CVE-2026-39979
Publication date 13 April 2026
Last updated 28 April 2026
Ubuntu priority
Description
jq is a command-line JSON processor. In commits before 2f09060afab23fe9390cce7cb860b10416e1bf5f, the jv_parse_sized() API in libjq accepts a counted buffer with an explicit length parameter, but its error-handling path formats the input buffer using %s in jv_string_fmt(), which reads until a NUL terminator is found rather than respecting the caller-supplied length. This means that when malformed JSON is passed in a non-NUL-terminated buffer, the error construction logic performs an out-of-bounds read past the end of the buffer. The vulnerability is reachable by any libjq consumer calling jv_parse_sized() with untrusted input, and depending on memory layout, can result in memory disclosure or process termination. The issue has been patched in commit 2f09060afab23fe9390cce7cb860b10416e1bf5f.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| jq | 26.04 LTS resolute |
Fixed 1.8.1-4ubuntu2
|
| 25.10 questing |
Fixed 1.8.1-3ubuntu1.1
|
|
| 24.04 LTS noble |
Fixed 1.7.1-3ubuntu0.24.04.2
|
|
| 22.04 LTS jammy |
Fixed 1.6-2.1ubuntu3.2
|
|
| 20.04 LTS focal |
Fixed 1.6-1ubuntu0.20.04.1+esm2
|
|
| 18.04 LTS bionic |
Fixed 1.5+dfsg-2ubuntu0.1~esm2
|
|
| 16.04 LTS xenial |
Fixed 1.5+dfsg-1ubuntu0.1+esm4
|
|
| 14.04 LTS trusty |
Fixed 1.3-1.1ubuntu1.1+esm4
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu Pro 30-day free trialReferences
Related Ubuntu Security Notices (USN)
- USN-8202-1
- jq vulnerabilities
- 23 April 2026
- USN-8202-2
- jq vulnerabilities
- 28 April 2026