Bug 2455470 (CVE-2026-34986)
| Summary: | CVE-2026-34986 github.com/go-jose/go-jose/v3: github.com/go-jose/go-jose/v4: Go JOSE: Denial of Service via crafted JSON Web Encryption (JWE) object | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
| Status: | NEW --- | QA Contact: | |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | unspecified | CC: | aazores, abuckta, adudiak, agarcial, akoudelk, alcohan, anjoseph, anpicker, aoconnor, aprice, asegurap, bdettelb, bparees, caswilli, ckandaga, cmah, crizzo, derez, dfreiber, dhanak, dkuc, doconnor, drosa, drow, dschmidt, dsimansk, dymurray, eaguilar, ebaron, eborisov, eglynn, erezende, eshamard, fdeutsch, gparvin, gtanzill, hasun, ibolton, jaharrin, jbalunas, jburrell, jbuscemi, jcantril, jdobes, jeder, jfula, jjoyce, jkoehler, jlanda, jmatthew, jmitchel, jmontleo, jolong, jowilson, jprabhak, jsamir, jschluet, jsherril, jvasik, kaycoth, kbempah, kgaikwad, kingland, kshier, kverlaen, lball, lbragsta, lchilton, lgamliel, lhh, ljawale, lphiri, luizcosta, manissin, mburns, mgarciac, mnovotny, mstipich, mwringe, ngough, nweather, nyancey, oezr, ometelka, orabin, oramraz, pahickey, pakotvan, pbohmill, pgaikwad, pjindal, ptisnovs, pvasanth, rblanco, rbobbitt, rexwhite, rfreiman, rhaigner, rjohnson, rochandr, rojacob, sakbas, sausingh, sdawley, sfeifer, simaishi, slucidi, smcdonal, smullick, solenoci, sseago, stcannon, sthirugn, stirabos, syedriko, teagle, thason, veshanka, vkarehfa, vkumar, wenshen, whayutin, wtam, xdharmai, xiyuan, yguenane |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: |
A flaw was found in Go JOSE, a library for handling JSON Web Encryption (JWE) objects. A remote attacker could exploit this vulnerability by providing a specially crafted JWE object. When decrypting such an object, if a key wrapping algorithm is specified but the encrypted key field is empty, the application can crash. This leads to a denial of service (DoS), making the affected service unavailable to legitimate users.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2455614, 2455616, 2455618, 2455621, 2455622, 2455624, 2455628, 2455630, 2455636, 2455637, 2455638, 2455639, 2455640, 2455641, 2455642, 2455643, 2455644, 2455645, 2455646, 2455648, 2455649, 2455650, 2455651, 2455652, 2455653, 2455654, 2455655, 2455656, 2455657, 2455658, 2455659, 2455660, 2455661, 2455662, 2455664, 2455666, 2455667, 2455668, 2455669, 2455670, 2455671, 2455673, 2455674, 2455675, 2455676, 2455647, 2455663, 2455665 | ||
| Bug Blocks: | |||
|
Description
OSIDB Bzimport
2026-04-06 17:01:58 UTC
|