[USN-3727-1] Bouncy Castle vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–===============6092141012693806194==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol=”application/pgp-signature”;
boundary=”UmPeorXg9y8QFhUrqogKecDQFc9auae7n”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–UmPeorXg9y8QFhUrqogKecDQFc9auae7n
Content-Type: multipart/mixed; boundary=”wnyZ9956GsSbJzGnUGFVe84sdFmXuEVGL”;
protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: “ubuntu-security-announce@lists.ubuntu.com”

Message-ID:
Subject: [USN-3727-1] Bouncy Castle vulnerabilities

–wnyZ9956GsSbJzGnUGFVe84sdFmXuEVGL
Content-Type: text/plain; charset=utf-8
Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3727-1
August 01, 2018

bouncycastle vulnerabilities
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Bouncy Castle.

Software Description:
– bouncycastle: Java implementation of cryptographic algorithms

Details:

It was discovered that Bouncy Castle incorrectly handled certain crypto
algorithms. A remote attacker could possibly use these issues to obtain
sensitive information, including private keys.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
libbcmail-java 1.49+dfsg-2ubuntu0.1
libbcpg-java 1.49+dfsg-2ubuntu0.1
libbcpkix-java 1.49+dfsg-2ubuntu0.1
libbcprov-java 1.49+dfsg-2ubuntu0.1

In general, a standard system update will make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3727-1
CVE-2015-6644, CVE-2015-7940, CVE-2016-1000338, CVE-2016-1000339,
CVE-2016-1000341, CVE-2016-1000342, CVE-2016-1000343, CVE-2016-1000345,=

CVE-2016-1000346

Package Information:
https://launchpad.net/ubuntu/+source/bouncycastle/1.49+dfsg-2ubuntu0.1

–wnyZ9956GsSbJzGnUGFVe84sdFmXuEVGL–

–UmPeorXg9y8QFhUrqogKecDQFc9auae7n
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=X1Im
—–END PGP SIGNATURE—–

–UmPeorXg9y8QFhUrqogKecDQFc9auae7n–

–===============6092141012693806194==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============6092141012693806194==–