CVE-2024-28180

EUVD-2024-0896
Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). This vulnerability has been patched in versions 4.0.1, 3.0.3 and 2.6.3.
Data Amplification
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.3 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
GitHub_MCNA
4.3 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 87%
Affected Products (NVD)
VendorProductVersion
go-jose_projectgo-jose
2.0.0 ≤
𝑥
< 2.6.3
go-jose_projectgo-jose
3.0.0 ≤
𝑥
< 3.0.3
go-jose_projectgo-jose
4.0.0 ≤
𝑥
< 4.0.1
fedoraprojectfedora
38 ≤
𝑥
≤ 40
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
golang-github-go-jose-go-jose
bookworm
no-dsa
bullseye
no-dsa
forky
4.0.5-1
fixed
sid
4.0.5-1
fixed
trixie
4.0.5-1
fixed
golang-gopkg-square-go-jose.v2
bookworm
no-dsa
bullseye
no-dsa
forky
2.6.3-3
fixed
sid
2.6.3-3
fixed
trixie
2.6.3-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
golang-github-go-jose-go-jose
focal
dne
jammy
dne
mantic
dne
noble
not-affected
oracular
not-affected
plucky
not-affected
References