Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-28180

Опубликовано: 09 мар. 2024
Источник: redhat
CVSS3: 4.3
EPSS Низкий

Описание

Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). This vulnerability has been patched in versions 4.0.1, 3.0.3 and 2.6.3.

A vulnerability was found in Jose due to improper handling of highly compressed data. This issue could allow an attacker to send a JWE containing compressed data that uses large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
cert-manager Operator for Red Hat OpenShiftcert-manager/jetstack-cert-manager-rhel9Not affected
Migration Toolkit for Applications 6mta/mta-hub-rhel8Will not fix
Migration Toolkit for Applications 6mta/mta-windup-addon-rhel9Will not fix
Multicluster Engine for Kubernetesmulticluster-engine/agent-service-rhel8Not affected
Multicluster Engine for Kubernetesmulticluster-engine/assisted-installer-agent-rhel8Not affected
Multicluster Engine for Kubernetesmulticluster-engine/assisted-installer-rhel8Not affected
Multicluster Engine for Kubernetesmulticluster-engine/console-mce-rhel8Not affected
Multicluster Engine for Kubernetesmulticluster-engine/hypershift-cli-rhel8Not affected
Multicluster Engine for Kubernetesmulticluster-engine/kube-rbac-proxy-mce-rhel9Not affected
OpenShift API for Data Protectionoadp/oadp-kubevirt-velero-plugin-rhel8Not affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-409
https://bugzilla.redhat.com/show_bug.cgi?id=2268854jose-go: improper handling of highly compressed data

EPSS

Процентиль: 49%
0.00254
Низкий

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
ubuntu
больше 1 года назад

Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). This vulnerability has been patched in versions 4.0.1, 3.0.3 and 2.6.3.

CVSS3: 4.3
nvd
больше 1 года назад

Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). This vulnerability has been patched in versions 4.0.1, 3.0.3 and 2.6.3.

CVSS3: 4.3
msrc
8 месяцев назад

Описание отсутствует

CVSS3: 4.3
debian
больше 1 года назад

Package jose aims to provide an implementation of the Javascript Objec ...

suse-cvrf
5 месяцев назад

Security update for apptainer

EPSS

Процентиль: 49%
0.00254
Низкий

4.3 Medium

CVSS3