JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length.
Created python-jwcrypto tracking bugs for this issue: Affects: fedora-all [bug 2268759]
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:2559 https://access.redhat.com/errata/RHSA-2024:2559
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:3267 https://access.redhat.com/errata/RHSA-2024:3267
This issue has been addressed in the following products: Red Hat Ansible Automation Platform 2.4 for RHEL 9 Red Hat Ansible Automation Platform 2.4 for RHEL 8 Via RHSA-2024:4522 https://access.redhat.com/errata/RHSA-2024:4522