Bug 2309764 (CVE-2023-52428) - CVE-2023-52428 nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
Summary: CVE-2023-52428 nimbus-jose-jwt: large JWE p2c header value causes Denial of S...
Keywords:
Status: NEW
Alias: CVE-2023-52428
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-09-04 17:10 UTC by OSIDB Bzimport
Modified: 2025-05-08 17:58 UTC (History)
103 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:6536 0 None None None 2025-03-07 11:29:59 UTC
Red Hat Product Errata RHSA-2024:6883 0 None None None 2024-09-19 16:47:06 UTC
Red Hat Product Errata RHSA-2024:8064 0 None None None 2024-10-14 15:53:48 UTC
Red Hat Product Errata RHSA-2024:8823 0 None None None 2024-11-04 20:12:37 UTC
Red Hat Product Errata RHSA-2024:8824 0 None None None 2024-11-04 20:11:46 UTC
Red Hat Product Errata RHSA-2024:8826 0 None None None 2024-11-04 20:56:46 UTC
Red Hat Product Errata RHSA-2025:2416 0 None None None 2025-03-05 20:59:17 UTC

Description OSIDB Bzimport 2024-09-04 17:10:01 UTC
In Connect2id Nimbus JOSE+JWT before 9.37.2, an attacker can cause a denial of service (resource consumption) via a large JWE p2c header value (aka iteration count) for the PasswordBasedDecrypter (PBKDF2) component.

Comment 1 errata-xmlrpc 2024-09-19 16:47:01 UTC
This issue has been addressed in the following products:

  Red Hat build of Apache Camel 3.20.7 for Spring Boot

Via RHSA-2024:6883 https://access.redhat.com/errata/RHSA-2024:6883

Comment 2 errata-xmlrpc 2024-10-14 15:53:43 UTC
This issue has been addressed in the following products:

  Red Hat build of Apache Camel 4.4.3 for Spring Boot

Via RHSA-2024:8064 https://access.redhat.com/errata/RHSA-2024:8064

Comment 3 errata-xmlrpc 2024-11-04 20:11:40 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9

Via RHSA-2024:8824 https://access.redhat.com/errata/RHSA-2024:8824

Comment 4 errata-xmlrpc 2024-11-04 20:12:31 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8

Via RHSA-2024:8823 https://access.redhat.com/errata/RHSA-2024:8823

Comment 5 errata-xmlrpc 2024-11-04 20:56:41 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2024:8826 https://access.redhat.com/errata/RHSA-2024:8826

Comment 7 errata-xmlrpc 2025-03-05 20:59:12 UTC
This issue has been addressed in the following products:

  Streams for Apache Kafka 2.9.0

Via RHSA-2025:2416 https://access.redhat.com/errata/RHSA-2025:2416

Comment 8 errata-xmlrpc 2025-03-07 11:29:53 UTC
This issue has been addressed in the following products:

  Red Hat AMQ Streams 2.5.2

Via RHSA-2024:6536 https://access.redhat.com/errata/RHSA-2024:6536


Note You need to log in before you can comment on or make changes to this bug.