CVE-2016-1000338

Priority
Description
In Bouncy Castle JCE Provider version 1.55 and earlier the DSA does not
fully validate ASN.1 encoding of signature on verification. It is possible
to inject extra elements in the sequence making up the signature and still
have it validate, which in some cases may allow the introduction of
'invisible' data into a signed structure.
Notes
Package
Upstream:released (1.56-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was released [1.49+dfsg-2ubuntu0.1])
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (1.59-1)
Ubuntu 19.10 (Eoan Ermine):not-affected (1.60-1)
Ubuntu 20.04 (Focal Fossa):not-affected (1.60-1)
Patches:
Upstream:https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f
More Information

Updated: 2020-04-24 03:20:10 UTC (commit d3f8a6ed481830fb100109a132bef581fc4176fe)