Metrics
Affected Vendors & Products
Fri, 11 Apr 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat trusted Artifact Signer
|
|
CPEs | cpe:/a:redhat:openshift:4.18::el9 cpe:/a:redhat:trusted_artifact_signer:1.1::el9 |
|
Vendors & Products |
Redhat trusted Artifact Signer
|
Thu, 10 Apr 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:openshift:4.14::el8 |
Thu, 10 Apr 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | golang-jwt is a Go implementation of JSON Web Tokens. Prior to 5.2.2 and 4.5.2, the function parse.ParseUnverified splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request whose Authorization header consists of Bearer followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. This issue is fixed in 5.2.2 and 4.5.2. | golang-jwt is a Go implementation of JSON Web Tokens. Starting in version 3.2.0 and prior to versions 5.2.2 and 4.5.2, the function parse.ParseUnverified splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request whose Authorization header consists of Bearer followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. This issue is fixed in 5.2.2 and 4.5.2. |
References |
|
Wed, 09 Apr 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat openshift
|
|
CPEs | cpe:/a:redhat:openshift:4.17::el9 | |
Vendors & Products |
Redhat openshift
|
Mon, 07 Apr 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhel Eus
|
|
CPEs | cpe:/a:redhat:rhel_eus:9.2 cpe:/a:redhat:rhel_eus:9.4 |
|
Vendors & Products |
Redhat rhel Eus
|
Sat, 05 Apr 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat openshift Distributed Tracing
|
|
CPEs | cpe:/a:redhat:openshift_distributed_tracing:3.5::el8 | |
Vendors & Products |
Redhat openshift Distributed Tracing
|
Sat, 05 Apr 2025 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Sat, 05 Apr 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Sat, 05 Apr 2025 00:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 02 Apr 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat cryostat
|
|
CPEs | cpe:/a:redhat:cryostat:4::el9 | |
Vendors & Products |
Redhat cryostat
|
Fri, 28 Mar 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/a:redhat:enterprise_linux:9 | |
Vendors & Products |
Redhat
Redhat enterprise Linux |
Mon, 24 Mar 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 24 Mar 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Fri, 21 Mar 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | golang-jwt is a Go implementation of JSON Web Tokens. Prior to 5.2.2 and 4.5.2, the function parse.ParseUnverified splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request whose Authorization header consists of Bearer followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. This issue is fixed in 5.2.2 and 4.5.2. | |
Title | jwt-go allows excessive memory allocation during header parsing | |
Weaknesses | CWE-405 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-10T13:03:19.897Z
Reserved: 2025-03-18T18:15:13.849Z
Link: CVE-2025-30204

Updated: 2025-04-04T23:03:13.309Z

Status : Awaiting Analysis
Published: 2025-03-21T22:15:26.420
Modified: 2025-04-10T13:15:52.097
Link: CVE-2025-30204
