CVE-2024-28102

NameCVE-2024-28102
DescriptionJWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3883-1
Debian Bugs1065688

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-jwcrypto (PTS)bullseye0.8.0-1vulnerable
bullseye (security)0.8.0-1+deb11u1fixed
bookworm1.1.0-1+deb12u1fixed
sid, trixie1.5.6-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-jwcryptosourcebullseye0.8.0-1+deb11u1DLA-3883-1
python-jwcryptosourcebookworm1.1.0-1+deb12u1
python-jwcryptosource(unstable)1.5.6-11065688

Notes

https://github.com/latchset/jwcrypto/security/advisories/GHSA-j857-7rvv-vj97
https://github.com/latchset/jwcrypto/commit/90477a3b6e73da69740e00b8161f53fea19b831f (v1.5.6)

Search for package or bug name: Reporting problems