Skip to content

Conversation

@poupapaa
Copy link

CVE-2025-63811 is a DoS vulnerability affecting jose2go versions 1.5.0 through 1.7.0. The vulnerability allows an attacker to cause a denial of service via crafted JSON Web Encryption (JWE) tokens with exceptionally high compression ratios (JWT bomb attack).

Changes:

  • Update github.com/dvsekhvalnov/jose2go from v1.5.0 to v1.8.0
  • v1.8.0 adds RSA-OAEP-384 and RSA-OAEP-512 support
  • No breaking changes - fully backward compatible
  • All existing file keyring encryption/decryption continues to work

Security:

  • Resolves CVE-2025-63811 (DoS via JWT bomb)
  • v1.7.0 introduced 250KB decompression limit
  • v1.8.0 includes additional security improvements

Testing:

  • All file keyring tests pass successfully
  • Encryption/decryption operations verified
  • No API changes required

Fixes: CVE-2025-63811

CVE-2025-63811 is a DoS vulnerability affecting jose2go versions 1.5.0
through 1.7.0. The vulnerability allows an attacker to cause a denial of
service via crafted JSON Web Encryption (JWE) tokens with exceptionally
high compression ratios (JWT bomb attack).

Changes:
- Update github.com/dvsekhvalnov/jose2go from v1.5.0 to v1.8.0
- v1.8.0 adds RSA-OAEP-384 and RSA-OAEP-512 support
- No breaking changes - fully backward compatible
- All existing file keyring encryption/decryption continues to work

Security:
- Resolves CVE-2025-63811 (DoS via JWT bomb)
- v1.7.0 introduced 250KB decompression limit
- v1.8.0 includes additional security improvements

Testing:
- All file keyring tests pass successfully
- Encryption/decryption operations verified
- No API changes required

Fixes: CVE-2025-63811
@mbevc1
Copy link

mbevc1 commented Jan 19, 2026

Merged in maintained fork: https://github.com/ByteNess/keyring/

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants