Bug 2385958 (CVE-2025-45767)

Summary: CVE-2025-45767 jose: Jose Weak Encryption Vulnerability
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aazores, abarbaro, adkhan, alcohan, chfoley, cmah, dhanak, drosa, dsimansk, eaguilar, ebaron, gparvin, gryan, gzaronik, jchui, jhe, jhuff, jkoehler, jolong, jscholz, kingland, ktsao, kverlaen, lphiri, matzew, mnovotny, nboldt, njean, owatkins, pahickey, pjindal, psrna, rhaigner, sausingh, sdawley, swoodman
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in Jose, where the library uses a weak encryption algorithm, allowing an attacker to decrypt sensitive data. A network-based attacker can exploit this vulnerability without authentication. Successful exploitation results in the exposure of confidential information, potentially leading to a significant impact on data confidentiality. This weakness occurs from the use of an insecure cryptographic construction.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OSIDB Bzimport 2025-08-01 15:01:08 UTC
jose v6.0.10 was discovered to contain weak encryption.