<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Stack Write — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/stack-write/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 07:32:11 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/stack-write/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-43894 jq: Wild stack write via signed-integer overflow in decNumber D2U() macro</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-43894-jq-overflow/</link><pubDate>Wed, 13 May 2026 07:32:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-43894-jq-overflow/</guid><description>CVE-2026-43894 is a vulnerability related to jq involving a wild stack write via signed-integer overflow in the decNumber D2U() macro.</description><content:encoded><![CDATA[<p>CVE-2026-43894 is a critical vulnerability affecting jq, a lightweight and flexible command-line JSON processor. The vulnerability stems from a signed-integer overflow within the <code>decNumber D2U()</code> macro, leading to a wild stack write. This flaw can be exploited to potentially overwrite sensitive data on the stack, possibly leading to arbitrary code execution. Attackers could leverage this overflow by crafting malicious JSON input designed to trigger the overflow when processed by jq. Successful exploitation of this vulnerability could lead to unauthorized access, data breaches, or system compromise. Defenders should prioritize patching or mitigating this vulnerability to prevent potential attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious JSON input specifically designed to trigger a signed-integer overflow in the <code>decNumber D2U()</code> macro within the jq application.</li>
<li>The attacker provides the malicious JSON input to the jq application as an argument or via standard input.</li>
<li>jq processes the JSON input, and the <code>decNumber D2U()</code> macro is invoked during the parsing or processing of the JSON data.</li>
<li>The signed-integer overflow occurs within the <code>decNumber D2U()</code> macro, leading to an incorrect calculation of memory allocation size.</li>
<li>The incorrect size leads to a write operation that goes beyond the intended boundaries of the stack buffer, causing a wild stack write.</li>
<li>The wild stack write overwrites sensitive data on the stack, such as return addresses or function pointers.</li>
<li>If the attacker has successfully overwritten a return address or function pointer, the execution flow can be redirected to an attacker-controlled address.</li>
<li>The attacker gains arbitrary code execution within the context of the jq application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-43894 can lead to arbitrary code execution. The vulnerability impacts any system running a vulnerable version of jq. This can result in a complete compromise of the affected system, allowing attackers to steal sensitive information, install malware, or perform other malicious activities. The affected sectors would be those utilizing the jq utility for JSON processing. The number of potential victims depends on the prevalence of the vulnerable jq version.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade jq to the latest patched version that addresses CVE-2026-43894 to remediate the vulnerability.</li>
<li>Deploy the Sigma rules provided below to your SIEM to detect potential exploitation attempts of CVE-2026-43894.</li>
<li>Monitor systems utilizing jq for unusual behavior, such as unexpected crashes or unauthorized access attempts, using process_creation and file_event logs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>jq</category><category>overflow</category><category>stack write</category></item></channel></rss>