DEBIAN-CVE-2023-50658

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2023-50658
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-50658.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2023-50658
Upstream
Published
2024-02-29T01:42:01Z
Modified
2025-09-18T05:18:41Z
Summary
[none]
Details

The jose2go component before 1.6.0 for Go allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value.

References

Affected packages

Debian:11

golang-github-dvsekhvalnov-jose2go

Package

Name
golang-github-dvsekhvalnov-jose2go
Purl
pkg:deb/debian/golang-github-dvsekhvalnov-jose2go?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12

golang-github-dvsekhvalnov-jose2go

Package

Name
golang-github-dvsekhvalnov-jose2go
Purl
pkg:deb/debian/golang-github-dvsekhvalnov-jose2go?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13

golang-github-dvsekhvalnov-jose2go

Package

Name
golang-github-dvsekhvalnov-jose2go
Purl
pkg:deb/debian/golang-github-dvsekhvalnov-jose2go?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14

golang-github-dvsekhvalnov-jose2go

Package

Name
golang-github-dvsekhvalnov-jose2go
Purl
pkg:deb/debian/golang-github-dvsekhvalnov-jose2go?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "not yet assigned"
}