CVE-2016-1000343

Published: 04 June 2018

In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.

Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
bouncycastle
Launchpad, Ubuntu, Debian
Upstream
Released (1.56-1)
Ubuntu 21.10 (Impish Indri) Not vulnerable
(1.60-1)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(1.60-1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(1.60-1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(1.59-1)
Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needed)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was released [1.49+dfsg-2ubuntu0.1])
Patches:
Upstream: https://github.com/bcgit/bc-java/commit/50a53068c094d6cff37659da33c9b4505becd389