EUVD-2025-18920

| CVE-2025-49014 MEDIUM
2025-06-19 [email protected]
5.5
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 15, 2026 - 00:08 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 00:08 euvd
EUVD-2025-18920
CVE Published
Jun 19, 2025 - 15:15 nvd
MEDIUM 5.5

Description

jq is a command-line JSON processor. In version 1.8.0 a heap use after free vulnerability exists within the function f_strflocaltime of /src/builtin.c. This issue has been patched in commit 499c91b, no known fix version exists at time of publication.

Analysis

jq is a command-line JSON processor. In version 1.8.0 a heap use after free vulnerability exists within the function f_strflocaltime of /src/builtin.c. This issue has been patched in commit 499c91b, no known fix version exists at time of publication.

Technical Context

A use-after-free vulnerability occurs when a program continues to use a pointer after the referenced memory has been freed, leading to undefined behavior. This vulnerability is classified as Use After Free (CWE-416).

Remediation

Use memory-safe languages. Implement proper object lifecycle management. Use static and dynamic analysis tools to detect UAF patterns.

Priority Score

28
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +28
POC: 0

Vendor Status

Ubuntu

Priority: Medium
jq
Release Status Version
upstream needs-triage -
bionic not-affected -
focal not-affected -
jammy not-affected 1.6-2.1ubuntu3
noble not-affected 1.7.1-3build1
oracular not-affected 1.7.1-3build1
plucky not-affected 1.7.1-3ubuntu1
trusty not-affected -
xenial not-affected -

Debian

Bug #1108062
jq
Release Status Fixed Version Urgency
bullseye not-affected - -
bullseye (security) fixed 1.6-2.1+deb11u1 -
bookworm not-affected - -
trixie not-affected - -
forky, sid fixed 1.8.1-4 -
(unstable) fixed 1.8.1-1 -

Share

EUVD-2025-18920 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy