Debian Package Tracker
Register | Log in
Subscribe

jq

lightweight and flexible command-line JSON processor

Choose email to subscribe with

general
  • source: jq (main)
  • version: 1.7.1-5
  • maintainer: ChangZhuo Chen (陳昌倬) (DMD)
  • arch: any
  • std-ver: 4.6.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.5+dfsg-2
  • oldstable: 1.6-2.1
  • stable: 1.6-2.1
  • testing: 1.7.1-5
  • unstable: 1.7.1-5
versioned links
  • 1.5+dfsg-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.6-2.1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.7.1-5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • jq (4 bugs: 0, 3, 1, 0)
  • libjq-dev
  • libjq1
action needed
2 security issues in trixie high

There are 2 open security issues in trixie.

2 important issues:
  • CVE-2024-23337: jq is a command-line JSON processor. In versions up to and including 1.7.1, an integer overflow arises when assigning value using an index of 2147483647, the signed integer limit. This causes a denial of service. Commit de21386681c0df0104a99d9d09db23a9b2a78b1e contains a patch for the issue.
  • CVE-2025-48060: jq is a command-line JSON processor. In versions up to and including 1.7.1, a heap-buffer-overflow is present in function `jv_string_vfmt` in the jq_fuzz_execute harness from oss-fuzz. This crash happens on file jv.c, line 1456 `void* p = malloc(sz);`. As of time of publication, no patched versions are available.
Created: 2025-05-22 Last update: 2025-05-23 14:30
2 security issues in sid high

There are 2 open security issues in sid.

2 important issues:
  • CVE-2024-23337: jq is a command-line JSON processor. In versions up to and including 1.7.1, an integer overflow arises when assigning value using an index of 2147483647, the signed integer limit. This causes a denial of service. Commit de21386681c0df0104a99d9d09db23a9b2a78b1e contains a patch for the issue.
  • CVE-2025-48060: jq is a command-line JSON processor. In versions up to and including 1.7.1, a heap-buffer-overflow is present in function `jv_string_vfmt` in the jq_fuzz_execute harness from oss-fuzz. This crash happens on file jv.c, line 1456 `void* p = malloc(sz);`. As of time of publication, no patched versions are available.
Created: 2025-05-22 Last update: 2025-05-23 14:30
3 security issues in bullseye high

There are 3 open security issues in bullseye.

2 important issues:
  • CVE-2024-23337: jq is a command-line JSON processor. In versions up to and including 1.7.1, an integer overflow arises when assigning value using an index of 2147483647, the signed integer limit. This causes a denial of service. Commit de21386681c0df0104a99d9d09db23a9b2a78b1e contains a patch for the issue.
  • CVE-2025-48060: jq is a command-line JSON processor. In versions up to and including 1.7.1, a heap-buffer-overflow is present in function `jv_string_vfmt` in the jq_fuzz_execute harness from oss-fuzz. This crash happens on file jv.c, line 1456 `void* p = malloc(sz);`. As of time of publication, no patched versions are available.
1 issue postponed or untriaged:
  • CVE-2024-53427: (postponed; to be fixed through a stable update) decNumberCopy in decNumber.c in jq through 1.7.1 does not properly consider that NaN is interpreted as numeric, which has a resultant stack-based buffer overflow and out-of-bounds write, as demonstrated by use of --slurp with subtraction, such as a filter of .-. when the input has a certain form of digit string with NaN (e.g., "1 NaN123" immediately followed by many more digits).
Created: 2025-05-22 Last update: 2025-05-23 14:30
3 security issues in bookworm high

There are 3 open security issues in bookworm.

2 important issues:
  • CVE-2024-23337: jq is a command-line JSON processor. In versions up to and including 1.7.1, an integer overflow arises when assigning value using an index of 2147483647, the signed integer limit. This causes a denial of service. Commit de21386681c0df0104a99d9d09db23a9b2a78b1e contains a patch for the issue.
  • CVE-2025-48060: jq is a command-line JSON processor. In versions up to and including 1.7.1, a heap-buffer-overflow is present in function `jv_string_vfmt` in the jq_fuzz_execute harness from oss-fuzz. This crash happens on file jv.c, line 1456 `void* p = malloc(sz);`. As of time of publication, no patched versions are available.
1 issue left for the package maintainer to handle:
  • CVE-2024-53427: (needs triaging) decNumberCopy in decNumber.c in jq through 1.7.1 does not properly consider that NaN is interpreted as numeric, which has a resultant stack-based buffer overflow and out-of-bounds write, as demonstrated by use of --slurp with subtraction, such as a filter of .-. when the input has a certain form of digit string with NaN (e.g., "1 NaN123" immediately followed by many more digits).

You can find information about how to handle this issue in the security team's documentation.

