In Connect2id Nimbus JOSE+JWT before 9.37.2, an attacker can cause a denial of service (resource consumption) via a large JWE p2c header value (aka iteration count) for the PasswordBasedDecrypter (PBKDF2) component.
This issue has been addressed in the following products: Red Hat build of Apache Camel 3.20.7 for Spring Boot Via RHSA-2024:6883 https://access.redhat.com/errata/RHSA-2024:6883
This issue has been addressed in the following products: Red Hat build of Apache Camel 4.4.3 for Spring Boot Via RHSA-2024:8064 https://access.redhat.com/errata/RHSA-2024:8064
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9 Via RHSA-2024:8824 https://access.redhat.com/errata/RHSA-2024:8824
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8 Via RHSA-2024:8823 https://access.redhat.com/errata/RHSA-2024:8823
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform Via RHSA-2024:8826 https://access.redhat.com/errata/RHSA-2024:8826
This issue has been addressed in the following products: Streams for Apache Kafka 2.9.0 Via RHSA-2025:2416 https://access.redhat.com/errata/RHSA-2025:2416
This issue has been addressed in the following products: Red Hat AMQ Streams 2.5.2 Via RHSA-2024:6536 https://access.redhat.com/errata/RHSA-2024:6536