Search for packages
| purl | pkg:rpm/redhat/eap8-yasson@3.0.3-3.redhat_00002.1?arch=el8eap |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-8mj8-rxf8-qyau
Aliases: CVE-2024-29371 GHSA-3677-xxcr-wjqv |
jose4j is vulnerable to DoS via compressed JWE content In jose4j before 0.9.6, an attacker can cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-05-02T08:57:24.894453+00:00 | RedHat Importer | Affected by | VCID-8mj8-rxf8-qyau | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29371.json | 38.6.0 |
| 2026-04-01T13:33:28.255969+00:00 | RedHat Importer | Affected by | VCID-8mj8-rxf8-qyau | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29371.json | 38.0.0 |