Bug 2279227 (CVE-2024-34447) - CVE-2024-34447 org.bouncycastle: Use of Incorrectly-Resolved Name or Reference
Summary: CVE-2024-34447 org.bouncycastle: Use of Incorrectly-Resolved Name or Reference
Keywords:
Status: NEW
Alias: CVE-2024-34447
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2279228
TreeView+ depends on / blocked
 
Reported: 2024-05-06 03:30 UTC by Avinash Hanwate
Modified: 2025-05-06 13:04 UTC (History)
79 users (show)

Fixed In Version: BC 1.78
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:4271 0 None None None 2024-07-02 16:23:57 UTC
Red Hat Product Errata RHSA-2024:4326 0 None None None 2024-07-08 14:13:02 UTC

Description Avinash Hanwate 2024-05-06 03:30:28 UTC
An issue was discovered in Bouncy Castle Java Cryptography APIs before BC 1.78. When endpoint identification is enabled in the BCJSSE and an SSL socket is created without an explicit hostname (as happens with HttpsURLConnection), hostname verification could be performed against a DNS-resolved IP address in some situations, opening up a possibility of DNS poisoning.

https://www.bouncycastle.org/latest_releases.html

Comment 4 errata-xmlrpc 2024-07-02 16:23:52 UTC
This issue has been addressed in the following products:

  Red Hat JBoss AMQ

Via RHSA-2024:4271 https://access.redhat.com/errata/RHSA-2024:4271

Comment 5 errata-xmlrpc 2024-07-08 14:12:58 UTC
This issue has been addressed in the following products:

  Red Hat build of Quarkus 3.8.5

Via RHSA-2024:4326 https://access.redhat.com/errata/RHSA-2024:4326


Note You need to log in before you can comment on or make changes to this bug.