It was discovered that Bouncy Castle incorrectly handled certain crypto algorithms. A remote attacker could possibly use these issues to obtain sensitive information, including private keys.
{ "binaries": [ { "binary_name": "libbcmail-java", "binary_version": "1.49+dfsg-2ubuntu0.1" }, { "binary_name": "libbcmail-java-doc", "binary_version": "1.49+dfsg-2ubuntu0.1" }, { "binary_name": "libbcpg-java", "binary_version": "1.49+dfsg-2ubuntu0.1" }, { "binary_name": "libbcpg-java-doc", "binary_version": "1.49+dfsg-2ubuntu0.1" }, { "binary_name": "libbcpkix-java", "binary_version": "1.49+dfsg-2ubuntu0.1" }, { "binary_name": "libbcpkix-java-doc", "binary_version": "1.49+dfsg-2ubuntu0.1" }, { "binary_name": "libbcprov-java", "binary_version": "1.49+dfsg-2ubuntu0.1" }, { "binary_name": "libbcprov-java-doc", "binary_version": "1.49+dfsg-2ubuntu0.1" } ], "availability": "No subscription required" }