Name | CVE-2016-1000346 |
Description | In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in use. As of release 1.56 the key parameters are checked on agreement calculation. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-1418-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
bouncycastle (PTS) | jessie, jessie (lts) | 1.49+dfsg-3+deb8u3 | fixed |
stretch (security) | 1.56-1+deb9u3 | fixed | |
stretch (lts), stretch | 1.56-1+deb9u4 | fixed | |
buster (security), buster, buster (lts) | 1.60-1+deb10u1 | fixed | |
bullseye | 1.68-2 | fixed | |
bookworm | 1.72-2 | fixed | |
sid, trixie | 1.77-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
bouncycastle | source | wheezy | (unfixed) | end-of-life | ||
bouncycastle | source | jessie | 1.49+dfsg-3+deb8u3 | DLA-1418-1 | ||
bouncycastle | source | (unstable) | 1.56-1 |
https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937