Skip to content

Fix ring security vulnerability by upgrading jsonwebtoken to v10#54

Open
rubenhensen wants to merge 1 commit intomainfrom
fix/ring-security-vulnerability
Open

Fix ring security vulnerability by upgrading jsonwebtoken to v10#54
rubenhensen wants to merge 1 commit intomainfrom
fix/ring-security-vulnerability

Conversation

@rubenhensen
Copy link
Contributor

Summary

  • Fixes security vulnerabilities in the ring crate (CVE affecting versions < 0.17.13)
  • Upgrades jsonwebtoken from v8 to v10 with pure Rust cryptography backend
  • Completely removes ring from the dependency tree

Changes

  • Updated jsonwebtoken from 8.0 → 10.0 with rust_crypto feature
  • Removed ring v0.16.20 dependency entirely
  • Now using pure Rust cryptographic libraries:
    • ed25519-dalek for Ed25519 signatures
    • p256 and p384 for elliptic curve cryptography
    • rsa for RSA operations
    • hmac and sha2 for hashing

Test Plan

  • Code compiles successfully
  • Verified ring is completely removed from dependency tree
  • All existing functionality preserved (jsonwebtoken API unchanged)

Security Impact

This PR resolves Dependabot security alerts for the ring crate. The rust_crypto backend provides equivalent cryptographic functionality using pure Rust implementations.

Closes the Dependabot security alert for ring < 0.17.13

Dependabot detected security vulnerabilities in the ring crate (versions < 0.17.13).
The ring dependency was pulled in by jsonwebtoken v8.x, which could not be updated
to a secure version without breaking changes.

Solution: Upgrade jsonwebtoken from v8 to v10 with the rust_crypto backend,
which uses pure Rust cryptographic libraries instead of ring.

Changes:
- Updated jsonwebtoken from 8.0 to 10 with rust_crypto backend
- Removed ring v0.16.20 from the dependency tree entirely
- Now using pure Rust crypto libraries (ed25519-dalek, p256, p384, rsa, etc.)
- All tests pass and the code compiles successfully

This resolves the security advisory for ring affecting versions < 0.17.13.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant