Описание
In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.
Отчет
This issue affects the versions of bouncycastle as shipped with Red Hat Subscription Asset Manager 1.x. Red Hat Product Security has rated this issue as having a security impact of Low. No update is planned for this product at this time. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| JBoss Developer Studio 11 | bouncycastle | Not affected | ||
| Red Hat JBoss Data Grid 7 | bouncycastle | Not affected | ||
| Red Hat JBoss Data Virtualization 6 | bouncycastle | Out of support scope | ||
| Red Hat JBoss Enterprise Application Platform 7 | bouncycastle | Not affected | ||
| Red Hat JBoss Fuse 6 | bouncycastle | Will not fix | ||
| Red Hat JBoss Fuse Integration Service 2 | bouncycastle | Not affected | ||
| Red Hat OpenShift Application Runtimes | bouncycastle | Not affected | ||
| Red Hat Single Sign-On 7 | bouncycastle | Not affected | ||
| Red Hat Software Collections | rh-eclipse46-bouncycastle | Will not fix | ||
| Red Hat Subscription Asset Manager | bouncycastle | Will not fix |
Показывать по
Дополнительная информация
Статус:
EPSS
2.9 Low
CVSS3
Связанные уязвимости
In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.
In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.
In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key ...
In Bouncy Castle JCE Provider the DSA key pair generator generates a weak private key if used with default values
EPSS
2.9 Low
CVSS3