Select your cookie preferences

We use cookies and similar tools to enhance your experience, provide our services, deliver relevant advertising, and make improvements. Approved third parties also use these tools to help us deliver advertising and provide certain site features.

CVE-2025-27144

Public on 2025-02-24
Modified on 2025-03-04
Description

Go JOSE provides an implementation of the Javascript Object Signing and Encryption set of standards in Go, including support for JSON Web Encryption (JWE), JSON Web Signature (JWS), and JSON Web Token (JWT) standards. In versions on the 4.x branch prior to version 4.0.5, when parsing compact JWS or JWE input, Go JOSE could use excessive memory. The code used strings.Split(token, ".") to split JWT tokens, which is vulnerable to excessive memory consumption when processing maliciously crafted tokens with a large number of `.` characters. An attacker could exploit this by sending numerous malformed tokens, leading to memory exhaustion and a Denial of Service. Version 4.0.5 fixes this issue. As a workaround, applications could pre-validate that payloads passed to Go JOSE do not contain an excessive number of `.` characters.

Severity
Medium
See what this means
CVSS v3 Base Score
7.5
See breakdown
Continue reading

Affected Packages

Platform Package Release Date Advisory
Amazon Linux 2 - Aws-nitro-enclaves-cli Extra containerd 2025-04-09 19:43 ALAS2NITRO-ENCLAVES-2025-052
Amazon Linux 2 - Docker Extra containerd 2025-04-09 19:43 ALAS2DOCKER-2025-055
Amazon Linux 2 - Ecs Extra containerd 2025-04-09 19:43 ALAS2ECS-2025-053
Amazon Linux 2023 containerd 2025-04-09 19:43 ALAS2023-2025-930
Amazon Linux 2 - Core nerdctl 2025-04-09 19:45 ALAS2-2025-2821
Amazon Linux 2023 nerdctl 2025-04-09 19:43 ALAS2023-2025-931
Amazon Linux 2 - Docker Extra runfinch-finch 2025-03-26 19:21 ALAS2DOCKER-2025-053
Amazon Linux 2023 runfinch-finch 2025-03-26 20:44 ALAS2023-2025-914

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H