vulnerability
Alma Linux: CVE-2024-28180: Moderate: skopeo security and bug fix update (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:L/Au:S/C:N/I:N/A:P) | Mar 9, 2024 | May 8, 2024 | Apr 17, 2026 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:N/I:N/A:P)
Published
Mar 9, 2024
Added
May 8, 2024
Modified
Apr 17, 2026
Description
Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). This vulnerability has been patched in versions 4.0.1, 3.0.3 and 2.6.3.
Solutions
alma-upgrade-aardvark-dnsalma-upgrade-buildahalma-upgrade-buildah-testsalma-upgrade-cockpit-podmanalma-upgrade-conmonalma-upgrade-container-selinuxalma-upgrade-containernetworking-pluginsalma-upgrade-containers-commonalma-upgrade-critalma-upgrade-criualma-upgrade-criu-develalma-upgrade-criu-libsalma-upgrade-crunalma-upgrade-fuse-overlayfsalma-upgrade-libslirpalma-upgrade-libslirp-develalma-upgrade-netavarkalma-upgrade-oci-seccomp-bpf-hookalma-upgrade-podmanalma-upgrade-podman-catatonitalma-upgrade-podman-dockeralma-upgrade-podman-gvproxyalma-upgrade-podman-pluginsalma-upgrade-podman-remotealma-upgrade-podman-testsalma-upgrade-python3-criualma-upgrade-python3-podmanalma-upgrade-runcalma-upgrade-skopeoalma-upgrade-skopeo-testsalma-upgrade-slirp4netnsalma-upgrade-toolboxalma-upgrade-toolbox-testsalma-upgrade-udica
References
- CVE-2024-28180
- https://attackerkb.com/topics/CVE-2024-28180
- CWE-409
- EUVD-EUVD-2024-0896
- https://errata.almalinux.org/8/ALSA-2024-3254.html
- https://errata.almalinux.org/8/ALSA-2024-3968.html
- https://errata.almalinux.org/9/ALSA-2024-2549.html
- https://errata.almalinux.org/9/ALSA-2024-3826.html
- https://errata.almalinux.org/9/ALSA-2024-3827.html
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2024-0896
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.