mirror of
https://github.com/hierynomus/sshj.git
synced 2025-12-06 07:10:53 +03:00
Update bouncyCastle to 1.78 to mitigate CVE-2024-29857 (#938)
Bouncy Caste version before 1.78 have CVE-2024-29857 - Importing an EC certificate with specially crafted F2m parameters can cause high CPU usage during parameter evaluation. Is sshj impacted by this vulnerability?
This commit is contained in:
@@ -41,7 +41,7 @@ compileJava {
|
||||
|
||||
configurations.implementation.transitive = false
|
||||
|
||||
def bouncycastleVersion = "1.75"
|
||||
def bouncycastleVersion = "1.78"
|
||||
def sshdVersion = "2.10.0"
|
||||
|
||||
dependencies {
|
||||
|
||||
Reference in New Issue
Block a user