Skip to content

fix(deps): Update module github.com/go-jose/go-jose/v4 to v4.0.5 [SECURITY]#20722

Merged
kodiakhq[bot] merged 1 commit intomainfrom
renovate/go-github.com-go-jose-go-jose-v4-vulnerability
May 6, 2025
Merged

fix(deps): Update module github.com/go-jose/go-jose/v4 to v4.0.5 [SECURITY]#20722
kodiakhq[bot] merged 1 commit intomainfrom
renovate/go-github.com-go-jose-go-jose-v4-vulnerability

Conversation

@cq-bot
Copy link
Copy Markdown
Contributor

@cq-bot cq-bot commented May 6, 2025

This PR contains the following updates:

Package Type Update Change
github.com/go-jose/go-jose/v4 indirect patch v4.0.4 -> v4.0.5

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.

GitHub Vulnerability Alerts

CVE-2025-27144

Impact

When parsing compact JWS or JWE input, go-jose could use excessive memory. The code used strings.Split(token, ".") to split JWT tokens, which is vulnerable to excessive memory consumption when processing maliciously crafted tokens with a large number of '.' characters. An attacker could exploit this by sending numerous malformed tokens, leading to memory exhaustion and a Denial of Service.

Patches

Version 4.0.5 fixes this issue

Workarounds

Applications could pre-validate payloads passed to go-jose do not contain an excessive number of '.' characters.

References

This is the same sort of issue as in the golang.org/x/oauth2/jws package as CVE-2025-22868 and Go issue https://go.dev/issue/71490.


Release Notes

go-jose/go-jose (github.com/go-jose/go-jose/v4)

v4.0.5

Compare Source

What's Changed

Fixes GHSA-c6gw-w398-hv78

Various other dependency updates, small fixes, and documentation updates in the full changelog

New Contributors

Full Changelog: go-jose/go-jose@v4.0.4...v4.0.5


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@cq-bot cq-bot added automerge Automatically merge once required checks pass security labels May 6, 2025
@cq-bot
Copy link
Copy Markdown
Contributor Author

cq-bot commented May 6, 2025

/gen sha=a3d882c215d4e57722928a0d7234cf4b73426899 dir=plugins/destination/gcs

@kodiakhq kodiakhq bot merged commit afce47a into main May 6, 2025
16 checks passed
@kodiakhq kodiakhq bot deleted the renovate/go-github.com-go-jose-go-jose-v4-vulnerability branch May 6, 2025 12:27
kodiakhq bot pushed a commit that referenced this pull request May 8, 2025
🤖 I have created a release *beep* *boop*
---


## [5.4.17](plugins-destination-gcs-v5.4.16...plugins-destination-gcs-v5.4.17) (2025-05-08)


### Bug Fixes

* **deps:** Update module github.com/cloudquery/plugin-sdk/v4 to v4.79.1 ([#20692](#20692)) ([50f909e](50f909e))
* **deps:** Update module github.com/go-jose/go-jose/v4 to v4.0.5 [SECURITY] ([#20722](#20722)) ([afce47a](afce47a))

---
This PR was generated with [Release Please](https://github.com/googleapis/release-please). See [documentation](https://github.com/googleapis/release-please#release-please).
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

area/plugin/destination/gcs automerge Automatically merge once required checks pass security

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant