CVE-2016-9122

EUVD-2021-0989
go-jose before 1.0.4 suffers from multiple signatures exploitation. The go-jose library supports messages with multiple signatures. However, when validating a signed message the API did not indicate which signature was valid, which could potentially lead to confusion. For example, users of the library might mistakenly read protected header values from an attached signature that was different from the one originally validated.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 53%
Affected Products (NVD)
VendorProductVersion
go-jose_projectgo-jose
𝑥
≤ 1.0.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
golang-gopkg-square-go-jose.v1
bookworm
1.1.2-4
fixed
bullseye
1.1.2-2
fixed
sid
1.1.2-4
fixed
trixie
1.1.2-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
golang-gopkg-square-go-jose.v1
precise
dne
trusty
dne
xenial
dne
yakkety
ignored
zesty
not-affected