UBUNTU-CVE-2025-30204

Source
https://ubuntu.com/security/CVE-2025-30204
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-30204.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2025-30204
Upstream
Published
2025-03-21T22:15:00Z
Modified
2025-07-18T17:03:41Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

golang-jwt is a Go implementation of JSON Web Tokens. Starting in version 3.2.0 and prior to versions 5.2.2 and 4.5.2, the function parse.ParseUnverified splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request whose Authorization header consists of Bearer followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. This issue is fixed in 5.2.2 and 4.5.2.

References

Affected packages

Ubuntu:22.04:LTS / golang-github-golang-jwt-jwt

Package

Name
golang-github-golang-jwt-jwt
Purl
pkg:deb/ubuntu/golang-github-golang-jwt-jwt@4.2.0-1ubuntu0.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.1.0-1
4.1.0-2
4.2.0-1
4.2.0-1ubuntu0.1

Ubuntu:24.04:LTS / golang-github-golang-jwt-jwt

Package

Name
golang-github-golang-jwt-jwt
Purl
pkg:deb/ubuntu/golang-github-golang-jwt-jwt@5.0.0+really4.5.0-1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.4.3-1build1

5.*

5.0.0+really4.5.0-1

Ubuntu:24.04:LTS / golang-github-golang-jwt-jwt-v5

Package

Name
golang-github-golang-jwt-jwt-v5
Purl
pkg:deb/ubuntu/golang-github-golang-jwt-jwt-v5@5.2.0-2?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.2.0-2