

Jqlang

Status
Vendor
CVE Published:
13 April 2026

What is CVE-2026-39979?

The jq command-line JSON processor contains a vulnerability in the jv_parse_sized() API within libjq. When processing a counted buffer with an explicit length parameter, the error-handling mechanism erroneously uses a format that reads until a NUL terminator instead of honoring the specified length. As a result, feeding malformed JSON through a non-NUL-terminated buffer enables out-of-bounds reads, potentially leading to memory disclosure or application crashes. This vulnerability affects all libjq consumers using the vulnerable API, necessitating immediate attention and updates to the patched version.

Affected Version(s)

jq < 2f09060afab23fe9390cce7cb860b10416e1bf5f

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.