​
DirectorySecurity Advisories
Sign In
Security Advisories

CGA-6ffp-4hxf-7q7p

Published

Last updated

https://images.chainguard.dev/security/CGA-6ffp-4hxf-7q7p
Package

temporal

Latest Update
Fixed
Fixed Version

1.1.2-r0

Aliases
  • CVE-2024-28180
  • GHSA-c5q2-7r4c-mv6g

Severity

4.3

Medium

CVSS V3

Summary

Go JOSE vulnerable to Improper Handling of Highly Compressed Data (Data Amplification)

Description

Impact

An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). Thanks to Enze Wang@Alioth and Jianjun Chen@Zhongguancun Lab (@zer0yu and @chenjj) for reporting.

Patches

The problem is fixed in the following packages and versions:

  • github.com/go-jose/go-jose/v4 version 4.0.1
  • github.com/go-jose/go-jose/v3 version 3.0.3
  • gopkg.in/go-jose/go-jose.v2 version 2.6.3

The problem will not be fixed in the following package because the package is archived:

  • gopkg.in/square/go-jose.v2

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2024 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard Images