Описание
In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | not-affected | 1.57-1 |
| bionic | not-affected | 1.59-1 |
| cosmic | not-affected | 1.60-1 |
| devel | not-affected | 1.60-1 |
| disco | not-affected | 1.60-1 |
| eoan | not-affected | 1.60-1 |
| esm-apps/bionic | not-affected | 1.59-1 |
| esm-apps/focal | not-affected | 1.60-1 |
| esm-apps/jammy | not-affected | 1.60-1 |
| esm-apps/noble | not-affected | 1.60-1 |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.
In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.
In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key ...
In Bouncy Castle JCE Provider the DSA key pair generator generates a weak private key if used with default values
EPSS
5 Medium
CVSS2
7.5 High
CVSS3