The jose4j component before 0.9.4 for Java allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value. https://bitbucket.org/b_c/jose4j/issues/212
This issue has been addressed in the following products: HawtIO 4.0.0 for Red Hat build of Apache Camel 4 Via RHSA-2024:3550 https://access.redhat.com/errata/RHSA-2024:3550
This issue has been addressed in the following products: RHOSS-1.33-RHEL-8 Via RHSA-2024:4057 https://access.redhat.com/errata/RHSA-2024:4057
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform Via RHSA-2024:4386 https://access.redhat.com/errata/RHSA-2024:4386
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform Via RHSA-2024:4392 https://access.redhat.com/errata/RHSA-2024:4392
This issue has been addressed in the following products: Red Hat build of Apicurio Registry 2.6.1 GA Via RHSA-2024:4873 https://access.redhat.com/errata/RHSA-2024:4873
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9 Via RHSA-2024:8077 https://access.redhat.com/errata/RHSA-2024:8077
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8 Via RHSA-2024:8076 https://access.redhat.com/errata/RHSA-2024:8076
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7 Via RHSA-2024:8075 https://access.redhat.com/errata/RHSA-2024:8075
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform Via RHSA-2024:8080 https://access.redhat.com/errata/RHSA-2024:8080
This issue has been addressed in the following products: Red Hat AMQ Streams 2.5.2 Via RHSA-2024:6536 https://access.redhat.com/errata/RHSA-2024:6536