First published: Mon Jul 08 2024(Updated: )
This release of Red Hat build of Quarkus 3.8.5 includes security updates, bug fixes and enhancements. For more information, see the release notes page listed in the References section.<br>Security Fix(es):<br><li> (CVE-2024-29857) org.bouncycastle:bcprov-jdk18on: org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service [quarkus-3.8]</li> <li> (CVE-2024-30172) org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class [quarkus-3.8]</li> <li> (CVE-2024-34447) org.bouncycastle/bcprov-jdk18on: org.bouncycastle: Use of Incorrectly-Resolved Name or Reference [quarkus-3.8]</li> <li> (CVE-2024-30171) org.bouncycastle-bcprov-jdk18on: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) [quarkus-3.8]</li>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Quarkus RESTEasy |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:4326 is classified as critical due to the potential impact of the vulnerabilities it addresses.
To fix RHSA-2024:4326, you should update to the latest version of the Red Hat Quarkus build as specified in the release notes.
RHSA-2024:4326 addresses security vulnerabilities including CVE-2024-29857 related to org.bouncycastle:bcprov-jdk18on.
RHSA-2024:4326 is specifically applicable to the affected version of Red Hat Quarkus and its components as outlined in the advisory.
More information about RHSA-2024:4326 can be found in the Red Hat advisory and related Bugzilla entries.