In the Bouncy Castle JCE Provider versions 1.51 to 1.55, a carry propagation bug was introduced in the implementation of squaring for several raw math classes have been fixed (org.bouncycastle.math.raw.Nat???). These classes are used by our custom elliptic curve implementations (org.bouncycastle.math.ec.custom.**), so there was the possibility of rare (in general usage) spurious calculations for elliptic curve scalar multiplications. Such errors would have been detected with high probability by the output validation for our scalar multipliers.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHSA-2018:2669 - | |
References | () https://access.redhat.com/errata/RHSA-2018:2927 - | |
References | () https://github.com/bcgit/bc-java/commit/790642084c4e0cadd47352054f868cc8397e2c00#diff-e5934feac8203ca0104ab291a3560a31 - Patch, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20181127-0004/ - | |
References | () https://www.oracle.com/security-alerts/cpuoct2020.html - |
Information
Published : 2018-06-04 13:29
Updated : 2024-11-21 02:43
NVD link : CVE-2016-1000340
Mitre link : CVE-2016-1000340
CVE.ORG link : CVE-2016-1000340
JSON object : View
Products Affected
bouncycastle
- legion-of-the-bouncy-castle-java-crytography-api
CWE
CWE-19
Data Processing Errors