CVE-2023-37464

NameCVE-2023-37464
DescriptionOpenIDC/cjose is a C library implementing the Javascript Object Signing and Encryption (JOSE). The AES GCM decryption routine incorrectly uses the Tag length from the actual Authentication Tag provided in the JWE. The spec says that a fixed length of 16 octets must be applied. Therefore this bug allows an attacker to provide a truncated Authentication Tag and to modify the JWE accordingly. Users should upgrade to a version >= 0.6.2.2. Users unable to upgrade should avoid using AES GCM encryption and replace it with another encryption algorithm (e.g. AES CBC).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3515-1, DSA-5472-1
Debian Bugs1041423

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
cjose (PTS)buster0.6.1+dfsg1-1vulnerable
buster (security)0.6.1+dfsg1-1+deb10u1fixed
bullseye (security), bullseye0.6.1+dfsg1-1+deb11u1fixed
bookworm, bookworm (security)0.6.2.1-1+deb12u1fixed
sid, trixie0.6.2.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cjosesourcebuster0.6.1+dfsg1-1+deb10u1DLA-3515-1
cjosesourcebullseye0.6.1+dfsg1-1+deb11u1DSA-5472-1
cjosesourcebookworm0.6.2.1-1+deb12u1DSA-5472-1
cjosesource(unstable)0.6.2.2-11041423

Notes

https://github.com/OpenIDC/cjose/security/advisories/GHSA-3rhg-3gf2-6xgj
https://github.com/OpenIDC/cjose/commit/7325e9a5e71e2fc0e350487ecac7d84acdf0ed5e (v0.6.2.2)

Search for package or bug name: Reporting problems