漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
jq: Embedded NUL truncates top-level jq programs loaded with -f
Vulnerability Description
jq is a command-line JSON processor. In 1.8.1 and earlier, Top-level jq programs loaded from a file with -f are truncated at the first embedded NUL byte on current upstream HEAD. A crafted filter file such as . followed by \x00 and arbitrary suffix compiles and executes as only the prefix before the NUL. This leaves jq with a post-CVE-2026-33948 prefix/full-buffer mismatch on the compilation path even though the JSON parser path has already been fixed.
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Vulnerability Type
空字节或NULL字符转义处理不恰当
Vulnerability Title
jq 安全漏洞
Vulnerability Description
jq是jqlang开源的一个轻量级且灵活的命令行 JSON 处理器。 jq 1.8.1及之前版本存在安全漏洞,该漏洞源于通过-f加载的顶层jq程序在第一个嵌入NUL字节处被截断,可能导致编译和执行仅包含NUL之前的前缀部分,造成编译路径上的前缀/完整缓冲区不匹配。
CVSS Information
N/A
Vulnerability Type
N/A