Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upgrade github.com/go-jose/go-jose.v3 to v3.0.3 to address Security vulnerability #18115

Closed
jparsai opened this issue May 7, 2024 · 1 comment
Labels
enhancement New feature or request

Comments

@jparsai
Copy link
Contributor

jparsai commented May 7, 2024

Summary

Argo CD versions v2.9.14, v2.10.9 are pulling vulnarable versions of github.com/go-jose/go-jose.v3.
The 3.0.1 versions of github.com/go-jose/go-jose.v3 is vulnerable to CVE-2024-28180, which has been categorized as Medium.

The recommended solution is to upgrade the version of github.com/go-jose/go-jose.v3 to v3.0.3

Motivation

Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). This vulnerability has been patched in versions 4.0.1, 3.0.3 and 2.6.3.

Proposal

Upgrade the version of github.com/go-jose/go-jose.v3 to v3.0.3 for supported and affected versions of ArgoCD.

@jparsai jparsai added the enhancement New feature or request label May 7, 2024
@jparsai
Copy link
Contributor Author

jparsai commented May 7, 2024

It is addressed by PR #18102, hence closing it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant