Bug 2469199 (CVE-2026-43895) - CVE-2026-43895 jq: embedded NUL in jq import paths causes local redaction-policy bypass and preserves sensitive fields in published artifacts
Summary: CVE-2026-43895 jq: embedded NUL in jq import paths causes local redaction-pol...
Keywords:
Status: NEW
Alias: CVE-2026-43895
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2477523
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-05-11 18:03 UTC by OSIDB Bzimport
Modified: 2026-05-14 17:44 UTC (History)
24 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-05-11 18:03:12 UTC
jq is a command-line JSON processor. In 1.8.1 and earlier, jq accepts embedded NUL bytes in import paths at the jq-language level, but later resolves those paths through C string operations during module and data-file lookup. This creates a mismatch between the logical import string that policy or audit code may validate and the on-disk path that jq actually opens.


Note You need to log in before you can comment on or make changes to this bug.