[RHSA-2024:5294] jose security update
Severity
Moderate
Affected Packages
14
CVEs
2
Jose is a C-language implementation of the Javascript Object Signing and Encryption standards. The jose package is a dependency of the clevis and tang packages, together providing Network Bound Disk Encryption (NBDE) in Red Hat Enterprise Linux.
Security Fix(es):
jose: resource exhaustion (CVE-2024-28176)
jose: Denial of service due to uncontrolled CPU consumption (CVE-2023-50967)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- ID
- RHSA-2024:5294
- Severity
- moderate
- URL
- https://access.redhat.com/errata/RHSA-2024:5294
- Published
-
2024-08-13T00:00:00
(5 weeks ago) - Modified
-
2024-08-13T00:00:00
(5 weeks ago) - Rights
- Copyright 2024 Red Hat, Inc.
- Other Advisories
-
- ALAS2-2024-2529
- ALSA-2024:3826
- ALSA-2024:3827
- ALSA-2024:3968
- ALSA-2024:5294
- ELSA-2024-3826
- ELSA-2024-3827
- ELSA-2024-3968
- ELSA-2024-5294
- FEDORA-2024-22f1e313dd
- FEDORA-2024-2cface5aba
- FEDORA-2024-453ee0b3b9
- FEDORA-2024-529fe8a802
- FEDORA-2024-560a7aca85
- FEDORA-2024-831bad8f8f
- FEDORA-2024-a94b67a7b2
- FEDORA-2024-f98bdff610
- FREEBSD:02BE46C1-F7CC-11EE-AA6B-B42E991FC52E
- NPM:GHSA-HHHV-Q57G-882Q
- RHSA-2024:3826
- RHSA-2024:3827
- RHSA-2024:3968
- RLSA-2024:3826
- RLSA-2024:3827
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2268820 | https://bugzilla.redhat.com/2268820 | |
Bugzilla | 2270538 | https://bugzilla.redhat.com/2270538 | |
RHSA | RHSA-2024:5294 | https://access.redhat.com/errata/RHSA-2024:5294 | |
CVE | CVE-2023-50967 | https://access.redhat.com/security/cve/CVE-2023-50967 | |
CVE | CVE-2024-28176 | https://access.redhat.com/security/cve/CVE-2024-28176 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/libjose?arch=x86_64&distro=redhat-8.10 | redhat | libjose | < 10-2.el8_10.3 | redhat-8.10 | x86_64 | |
Affected | pkg:rpm/redhat/libjose?arch=s390x&distro=redhat-8.10 | redhat | libjose | < 10-2.el8_10.3 | redhat-8.10 | s390x | |
Affected | pkg:rpm/redhat/libjose?arch=ppc64le&distro=redhat-8.10 | redhat | libjose | < 10-2.el8_10.3 | redhat-8.10 | ppc64le | |
Affected | pkg:rpm/redhat/libjose?arch=i686&distro=redhat-8.10 | redhat | libjose | < 10-2.el8_10.3 | redhat-8.10 | i686 | |
Affected | pkg:rpm/redhat/libjose?arch=aarch64&distro=redhat-8.10 | redhat | libjose | < 10-2.el8_10.3 | redhat-8.10 | aarch64 | |
Affected | pkg:rpm/redhat/libjose-devel?arch=x86_64&distro=redhat-8.10 | redhat | libjose-devel | < 10-2.el8_10.3 | redhat-8.10 | x86_64 | |
Affected | pkg:rpm/redhat/libjose-devel?arch=s390x&distro=redhat-8.10 | redhat | libjose-devel | < 10-2.el8_10.3 | redhat-8.10 | s390x | |
Affected | pkg:rpm/redhat/libjose-devel?arch=ppc64le&distro=redhat-8.10 | redhat | libjose-devel | < 10-2.el8_10.3 | redhat-8.10 | ppc64le | |
Affected | pkg:rpm/redhat/libjose-devel?arch=i686&distro=redhat-8.10 | redhat | libjose-devel | < 10-2.el8_10.3 | redhat-8.10 | i686 | |
Affected | pkg:rpm/redhat/libjose-devel?arch=aarch64&distro=redhat-8.10 | redhat | libjose-devel | < 10-2.el8_10.3 | redhat-8.10 | aarch64 | |
Affected | pkg:rpm/redhat/jose?arch=x86_64&distro=redhat-8.10 | redhat | jose | < 10-2.el8_10.3 | redhat-8.10 | x86_64 | |
Affected | pkg:rpm/redhat/jose?arch=s390x&distro=redhat-8.10 | redhat | jose | < 10-2.el8_10.3 | redhat-8.10 | s390x | |
Affected | pkg:rpm/redhat/jose?arch=ppc64le&distro=redhat-8.10 | redhat | jose | < 10-2.el8_10.3 | redhat-8.10 | ppc64le | |
Affected | pkg:rpm/redhat/jose?arch=aarch64&distro=redhat-8.10 | redhat | jose | < 10-2.el8_10.3 | redhat-8.10 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |