我们使用 cookie 来帮助我们改善网页体验。请阅读我们的 Cookie 政策

AS-2025-001: Docker Engine

2025-05-02

Severity

Moderate

Status

Ongoing


Statement

Certain versions of Docker Engine have a security vulnerability about Go JOSE, and the issues have been fixed in the latest release of Docker Engine 28.0.1.

CVE-2025-27144 will affect ASUSTOR products with ADM 4.3 onward which the Docker Engine 27.1.1 is installed. Updates with new Docker Engine version will be released as soon as possible.


Affected Products

Product Severity Fixed Release Availability
ADM 4.3 and above Moderate Ongoing

Detail

  • CVE-2025-27144
    • Severity: Medium
    • Go JOSE provides an implementation of the Javascript Object Signing and Encryption set of standards in Go, including support for JSON Web Encryption (JWE), JSON Web Signature (JWS), and JSON Web Token (JWT) standards. In versions on the 4.x branch prior to version 4.0.5, when parsing compact JWS or JWE input, Go JOSE could use excessive memory. The code used strings.Split(token, ".") to split JWT tokens, which is vulnerable to excessive memory consumption when processing maliciously crafted tokens with a large number of `.` characters. An attacker could exploit this by sending numerous malformed tokens, leading to memory exhaustion and a Denial of Service. Version 4.0.5 fixes this issue. As a workaround, applications could pre-validate that payloads passed to Go JOSE do not contain an excessive number of `.` characters.

Reference


Revision

Revision Date Description
1 2025-05-02 Initial public release.