CVE-2016-1000341

Priority
Description
In the Bouncy Castle JCE Provider version 1.55 and earlier DSA signature
generation is vulnerable to timing attack. Where timings can be closely
observed for the generation of signatures, the lack of blinding in 1.55, or
earlier, may allow an attacker to gain information about the signature's k
value and ultimately the private value as well.
Notes
Package
Upstream:released (1.56-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was released [1.49+dfsg-2ubuntu0.1])
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (1.59-1)
Ubuntu 19.10 (Eoan Ermine):not-affected (1.60-1)
Ubuntu 20.04 (Focal Fossa):not-affected (1.60-1)
Patches:
Upstream:https://github.com/bcgit/bc-java/commit/acaac81f96fec91ab45bd0412beaf9c3acd8defa
More Information

Updated: 2020-04-24 03:22:06 UTC (commit d3f8a6ed481830fb100109a132bef581fc4176fe)