Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-30172

Опубликовано: 14 мая 2024
Источник: debian

Описание

An issue was discovered in Bouncy Castle Java Cryptography APIs before 1.78. An Ed25519 verification code infinite loop can occur via a crafted signature and public key.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
bouncycastlefixed1.80-1package
bouncycastleno-dsabookwormpackage
bouncycastleno-dsabullseyepackage
bouncycastlepostponedbusterpackage

Примечания

  • https://github.com/bcgit/bc-java/issues/1599

  • Fixed by: https://github.com/bcgit/bc-java/commit/9c165791b68a204678b48ec11e4e579754c2ea49 (r1rv78v1)

  • Addional hardening: https://github.com/bcgit/bc-java/commit/ebe1c75579170072dc59b8dee2b55ce31663178f (r1rv78v1)

  • https://github.com/bcgit/bc-java/wiki/CVE%E2%80%902024%E2%80%9030172

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 1 года назад

An issue was discovered in Bouncy Castle Java Cryptography APIs before 1.78. An Ed25519 verification code infinite loop can occur via a crafted signature and public key.

CVSS3: 7.5
redhat
больше 1 года назад

An issue was discovered in Bouncy Castle Java Cryptography APIs before 1.78. An Ed25519 verification code infinite loop can occur via a crafted signature and public key.

CVSS3: 7.5
nvd
больше 1 года назад

An issue was discovered in Bouncy Castle Java Cryptography APIs before 1.78. An Ed25519 verification code infinite loop can occur via a crafted signature and public key.

CVSS3: 5.3
github
больше 1 года назад

Bouncy Castle crafted signature and public key can be used to trigger an infinite loop

CVSS3: 7.5
fstec
больше 1 года назад

Уязвимость компонента Cryptography APIs средства криптографической защиты Bouncy Castle, позволяющая нарушителю раскрыть защищаемую информацию