Upstream information
CVE-2024-28176 at MITRE
Description
jose is JavaScript module for JSON Object Signing and Encryption, providing support for JSON Web Tokens (JWT), JSON Web Signature (JWS), JSON Web Encryption (JWE), JSON Web Key (JWK), JSON Web Key Set (JWKS), and more. A vulnerability has
been identified in the JSON Web Encryption (JWE) decryption interfaces, specifically related to the support for decompressing plaintext after its decryption. Under certain conditions it is possible to have the user's environment consume unreasonable amount of CPU time or memory during JWE Decryption operations. This issue has been patched in versions 2.0.7 and 4.15.5.
SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having moderate severity.
No SUSE Bugzilla entries cross referenced.
No SUSE Security Announcements cross referenced.
List of released packages
Product(s) | Fixed package version(s) | References |
SUSE Liberty Linux 8 | aardvark-dns >= 1.10.0-1.module+el8.10.0+21962+8143777b
buildah >= 1.33.7-2.module+el8.10.0+21962+8143777b
buildah-tests >= 1.33.7-2.module+el8.10.0+21962+8143777b
cockpit-podman >= 84.1-1.module+el8.10.0+21962+8143777b
conmon >= 2.1.10-1.module+el8.10.0+21962+8143777b
container-selinux >= 2.229.0-2.module+el8.10.0+21962+8143777b
containernetworking-plugins >= 1.4.0-2.module+el8.10.0+21962+8143777b
containers-common >= 1-81.module+el8.10.0+21962+8143777b
crit >= 3.18-5.module+el8.10.0+21962+8143777b
criu >= 3.18-5.module+el8.10.0+21962+8143777b
criu-devel >= 3.18-5.module+el8.10.0+21962+8143777b
criu-libs >= 3.18-5.module+el8.10.0+21962+8143777b
crun >= 1.14.3-2.module+el8.10.0+21962+8143777b
fuse-overlayfs >= 1.13-1.module+el8.10.0+21962+8143777b
jose >= 10-2.el8_10.3
libjose >= 10-2.el8_10.3
libjose-devel >= 10-2.el8_10.3
libslirp >= 4.4.0-2.module+el8.10.0+21962+8143777b
libslirp-devel >= 4.4.0-2.module+el8.10.0+21962+8143777b
netavark >= 1.10.3-1.module+el8.10.0+21962+8143777b
oci-seccomp-bpf-hook >= 1.2.10-1.module+el8.10.0+21962+8143777b
podman >= 4.9.4-3.module+el8.10.0+21974+acd2159c
podman-catatonit >= 4.9.4-3.module+el8.10.0+21974+acd2159c
podman-docker >= 4.9.4-3.module+el8.10.0+21974+acd2159c
podman-gvproxy >= 4.9.4-3.module+el8.10.0+21974+acd2159c
podman-plugins >= 4.9.4-3.module+el8.10.0+21974+acd2159c
podman-remote >= 4.9.4-3.module+el8.10.0+21974+acd2159c
podman-tests >= 4.9.4-3.module+el8.10.0+21974+acd2159c
python3-criu >= 3.18-5.module+el8.10.0+21962+8143777b
python3-podman >= 4.9.0-1.module+el8.10.0+21962+8143777b
runc >= 1.1.12-1.module+el8.10.0+21974+acd2159c
skopeo >= 1.14.3-2.module+el8.10.0+21962+8143777b
skopeo-tests >= 1.14.3-2.module+el8.10.0+21962+8143777b
slirp4netns >= 1.2.3-1.module+el8.10.0+21962+8143777b
toolbox >= 0.0.99.5-2.module+el8.10.0+21962+8143777b
toolbox-tests >= 0.0.99.5-2.module+el8.10.0+21962+8143777b
udica >= 0.2.6-21.module+el8.10.0+21962+8143777b
| Patchnames: RHSA-2024:3968 RHSA-2024:5294 |
SUSE Liberty Linux 9 | buildah >= 1.33.7-2.el9_4
buildah-tests >= 1.33.7-2.el9_4
podman >= 4.9.4-4.el9_4
podman-docker >= 4.9.4-4.el9_4
podman-plugins >= 4.9.4-4.el9_4
podman-remote >= 4.9.4-4.el9_4
podman-tests >= 4.9.4-4.el9_4
| Patchnames: RHSA-2024:3826 RHSA-2024:3827 |
SUSE Timeline for this CVE
CVE page created: Sat Mar 9 03:00:04 2024
CVE page last modified: Wed Oct 9 17:55:37 2024