CVE-2024-29857: Bouncy Castle certificate parsing issues cause high CPU usage during parameter evaluation.
(updated )
An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java) before 1.78, BC Java LTS before 2.73.6, BC-FJA before 1.0.2.5, and BC C# .Net before 2.3.1. Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.
References
- github.com/advisories/GHSA-8xfc-gm6g-vgpv
- github.com/bcgit/bc-csharp/commit/56daa6eac526f165416d17f661422d60de0dfd63
- github.com/bcgit/bc-csharp/wiki/CVE%E2%80%902024%E2%80%9029857
- github.com/bcgit/bc-java/commit/efc498ca4caa340ac2fe11f2efee06c1a294501f
- github.com/bcgit/bc-java/commit/fee80dd230e7fba132d03a34f1dd1d6aae0d0281
- github.com/bcgit/bc-java/wiki/CVE%E2%80%902024%E2%80%9029857
- nvd.nist.gov/vuln/detail/CVE-2024-29857
- security.netapp.com/advisory/ntap-20241206-0008
- www.bouncycastle.org/latest_releases.html
Detect and mitigate CVE-2024-29857 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →