Bouncy Castle FIPS Java API 1.0.2.3

CPE Details

Bouncy Castle FIPS Java API 1.0.2.3
1.0.2.3
2022-11-29
13h53 +00:00
2022-12-15
15h36 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:bouncycastle:fips_java_api:1.0.2.3:*:*:*:*:*:*:*

Informations

Vendor

bouncycastle

Product

fips_java_api

Version

1.0.2.3

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-33202 2023-11-22 23h00 +00:00 Bouncy Castle for Java before 1.73 contains a potential Denial of Service (DoS) issue within the Bouncy Castle org.bouncycastle.openssl.PEMParser class. This class parses OpenSSL PEM encoded streams containing X.509 certificates, PKCS8 encoded keys, and PKCS7 objects. Parsing a file that has crafted ASN.1 data through the PEMParser causes an OutOfMemoryError, which can enable a denial of service attack. (For users of the FIPS Java API: BC-FJA 1.0.2.3 and earlier are affected; BC-FJA 1.0.2.4 is fixed.)
5.5
Medium
CVE-2022-45146 2022-11-20 23h00 +00:00 An issue was discovered in the FIPS Java API of Bouncy Castle BC-FJA before 1.0.2.4. Changes to the JVM garbage collector in Java 13 and later trigger an issue in the BC-FJA FIPS modules where it is possible for temporary keys used by the module to be zeroed out while still in use by the module, resulting in errors or potential information loss. NOTE: FIPS compliant users are unaffected because the FIPS certification is only for Java 7, 8, and 11.
5.5
Medium