SUSE-SU-2024:1539-2

Source
https://www.suse.com/support/update/announcement/2024/suse-su-20241539-2/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2024:1539-2.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2024:1539-2
Related
Published
2024-06-18T11:05:53Z
Modified
2024-06-18T11:05:53Z
Summary
Security update for bouncycastle
Details

This update for bouncycastle fixes the following issues:

Update to version 1.78.1, including fixes for:

  • CVE-2024-30171: Fixed timing side-channel attacks against RSA decryption (both PKCS#1v1.5 and OAEP). (bsc#1223252)
References

Affected packages

SUSE:Linux Enterprise Module for Development Tools 15 SP6 / bouncycastle

Package

Name
bouncycastle
Purl
purl:rpm/suse/bouncycastle&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.78.1-150200.3.29.1

Ecosystem specific

{
    "binaries": [
        {
            "bouncycastle-pkix": "1.78.1-150200.3.29.1",
            "bouncycastle-pg": "1.78.1-150200.3.29.1",
            "bouncycastle-util": "1.78.1-150200.3.29.1",
            "bouncycastle": "1.78.1-150200.3.29.1"
        }
    ]
}

openSUSE:Leap 15.6 / bouncycastle

Package

Name
bouncycastle
Purl
purl:rpm/suse/bouncycastle&distro=openSUSE%20Leap%2015.6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.78.1-150200.3.29.1

Ecosystem specific

{
    "binaries": [
        {
            "bouncycastle-pkix": "1.78.1-150200.3.29.1",
            "bouncycastle-jmail": "1.78.1-150200.3.29.1",
            "bouncycastle-tls": "1.78.1-150200.3.29.1",
            "bouncycastle-util": "1.78.1-150200.3.29.1",
            "bouncycastle": "1.78.1-150200.3.29.1",
            "bouncycastle-javadoc": "1.78.1-150200.3.29.1",
            "bouncycastle-mail": "1.78.1-150200.3.29.1",
            "bouncycastle-pg": "1.78.1-150200.3.29.1"
        }
    ]
}