vulnerability
Red Hat JBoss EAP: CVE-2024-29857: Out-of-bounds Read
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | Jun 14, 2024 | Sep 19, 2024 | Jun 19, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Jun 14, 2024
Added
Sep 19, 2024
Modified
Jun 19, 2025
Description
An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java) before 1.78, BC Java LTS before 2.73.6, BC-FJA before 1.0.2.5, and BC C# .Net before 2.3.1. Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.. A vulnerability was found in Bouncy Castle. An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java). Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CVE-2024-29857
- https://attackerkb.com/topics/CVE-2024-29857
- URL-https://access.redhat.com/security/cve/CVE-2024-29857
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=2293028
- URL-https://access.redhat.com/errata/RHSA-2024:5143
- URL-https://access.redhat.com/errata/RHSA-2024:5144
- URL-https://access.redhat.com/errata/RHSA-2024:5145
- URL-https://access.redhat.com/errata/RHSA-2024:5147
- URL-https://access.redhat.com/errata/RHSA-2024:5479
- URL-https://access.redhat.com/errata/RHSA-2024:5481
- URL-https://access.redhat.com/errata/RHSA-2024:5482

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.