Your message dated Mon, 14 Dec 2015 22:47:07 +0000
with message-id <e1a8btb-0006mm...@franck.debian.org>
and subject line Bug#802671: fixed in bouncycastle 1.49+dfsg-3+deb8u1
has caused the Debian Bug report #802671,
regarding CVE-2015-7940: bouncycastle: ECC private keys can be recovered via
invalid curve attack
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
802671: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=802671
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: bouncycastle
Version: 1.44+dfsg-2
Severity: serious
Tags: security
Control: fixed -1 1.51-1
Hello,
bouncycastle 1.49 in stable/testing/unstable (and 1.44 in wheezy/squeeze)
is vulnerable to an invalid curve attack as described here:
https://web-in-security.blogspot.ca/2015/09/practical-invalid-curve-attacks.html
This is fixed in version 1.51 (in experimental).
The upstream patches that fix this issue should be those ones:
https://github.com/bcgit/bc-java/commit/5cb2f05
https://github.com/bcgit/bc-java/commit/e25e94a
A CVE has been requested here:
http://www.openwall.com/lists/oss-security/2015/10/22/7
-- System Information:
Debian Release: stretch/sid
APT prefers squeeze-lts
APT policy: (500, 'squeeze-lts'), (500, 'oldoldstable'), (500, 'unstable'),
(500, 'testing'), (500, 'stable'), (500, 'oldstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 4.2.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=fr_FR.utf8, LC_CTYPE=fr_FR.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
--- End Message ---
--- Begin Message ---
Source: bouncycastle
Source-Version: 1.49+dfsg-3+deb8u1
We believe that the bug you reported is fixed in the latest version of
bouncycastle, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 802...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Markus Koschany <a...@debian.org> (supplier of updated bouncycastle package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 13 Dec 2015 22:16:20 +0100
Source: bouncycastle
Binary: libbcprov-java libbcprov-java-doc libbcmail-java libbcmail-java-doc
libbcpkix-java libbcpkix-java-doc libbcpg-java libbcpg-java-doc
Architecture: source all
Version: 1.49+dfsg-3+deb8u1
Distribution: jessie-security
Urgency: high
Maintainer: Debian Java Maintainers
<pkg-java-maintain...@lists.alioth.debian.org>
Changed-By: Markus Koschany <a...@debian.org>
Description:
libbcmail-java - Bouncy Castle generators/processors for S/MIME and CMS
libbcmail-java-doc - Bouncy Castle generators/processors for S/MIME and CMS
(Documenta
libbcpg-java - Bouncy Castle generators/processors for OpenPGP
libbcpg-java-doc - Bouncy Castle generators/processors for OpenPGP
(Documentation)
libbcpkix-java - Bouncy Castle Java API for PKIX, CMS, EAC, TSP, PKCS, OCSP,
CMP,
libbcpkix-java-doc - Bouncy Castle Java API for PKIX, CMS, EAC, TSP, PKCS...
(Document
libbcprov-java - Bouncy Castle Java Cryptographic Service Provider
libbcprov-java-doc - Bouncy Castle Java Cryptographic Service Provider
(Documentation)
Closes: 802671
Changes:
bouncycastle (1.49+dfsg-3+deb8u1) jessie-security; urgency=high
.
* Team upload.
