Uploaded image for project: 'RESTEasy'
  1. RESTEasy
  2. RESTEASY-3494

[CVE] Upgrade BouncyCastle to 1.78.1

XMLWordPrintable

    • Icon: Component Upgrade Component Upgrade
    • Resolution: Done
    • Icon: Major Major
    • 6.2.9.Final, 7.0.0.Alpha2
    • None
    • None
    • None

      Tag: https://github.com/bcgit/bc-java/releases/tag/r1rv78v1
      Diff: (7.0) https://github.com/bcgit/bc-java/compare/r1rv76...r1rv78v1
      Diff: (6.2) https://github.com/bcgit/bc-java/compare/r1rv75...r1rv78v1

      Release notes: https://www.bouncycastle.org/releasenotes.html#r1rv78d1

      Notice the security advisories included in this release: Release 1.78 deals with the following CVEs:

      CVE-2024-29857 - Importing an EC certificate with specially crafted F2m parameters can cause high CPU usage during parameter evaluation.
      CVE-2024-30171 - Possible timing based leakage in RSA based handshakes due to exception processing eliminated.
      CVE-2024-30172 - Crafted signature and public key can be used to trigger an infinite loop in the Ed25519 verification code.
      CVE-2024-301XX - When endpoint identification is enabled and an SSL socket is not created with an explicit hostname (as happens with HttpsURLConnection), hostname verification could be performed against a DNS-resolved IP address. This has been fixed.

              jperkins-rhn James Perkins
              jperkins-rhn James Perkins
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated:
                Resolved: