The Bouncy Castle Java library before 1.51 does not validate a point is withing the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key exchanges, aka an "invalid curve attack."
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libbcmail-java",
"binary_version": "1.49+dfsg-2ubuntu0.1"
},
{
"binary_name": "libbcpg-java",
"binary_version": "1.49+dfsg-2ubuntu0.1"
},
{
"binary_name": "libbcpkix-java",
"binary_version": "1.49+dfsg-2ubuntu0.1"
},
{
"binary_name": "libbcprov-java",
"binary_version": "1.49+dfsg-2ubuntu0.1"
}
]
}