A Denial of Service flaw was discovered in Elasticsearch. Using this vulnerability, an unauthenticated attacker could forcibly shut down an Elasticsearch node with a specifically formatted network request. References: https://www.elastic.co/community/security/ https://discuss.elastic.co/t/elastic-stack-7-17-4-and-8-2-1-security-update/305530
Guilherme, I noticed you added plenty of contacts to this bug report. If this is because you intend to use this bug to handle all implementation of ECDSA which do not check R a S parameters of ECDSA for 0, then remove "elasticsearch" from a summary of this bug report. Otherwise, I cannot see a reason why perl-devel should be notified about a bug in a Java library.
As far as I know, the only implementation of ECDSA in Perl packages is perl-CryptX (it bundles a developmental version of libtomcrypt). Other Perl packages should transitively use OpenSSL or perl-CryptX.
Created cadvisor tracking bugs for this issue: Affects: fedora-all [bug 2102999] Created elasticdump tracking bugs for this issue: Affects: epel-all [bug 2102998] Created origin tracking bugs for this issue: Affects: fedora-all [bug 2103000]