Bouncy Castle for Java before 1.73 contains a potential Denial of Service (DoS) issue within the Bouncy Castle org.bouncycastle.openssl.PEMParser class. This class parses OpenSSL PEM encoded streams containing X.509 certificates, PKCS8 encoded keys, and PKCS7 objects. Parsing a file that has crafted ASN.1 data through the PEMParser causes an OutOfMemoryError, which can enable a denial of service attack. References: https://bouncycastle.org https://github.com/bcgit/bc-java/wiki/CVE-2023-33202
Created log4j tracking bugs for this issue: Affects: fedora-all [bug 2251282] Created openas2 tracking bugs for this issue: Affects: fedora-all [bug 2251283]
Created apache-sshd tracking bugs for this issue: Affects: fedora-all [bug 2251284]
after scouring the codebase,i don't see how satellite could possibly be affected by this vulnerability, marking this as not affected.
This issue has been addressed in the following products: Red Hat AMQ Streams 2.7.0 Via RHSA-2024:3527 https://access.redhat.com/errata/RHSA-2024:3527