UBUNTU-CVE-2023-51775

Source
https://ubuntu.com/security/CVE-2023-51775
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-51775.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2023-51775
Related
Published
2024-02-29T01:42:00Z
Modified
2024-10-15T14:11:52Z
Summary
[none]
Details

The jose4j component before 0.9.4 for Java allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value.

References

Affected packages

Ubuntu:22.04:LTS / libjose4j-java

Package

Name
libjose4j-java
Purl
pkg:deb/ubuntu/libjose4j-java?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.7.7-2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.10 / libjose4j-java

Package

Name
libjose4j-java
Purl
pkg:deb/ubuntu/libjose4j-java?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.7.12-2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.04:LTS / libjose4j-java

Package

Name
libjose4j-java
Purl
pkg:deb/ubuntu/libjose4j-java?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.7.12-1
0.7.12-2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}