CVE-2024-28180

Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). This vulnerability has been patched in versions 4.0.1, 3.0.3 and 2.6.3.
Data Amplification
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.3 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
GitHub_MCNA
4.3 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
CVEADP
---
---
CISA-ADPADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 48%
Debian logo
Debian Releases
Debian Product
Codename
golang-github-go-jose-go-jose
sid
4.0.5-1
fixed
trixie
4.0.5-1
fixed
bookworm
no-dsa
bullseye
no-dsa
golang-gopkg-square-go-jose.v2
bullseye
no-dsa
bookworm
no-dsa
sid
2.6.3-3
fixed
trixie
2.6.3-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
golang-github-go-jose-go-jose
plucky
needs-triage
oracular
needs-triage
noble
needs-triage
mantic
dne
jammy
dne
focal
dne
References