Package: jq
Version: 1.6-2.1
Followup-For: Bug #878091
X-Debbugs-Cc: t...@mirbsd.de
Still pertinent in latest version:
$ echo '[.1,0.2]' | jq -c .
[0.1,0.2]
-- System Information:
Debian Release: 11.3
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable-security'),
Package: jq
Version: 1.5+dfsg-2+b1
Followup-For: Bug #878091
Same:
$ echo '[.1,0.2]' | jq -c .
[0.1,0.2]
With no flag to turn this off, I’d almost consider this serious.
-- System Information:
Debian Release: 10.12
APT prefers oldstable-updates
APT policy: (500, 'oldstable-updates'), (500,
Control: forwarded -1 https://github.com/stedolan/jq/issues/1404
--
ChangZhuo Chen (陳昌倬) czchen@{czchen,debconf,debian}.org
http://czchen.info/
Key fingerprint = BA04 346D C2E1 FE63 C790 8793 CC65 B0CD EC27 5D5B
signature.asc
Description: PGP signature
Package: jq
Version: 1.5+dfsg-2
Severity: important
Tags: upstream
jq silently accepts illegal JSON:
tglase@tglase:~ $ jq <<<'[0,01,2]'
[
0,
1,
2
]
tglase@tglase:~ $ jsn <<<'[0,01,2]'
JSON decoding of input failed: {
"input": "[0,01,2]\n",
"message": "missing comma in Array at offset 0x
4 matches
Mail list logo