Bug 2452531 (CVE-2026-33996) - CVE-2026-33996 LibJWT: LibJWT: Denial of Service via crafted JSON Web Key (JWK) files
Summary: CVE-2026-33996 LibJWT: LibJWT: Denial of Service via crafted JSON Web Key (JW...
Keywords:
Status: NEW
Alias: CVE-2026-33996
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-27 23:01 UTC by OSIDB Bzimport
Modified: 2026-03-29 07:39 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-03-27 23:01:49 UTC
LibJWT is a C JSON Web Token Library. Starting in version 3.0.0 and prior to version 3.3.0, the JWK parsing for RSA-PSS did not protect against a NULL value when expecting to parse JSON string values. A specially crafted JWK file could exploit this behavior by using integers in places where the code expected a string. This was fixed in v3.3.0. A workaround is available. Users importing keys through a JWK file should not do so from untrusted sources. Use the `jwk2key` tool to check for validity of a JWK file. Likewise, if possible, do not use JWK files with RSA-PSS keys.


Note You need to log in before you can comment on or make changes to this bug.