Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.1969 [DLA 1418-1] bouncycastle security update 9 July 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: bouncycastle Publisher: Debian Operating System: Debian GNU/Linux 8 Impact/Access: Access Privileged Data -- Remote/Unauthenticated Provide Misleading Information -- Remote/Unauthenticated Reduced Security -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2016-1000346 CVE-2016-1000345 CVE-2016-1000343 CVE-2016-1000342 CVE-2016-1000341 CVE-2016-1000339 CVE-2016-1000338 Reference: ESB-2018.1848 Original Bulletin: https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : bouncycastle Version : 1.49+dfsg-3+deb8u3 CVE ID : CVE-2016-1000338 CVE-2016-1000339 CVE-2016-1000341 CVE-2016-1000342 CVE-2016-1000343 CVE-2016-1000345 CVE-2016-1000346 Several security vulnerabilities were found in Bouncy Castle, a Java implementation of cryptographic algorithms. CVE-2016-1000338 DSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure. CVE-2016-1000339 Previously the primary engine class used for AES was AESFastEngine. Due to the highly table driven approach used in the algorithm it turns out that if the data channel on the CPU can be monitored the lookup table accesses are sufficient to leak information on the AES key being used. There was also a leak in AESEngine although it was substantially less. AESEngine has been modified to remove any signs of leakage and is now the primary AES class for the BC JCE provider. Use of AESFastEngine is now only recommended where otherwise deemed appropriate. CVE-2016-1000341 DSA signature generation is vulnerable to timing attack. Where timings can be closely observed for the generation of signatures, the lack of blinding may allow an attacker to gain information about the signature's k value and ultimately the private value as well. CVE-2016-1000342 ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure. CVE-2016-1000343 The DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator. CVE-2016-1000345 The DHIES/ECIES CBC mode is vulnerable to padding oracle attack. In an environment where timings can be easily observed, it is possible with enough observations to identify when the decryption is failing due to padding. CVE-2016-1000346 In the Bouncy Castle JCE Provider the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in use. As of this release the key parameters are checked on agreement calculation. For Debian 8 "Jessie", these problems have been fixed in version 1.49+dfsg-3+deb8u3. We recommend that you upgrade your bouncycastle packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAltAxoNfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeTFrw/+OkEtAXHMvpLSWjgpz8izf7dlTP884iyiKV2FX6qlidWOk9/aR9kZrc7M n74UCrgqihkG2MhRRlKe4PXR4hdC7RTX/gIykOLTHN9a3l5uFe+vMZ4F5p2mBpax ozqRJmMc6ALMqCbaTVzNUaHHL0FMVcy61W7FsB189DogCAs0KxOHAqZmKzmWVn1f 0lMf0zRlzquDO4b36bw9ixtoMDBnxKZRzWIVv361FHmwRkin0lG1nfuqG3R4eVrv AMsp42PCa6/U1+xJ6XkTbBugXBoLHhaDcC74oGeDXXjnqslGKZmQEQEihBLBmSiu LW5gijV6+PSUbJQcKRgUPUnVA2jNS/uO28/nsnXL/K2u1CUl0FJhGUV1NgETVz7Y Glv56Vr9pqpkv0V2Yj3DYDvALiXnpzC9jhyfbc3n3enXdkq7FOoeNEU16wLnl0C8 393o5KtnQXkhtUZ52KUL06ONGzJ/2PnSnvTtdg9kWDuE/dW9ZZq10p91UwUokRdB zgN+vDsIaR4sLiXPEP1Y/K40bgn+r+/YuS/p4ODdYAIIaehiesbSXfiB1bqR74cL OWtGwHRppZ+NL1c6XUuMtwMQZc+LIfsUmCO222xSyuzl1VRr8GdBZqQet71BmAW/ CAFBZJE68/CRaImih4Hus8Vqu1rzJqYnSKJFFNiIetBrum70eK0= =wMaJ - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBW0KvCGaOgq3Tt24GAQgubhAA0OZMLTkRFapTRTAeRoU/HUvJ0Arnocr7 X2QGhFBscdpMoyKN+pD1PyWWh34gaCOgb8rgew1YqhX5h+aL/ulLSBULr2J1Srx6 BcDXrUDd3ZnFypeshnhvbt3AhF2wE6GDpLu7weQ5CSGDEfC1uro9jt56mmFFuz1i rOB93F6CjHVfS0ufNxpH81JHSRg6MhC77vMomnKNnH1CsVfJYtkgbH/r1Fy+rnX1 tzxvtojU5Y7ca8z1nt+G1xyaRvpqcS+Yy4Hgd+vuKcC1b8GgV9DWURt6eu7ha9gQ Nf0lsLjowNEtjmd7HuIfMEy0a5tYo8TZuzoGutwq8arz8Qknz3trrMWnpabbfLON euxiVgHB3LrDJQAh2TRp2SO5+tRscu/oKln8K6W2xLtQUvCQb2LPOh3iGJoVGtcH FGe3NunCwfKOJ6Zmcl3ZX16t9Kjf4uGzJnN6pO6oI0AidkKkbMoNwB8iIKigZw5B 1a0DZX2jNktcZwDI9p7facBL1hT6O09MnPwxO+5UA73zxYsUyXeU1dK2adASdab/ z6bFA34CtZANF3UG2EQG3peGZT9GwQziQbKyVkpFPHooY6mTFX7iTU4+piNiYzDU hGDgUiAOdlQVV8PuT6E0wH4FdHBo9MPqyXZWfdO7cvm5v999PFNtUnAuF5AFjoo9 FCA+Hna2Sqo= =rv3y -----END PGP SIGNATURE-----