It was discovered that Bouncy Castle incorrectly handled certain crypto algorithms. A remote attacker could possibly use these issues to obtain sensitive information, including private keys.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.49+dfsg-2ubuntu0.1", "binary_name": "libbcmail-java" }, { "binary_version": "1.49+dfsg-2ubuntu0.1", "binary_name": "libbcmail-java-doc" }, { "binary_version": "1.49+dfsg-2ubuntu0.1", "binary_name": "libbcpg-java" }, { "binary_version": "1.49+dfsg-2ubuntu0.1", "binary_name": "libbcpg-java-doc" }, { "binary_version": "1.49+dfsg-2ubuntu0.1", "binary_name": "libbcpkix-java" }, { "binary_version": "1.49+dfsg-2ubuntu0.1", "binary_name": "libbcpkix-java-doc" }, { "binary_version": "1.49+dfsg-2ubuntu0.1", "binary_name": "libbcprov-java" }, { "binary_version": "1.49+dfsg-2ubuntu0.1", "binary_name": "libbcprov-java-doc" } ] }