It was discovered that Bouncy Castle incorrectly handled certain crypto algorithms. A remote attacker could possibly use these issues to obtain sensitive information, including private keys.
{
"binaries": [
{
"binary_version": "1.49+dfsg-2ubuntu0.1",
"binary_name": "libbcmail-java"
},
{
"binary_version": "1.49+dfsg-2ubuntu0.1",
"binary_name": "libbcpg-java"
},
{
"binary_version": "1.49+dfsg-2ubuntu0.1",
"binary_name": "libbcpkix-java"
},
{
"binary_version": "1.49+dfsg-2ubuntu0.1",
"binary_name": "libbcprov-java"
}
],
"availability": "No subscription required"
}