CVE-2025-63811

NameCVE-2025-63811
DescriptionAn issue was discovered in dvsekhvalnov jose2go 1.5.0 thru 1.7.0 allowing an attacker to cause a Denial-of-Service (DoS) via crafted JSON Web Encryption (JWE) token with an exceptionally high compression ratio.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1120701

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
golang-github-dvsekhvalnov-jose2go (PTS)forky, sid, bookworm, bullseye, trixie1.5-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
golang-github-dvsekhvalnov-jose2gosource(unstable)(unfixed)1120701

Notes

[trixie] - golang-github-dvsekhvalnov-jose2go <no-dsa> (Minor issue)
[bookworm] - golang-github-dvsekhvalnov-jose2go <no-dsa> (Minor issue)
[bullseye] - golang-github-dvsekhvalnov-jose2go <postponed> (Limited support, minor issue, follow bookworm DSAs/point-releases)
https://github.com/dvsekhvalnov/jose2go/issues/33

Search for package or bug name: Reporting problems