​
DirectorySecurity Advisories
Sign In
Security Advisories

CGA-f92w-p726-49xr

Published

Last updated

https://images.chainguard.dev/security/CGA-f92w-p726-49xr
Package

ruby3.3-bouncy-castle-java

Latest Update
Fixed
Fixed Version

1.5.0146.1-r1

Aliases
  • CVE-2024-29857
  • GHSA-8xfc-gm6g-vgpv

Severity

5.3

Medium

CVSS V3

Summary

Bouncy Castle certificate parsing issues cause high CPU usage during parameter evaluation.

Description

An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java) before 1.78, BC Java LTS before 2.73.6, BC-FJA before 1.0.2.5, and BC C# .Net before 2.3.1. Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2024 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard Images