CVE-2016-1000340
Published: 4 June 2018
In the Bouncy Castle JCE Provider versions 1.51 to 1.55, a carry propagation bug was introduced in the implementation of squaring for several raw math classes have been fixed (org.bouncycastle.math.raw.Nat???). These classes are used by our custom elliptic curve implementations (org.bouncycastle.math.ec.custom.**), so there was the possibility of rare (in general usage) spurious calculations for elliptic curve scalar multiplications. Such errors would have been detected with high probability by the output validation for our scalar multipliers.
Notes
Author | Note |
---|---|
leosilva | trusty is not-affected. Vulnerable code was introduced later. |
Priority
Status
Package | Release | Status |
---|---|---|
bouncycastle Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(1.57-1)
|
bionic |
Not vulnerable
(1.59-1)
|
|
cosmic |
Not vulnerable
(1.60-1)
|
|
disco |
Not vulnerable
(1.60-1)
|
|
eoan |
Not vulnerable
(1.60-1)
|
|
focal |
Not vulnerable
(1.60-1)
|
|
groovy |
Not vulnerable
(1.60-1)
|
|
hirsute |
Not vulnerable
(1.60-1)
|
|
impish |
Not vulnerable
(1.60-1)
|
|
jammy |
Not vulnerable
(1.60-1)
|
|
kinetic |
Not vulnerable
(1.60-1)
|
|
lunar |
Not vulnerable
(1.60-1)
|
|
mantic |
Not vulnerable
(1.60-1)
|
|
trusty |
Does not exist
(trusty was not-affected [1.49+dfsg-2])
|
|
upstream |
Released
(1.56-1)
|
|
xenial |
Needed
|
|
Patches: upstream: https://github.com/bcgit/bc-java/commit/790642084c4e0cadd47352054f868cc8397e2c00 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |