Bug 2404738 (CVE-2025-59043) - CVE-2025-59043 openbao: OpenBao vulnerable to denial of service via malicious JSON request processing
Summary: CVE-2025-59043 openbao: OpenBao vulnerable to denial of service via malicious...
Keywords:
Status: NEW
Alias: CVE-2025-59043
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2404798 2404799 2404800
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-10-17 17:02 UTC by OSIDB Bzimport
Modified: 2025-10-17 20:17 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-10-17 17:02:41 UTC
OpenBao is an open source identity-based secrets management system. In OpenBao versions prior to 2.4.1, JSON objects after decoding may use significantly more memory than their serialized version. It is possible to craft a JSON payload to maximize the factor between serialized memory usage and deserialized memory usage, similar to a zip bomb, with factors reaching approximately 35. This can be used to circumvent the max_request_size configuration parameter which is intended to protect against denial of service attacks. The request body is parsed into a map very early in the request handling chain before authentication, which means an unauthenticated attacker can send a specifically crafted JSON object and cause an out-of-memory crash. Additionally, for requests with large numbers of strings, the audit subsystem can consume large quantities of CPU. The vulnerability is fixed in version 2.4.1.


Note You need to log in before you can comment on or make changes to this bug.