There is a vulnerability in Bouncy Castle Crypto Package For Java that could allow an attacker to cause excessive CPU consumption on the system. The code is used by IBM Process Mining. This bulletin identifies the security fixes to apply to address the vulnerability.
CVEID:CVE-2024-29857
**DESCRIPTION:**The Bouncy Castle Crypto Package For Java is vulnerable to a denial of service, caused by improper input validation. By importing an EC certificate with crafted F2m parameters, a remote attacker could exploit this vulnerability to cause excessive CPU consumption.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/290285 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Affected Product(s) | Version(s) |
---|---|
IBM Process Mining |
1.14.4 IF001, 1.14.4, 1.14.3 IF001, 1.14.3, 1.14.2 IF001, 1.14.2, 1.14.1
Any open source library may be included in one or more sub-components of IBM Process Mining. Open source updates are not always synchronized across all components. The CVE in this bulletin are specifically addressed by
Product(s) | **Version(s) number and/or range ** | Remediation/Fix/Instructions |
---|---|---|
IBM Process Mining on RedHat OpenShift |
1.14.4 IF001, 1.14.4, 1.14.3 IF001, 1.14.3, 1.14.2 IF001, 1.14.2, 1.14.1
| **Install/Upgrade to version 1.15.0
Installing a Production deployment
1.**To deploy a Production deployment, see installing on
RedHat OpenShift Container Platform environments
**Upgrading an Installation **** **1.To perform an upgrade of a Production deployment, see
upgrading in RedHat OpenShift Container Platform
environments
IBM Process Mining traditional|
1.14.4, 1.14.3, 1.14.2, 1.14.1
| **Install/Upgrade to version 1.15.0
** 1.Login to PassPortAdvantage
2.Search for
M0JHZML Process Mining 1.15.0 Server Multiplatform
Multilingual
3.Download package
4.Follow install instructions
5.Repeat for M0JJ0ML Process Mining 1.15.0 Client
Windows Multilingual
| | ** **
None known