CVE-2016-1000346

Priority
Description
In the Bouncy Castle JCE Provider version 1.55 and earlier the other party
DH public key is not fully validated. This can cause issues as invalid keys
can be used to reveal details about the other party's private key where
static Diffie-Hellman is in use. As of release 1.56 the key parameters are
checked on agreement calculation.
Notes
Package
Upstream:released (1.56-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was released [1.49+dfsg-2ubuntu0.1])
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (1.59-1)
Ubuntu 19.10 (Eoan Ermine):not-affected (1.60-1)
Ubuntu 20.04 (Focal Fossa):not-affected (1.60-1)
Patches:
Upstream:https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495
More Information

Updated: 2020-04-24 03:22:33 UTC (commit d3f8a6ed481830fb100109a132bef581fc4176fe)