CVE-2015-7940
Publication date 9 November 2015
Last updated 24 July 2024
Ubuntu priority
The Bouncy Castle Java library before 1.51 does not validate a point is withing the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key exchanges, aka an "invalid curve attack."
Status
Package | Ubuntu Release | Status |
---|---|---|
bouncycastle | 18.04 LTS bionic |
Not affected
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Fixed 1.49+dfsg-2ubuntu0.1
|
|
Notes
References
Related Ubuntu Security Notices (USN)
- USN-3727-1
- Bouncy Castle vulnerabilities
- 1 August 2018