CVE-2024-30172: Bouncy Castle crafted signature and public key can be used to trigger an infinite loop
(updated )
An issue was discovered in Bouncy Castle Java Cryptography APIs starting in 1.73 and before 1.78. An Ed25519 verification code infinite loop can occur via a crafted signature and public key.
References
- github.com/advisories/GHSA-m44j-cfrm-g8qc
- github.com/bcgit/bc-csharp/wiki/CVE%E2%80%902024%E2%80%9030172
- github.com/bcgit/bc-java/commit/1b9fd9b545e691bfb3941a9f6a797660c8860f02
- github.com/bcgit/bc-java/commit/9c165791b68a204678b48ec11e4e579754c2ea49
- github.com/bcgit/bc-java/commit/ebe1c75579170072dc59b8dee2b55ce31663178f
- github.com/bcgit/bc-java/wiki/CVE%E2%80%902024%E2%80%9030172
- nvd.nist.gov/vuln/detail/CVE-2024-30172
- security.netapp.com/advisory/ntap-20240614-0007
- www.bouncycastle.org/latest_releases.html
Detect and mitigate CVE-2024-30172 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →