CVE-2024-28180

MEDIUM

jose <4.0.1-<3.0.3-<2.6.3 - Memory Corruption

Title source: llm
STIX 2.1

Description

Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). This vulnerability has been patched in versions 4.0.1, 3.0.3 and 2.6.3.

References (13)

Core 13
Core References

Scores

CVSS v3 4.3
EPSS 0.0486
EPSS Percentile 89.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-409
Status published
Products (6)
fedoraproject/fedora 38 - 40
go-jose/go-jose 0 - 3.0.3Go
go-jose/go-jose 0 - 4.0.1Go
go-jose/go-jose.v2 0 - 2.6.3Go
go-jose_project/go-jose 2.0.0 - 2.6.3
square/go-jose.v2 0Go
Published Mar 09, 2024
Tracked Since Feb 18, 2026