Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 927310 (CVE-2023-50966) - dev-erlang/jose: DoS via a large p2c value in a JOSE header
Summary: dev-erlang/jose: DoS via a large p2c value in a JOSE header
Status: UNCONFIRMED
Alias: CVE-2023-50966
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://cve.mitre.org/cgi-bin/cvename...
Whiteboard: B3 [ebuild]
Keywords: PullRequest
Depends on:
Blocks:
 
Reported: 2024-03-19 20:38 UTC by Randy Barlow
Modified: 2024-04-22 02:08 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Randy Barlow 2024-03-19 20:38:57 UTC
See https://github.com/potatosalad/erlang-jose/issues/156

Reproducible: Always
Comment 1 Christopher Fore 2024-04-21 19:08:18 UTC
It looks like this has been fixed in 1.11.8(7?), the maintainer commented on an issue and said 1.11.8 but the Changelog says 1.11.7:

https://github.com/potatosalad/erlang-jose/issues/156#issuecomment-2041536683
https://github.com/potatosalad/erlang-jose/blob/main/CHANGELOG.md#1117-2024-04-07

Might be best to bump to >1.11.7 to be safe.