First published: Mon Apr 22 2024(Updated: )
An issue was discovered in Bouncy Castle Java TLS API and JSSE Provider before 1.78. Timing-based leakage may occur in RSA based handshakes because of exception processing.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
nuget/BouncyCastle.Cryptography | <2.3.1 | 2.3.1 |
nuget/BouncyCastle | <2.3.1 | |
maven/org.bouncycastle:bctls-jdk15to18 | <1.78 | 1.78 |
maven/org.bouncycastle:bctls-jdk14 | <1.78 | 1.78 |
maven/org.bouncycastle:bctls-jdk18on | <1.78 | 1.78 |
maven/org.bouncycastle:bcprov-jdk14 | <1.78 | 1.78 |
maven/org.bouncycastle:bcprov-jdk15to18 | <1.78 | 1.78 |
maven/org.bouncycastle:bcprov-jdk15on | <1.78 | 1.78 |
maven/org.bouncycastle:bcprov-jdk18on | <1.78 | 1.78 |
maven/org.bouncycastle:bctls-fips | <1.0.19 | 1.0.19 |
redhat/org.bouncycastle-bcprov-jdk18on | <1.78 | 1.78 |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.