Bug 2469175 (CVE-2026-43894) - CVE-2026-43894 jq: jq: Arbitrary Code Execution or Denial of Service via Signed Integer Overflow
Summary: CVE-2026-43894 jq: jq: Arbitrary Code Execution or Denial of Service via Sign...
Keywords:
Status: NEW
Alias: CVE-2026-43894
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-05-11 18:01 UTC by OSIDB Bzimport
Modified: 2026-05-12 09:56 UTC (History)
24 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-05-11 18:01:57 UTC
jq is a command-line JSON processor. In 1.8.1 and earlier, when decNumberFromString is given a number literal of INT_MAX-1 (2147483646) digits, the D2U() macro overflows during signed-int arithmetic. The wrapped negative value bypasses the heap-allocation size check, causes the function to use a 30-byte stack buffer, and then writes ≈715 million 16-bit units (≈1.4 GiB) at an offset 1.43 GiB below the stack frame. The written content is fully attacker-controlled (the parsed decimal digits, packed 3-per-unit).


Note You need to log in before you can comment on or make changes to this bug.