It was discovered that Bouncy Castle incorrectly handled certain crypto algorithms. A remote attacker could possibly use these issues to obtain sensitive information, including private keys.
{ "availability": "No subscription required", "binaries": [ { "libbcmail-java": "1.49+dfsg-2ubuntu0.1", "libbcpg-java": "1.49+dfsg-2ubuntu0.1", "libbcpkix-java-doc": "1.49+dfsg-2ubuntu0.1", "libbcprov-java-doc": "1.49+dfsg-2ubuntu0.1", "libbcpg-java-doc": "1.49+dfsg-2ubuntu0.1", "libbcprov-java": "1.49+dfsg-2ubuntu0.1", "libbcpkix-java": "1.49+dfsg-2ubuntu0.1", "libbcmail-java-doc": "1.49+dfsg-2ubuntu0.1" } ] }