Created: 2025-02-27 Last update: 2025-05-23 14:30
debian/patches: 4 patches to forward upstream low

Among the 7 debian patches available in version 1.7.1-5 of the package, we noticed the following issues:

  • 4 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-04-12 18:03
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.6.2).
Created: 2024-04-07 Last update: 2025-04-12 17:56
news
[rss feed]
  • [2025-04-22] jq 1.7.1-5 MIGRATED to testing (Debian testing watch)
  • [2025-04-12] Accepted jq 1.7.1-5 (source) into unstable (ChangZhuo Chen (陳昌倬)) (signed by: ChangZhuo Chen)
  • [2025-04-09] Accepted jq 1.7.1-4 (source) into unstable (ChangZhuo Chen (陳昌倬)) (signed by: ChangZhuo Chen)
  • [2024-04-06] jq 1.7.1-3 MIGRATED to testing (Debian testing watch)
  • [2024-02-29] Accepted jq 1.7.1-3 (source) into unstable (ChangZhuo Chen (陳昌倬)) (signed by: ChangZhuo Chen)
  • [2023-12-21] jq 1.7.1-2 MIGRATED to testing (Debian testing watch)
  • [2023-12-17] Accepted jq 1.7.1-2 (source) into unstable (ChangZhuo Chen (陳昌倬)) (signed by: ChangZhuo Chen)
  • [2023-12-15] Accepted jq 1.7.1-1 (source) into unstable (ChangZhuo Chen (陳昌倬)) (signed by: ChangZhuo Chen)
  • [2023-09-18] jq 1.7-1 MIGRATED to testing (Debian testing watch)
  • [2023-09-12] Accepted jq 1.7-1 (source) into unstable (ChangZhuo Chen (陳昌倬)) (signed by: ChangZhuo Chen)
  • [2023-08-26] jq 1.6-3 MIGRATED to testing (Debian testing watch)
  • [2023-08-20] Accepted jq 1.6-3 (source) into unstable (ChangZhuo Chen (陳昌倬)) (signed by: ChangZhuo Chen)
  • [2020-12-15] jq 1.6-2.1 MIGRATED to testing (Debian testing watch)
  • [2020-12-10] Accepted jq 1.6-2.1 (source) into unstable (Paul Gevers)
  • [2020-10-10] Accepted jq 1.6-2 (source) into unstable (ChangZhuo Chen (陳昌倬)) (signed by: ChangZhuo Chen)
  • [2019-10-15] jq 1.6-1 MIGRATED to testing (Debian testing watch)
  • [2019-10-09] Accepted jq 1.6-1 (source) into unstable (ChangZhuo Chen (陳昌倬)) (signed by: ChangZhuo Chen)
  • [2017-06-20] jq 1.5+dfsg-2 MIGRATED to testing (Debian testing watch)
  • [2017-03-02] Accepted jq 1.5+dfsg-1.3~bpo8+1 (source amd64) into jessie-backports->backports-policy, jessie-backports (ChangZhuo Chen (陳昌倬)) (signed by: ChangZhuo Chen)
  • [2017-01-30] Accepted jq 1.5+dfsg-2 (source) into unstable (ChangZhuo Chen (陳昌倬)) (signed by: ChangZhuo Chen)
  • [2017-01-21] jq 1.5+dfsg-1.3 MIGRATED to testing (Debian testing watch)
  • [2017-01-10] Accepted jq 1.5+dfsg-1.2 (source amd64) into unstable, unstable (Harlan Lieberman-Berg)
  • [2017-01-10] Accepted jq 1.5+dfsg-1.3 (source amd64) into unstable, unstable (Harlan Lieberman-Berg)
  • [2017-01-06] Accepted jq 1.4-2.1+deb8u1 (source amd64) into proposed-updates->stable-new, proposed-updates (Harlan Lieberman-Berg)
  • [2016-11-21] jq 1.5+dfsg-1.1 MIGRATED to testing (Debian testing watch)
  • [2016-11-16] Accepted jq 1.5+dfsg-1.1 (source amd64) into unstable (Harlan Lieberman-Berg)
  • [2016-04-25] jq 1.5+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2015-10-12] Accepted jq 1.5+dfsg-1 (source amd64) into unstable (Simon Elsbrock) (signed by: Michael Stapelberg)
  • [2014-07-27] jq 1.4-2.1 MIGRATED to testing (Britney)
  • [2014-07-21] Accepted jq 1.4-2.1 (source mips) (Anibal Monsalve Salazar)
  • 1
  • 2
bugs [bug history graph]
  • all: 7
  • RC: 0
  • I&N: 6
  • M&W: 1
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.7.1-3ubuntu1
  • 1 bug
  • patches for 1.7.1-3ubuntu1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing