Vulnerability CVE-2024-29371: Information
Description
In jose4j before 0.9.6, an attacker can cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression.
Severity: HIGH (7.5)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Fixed packages
Package name | Branch | Fixed in version | Version from repository | Errata ID | Task # | State |
|---|---|---|---|---|---|---|
| kafka | sisyphus | 4.2.0-alt2 | 4.2.0-alt4 | ALT-PU-2026-5782-1 | 414376 | Fixed |
| kafka | sisyphus_loongarch64 | 4.2.0-alt3 | 4.2.0-alt4 | ALT-PU-2026-5915-1 | - | Fixed |
| kafka | c10f2 | 4.2.0-alt3 | 3.9.1-alt2.c10.1 | ALT-PU-2026-5788-1 | 414377 | Testing |
References to Advisories, Solutions, and Tools
Hyperlink | Resource |
|---|---|
| https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack |
|
| BDU:2026-01020 | |
| GHSA-3677-xxcr-wjqv |