* CVE-2015-7940: fix invalid curve attack as described in
http://web-in-security.blogspot.ca/2015/09/practical-invalid-curve-attacks.html
(Closes: #802671)
Checksums-Sha1:
c6c378985e7292b1438d5c0c83d1e8da81f66266 2724
bouncycastle_1.49+dfsg-3+deb8u1.dsc
e8ae9351b809a04b6da4692ca7e4d84940c66c6f 5877794
bouncycastle_1.49+dfsg.orig.tar.gz
221c1cf4ef0b401d85136a4d1da735004bd936bb 20700
bouncycastle_1.49+dfsg-3+deb8u1.debian.tar.xz
d6b6a1f26c32bd2996b4e549e34721b8e2fb5eaf 2001778
libbcprov-java_1.49+dfsg-3+deb8u1_all.deb
919e974743010123206d654307c40a2b3e2283ea 80192
libbcprov-java-doc_1.49+dfsg-3+deb8u1_all.deb
5c9bc2c22bcd73b622ed55c944dafb62438c8f30 115662
libbcmail-java_1.49+dfsg-3+deb8u1_all.deb
5e67f6b347aa984b37c34245330f354f31acf3f2 97124
libbcmail-java-doc_1.49+dfsg-3+deb8u1_all.deb
c6fd82ec4ff0a6757c8d62bcc041534dbb14de03 532544
libbcpkix-java_1.49+dfsg-3+deb8u1_all.deb
38cdafd14cae138947b892f621ccafe5c56ea043 324074
libbcpkix-java-doc_1.49+dfsg-3+deb8u1_all.deb
b1544f2bf2f6a5997ab2e0f0f1497cfe3f340510 233754
libbcpg-java_1.49+dfsg-3+deb8u1_all.deb
305a241fe1abf9dde0f3ffc724ea765d685a9ce1 34586
libbcpg-java-doc_1.49+dfsg-3+deb8u1_all.deb
Checksums-Sha256:
82c120cf34d791f756a44ba9325d772e787df46deacd34062ac2ea2ee19d9e35 2724
bouncycastle_1.49+dfsg-3+deb8u1.dsc
218b70308c49ccc9c6ebf54fde81be68c74204c6a04223e75b6d5acb13266a3f 5877794
bouncycastle_1.49+dfsg.orig.tar.gz
1016041fab314c55fb91c94f32c9bb703c3d373f0d8578177257e48d5ac16145 20700
bouncycastle_1.49+dfsg-3+deb8u1.debian.tar.xz
a56bbd4c1fbf13d61353b75f3a86bd4b70278a2beddc52e37ae5659a385cf4df 2001778
libbcprov-java_1.49+dfsg-3+deb8u1_all.deb
82970080ddfb237253a4c570df3be1fd0fcf0039ab0a8a6648713fbe4016b76b 80192
libbcprov-java-doc_1.49+dfsg-3+deb8u1_all.deb
fb74dc4893b638b43ba6ecf2718c7f03b4dffa22ea3ef9d489e1cc9912f0d890 115662
libbcmail-java_1.49+dfsg-3+deb8u1_all.deb
d96a883798c252bc893abb9dc8b3a66e15268df84f1be75b97f59811c7513f23 97124
libbcmail-java-doc_1.49+dfsg-3+deb8u1_all.deb
4564958179f47e3eb28c93a15f0a57ee6962499764dbe55a172eeba5ab58ba23 532544
libbcpkix-java_1.49+dfsg-3+deb8u1_all.deb
96ab2842f88448dda43b026441d4463d975db03e4462f932362b527993a1c26e 324074
libbcpkix-java-doc_1.49+dfsg-3+deb8u1_all.deb
2bef52b9fd80b19ba4335535398612040e66501060baffcdadb60e855a5203fe 233754
libbcpg-java_1.49+dfsg-3+deb8u1_all.deb
63c15418c640f22ede7b869bbd16a467e88a576f32b6420aeccd1998535f2150 34586
libbcpg-java-doc_1.49+dfsg-3+deb8u1_all.deb
Files:
0b8db54882705627c8e030e5f5f7b429 2724 java optional
bouncycastle_1.49+dfsg-3+deb8u1.dsc
2d7dcf82cd40101eae351a822c8dc183 5877794 java optional
bouncycastle_1.49+dfsg.orig.tar.gz
4abb08e538807f8cf94b9d079e32c262 20700 java optional
bouncycastle_1.49+dfsg-3+deb8u1.debian.tar.xz
1bdf26af59299f0243900fd652f203d7 2001778 java optional
libbcprov-java_1.49+dfsg-3+deb8u1_all.deb
a176e3952bc6beb086ab5ede8a35faac 80192 doc optional
libbcprov-java-doc_1.49+dfsg-3+deb8u1_all.deb
8681e5f5ec7874ccf509296aa1f881b6 115662 java optional
libbcmail-java_1.49+dfsg-3+deb8u1_all.deb
282ca6bfc62ff970ae6024957aee0886 97124 doc optional
libbcmail-java-doc_1.49+dfsg-3+deb8u1_all.deb
c15e657d8ed541391148c8488973ccb4 532544 java optional
libbcpkix-java_1.49+dfsg-3+deb8u1_all.deb
c36901cb72f4e708f24aecdf7804210c 324074 doc optional
libbcpkix-java-doc_1.49+dfsg-3+deb8u1_all.deb
afb901fff0592566c074742dd1c9e603 233754 java optional
libbcpg-java_1.49+dfsg-3+deb8u1_all.deb
2d8ef4b269d4c0fda1e663d31dffdf2c 34586 doc optional
libbcpg-java-doc_1.49+dfsg-3+deb8u1_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=5D2f
-----END PGP SIGNATURE-----
--- End Message ---