Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-59193.json
JSON Data
https://api.osv.dev/v1/vulns/AZL-59193
Upstream
Published
2025-03-21T22:15:26Z
Modified
2026-04-21T04:37:13.243579Z
Summary
CVE-2025-30204 affecting package application-gateway-kubernetes-ingress for versions less than 1.7.7-2
Details

golang-jwt is a Go implementation of JSON Web Tokens. Starting in version 3.2.0 and prior to versions 5.2.2 and 4.5.2, the function parse.ParseUnverified splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request whose Authorization header consists of Bearer followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. This issue is fixed in 5.2.2 and 4.5.2.

References

Affected packages

Azure Linux:3 / application-gateway-kubernetes-ingress

Package

Name
application-gateway-kubernetes-ingress
Purl
pkg:rpm/azure-linux/application-gateway-kubernetes-ingress

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.7-2

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-59193.json"