Name | CVE-2016-1000338 |
Description | In Bouncy Castle JCE Provider version 1.55 and earlier the DSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-1418-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
bouncycastle (PTS) | jessie, jessie (lts) | 1.49+dfsg-3+deb8u3 | fixed |
stretch (security) | 1.56-1+deb9u3 | fixed | |
stretch (lts), stretch | 1.56-1+deb9u4 | fixed | |
buster (security), buster, buster (lts) | 1.60-1+deb10u1 | fixed | |
bullseye | 1.68-2 | fixed | |
bookworm | 1.72-2 | fixed | |
sid, trixie | 1.77-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
bouncycastle | source | wheezy | (unfixed) | end-of-life | ||
bouncycastle | source | jessie | 1.49+dfsg-3+deb8u3 | DLA-1418-1 | ||
bouncycastle | source | (unstable) | 1.56-1 |
https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f#diff-3679f5a9d2b939d0d3ee1601a7774fb0