2024-04-02 14:13:23 +00:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
2024-05-09 05:00:33 +00:00
"ID" : "CVE-2024-29857" ,
"STATE" : "PUBLIC"
2024-04-02 14:13:23 +00:00
} ,
2024-05-09 05:00:33 +00:00
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
2024-04-02 14:13:23 +00:00
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2024-05-09 05:00:33 +00:00
"value" : "An issue was discovered in Bouncy Castle Java Cryptography APIs before BC 1.78. Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"refsource" : "MISC" ,
"name" : "https://www.bouncycastle.org/latest_releases.html" ,
"url" : "https://www.bouncycastle.org/latest_releases.html"
2024-04-02 14:13:23 +00:00
}
]
}
}