Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

Bug#1056754: bouncycastle: CVE-2023-33202

46 views
Skip to first unread message

Salvatore Bonaccorso

unread,
Nov 25, 2023, 4:50:05 PM11/25/23
to
Source: bouncycastle
Version: 1.72-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <te...@security.debian.org>

Hi,

The following vulnerability was published for bouncycastle.

CVE-2023-33202[0]:
| Bouncy Castle for Java before 1.73 contains a potential Denial of
| Service (DoS) issue within the Bouncy Castle
| org.bouncycastle.openssl.PEMParser class. This class parses OpenSSL
| PEM encoded streams containing X.509 certificates, PKCS8 encoded
| keys, and PKCS7 objects. Parsing a file that has crafted ASN.1 data
| through the PEMParser causes an OutOfMemoryError, which can enable a
| denial of service attack.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-33202
https://www.cve.org/CVERecord?id=CVE-2023-33202
[1] https://github.com/bcgit/bc-java/wiki/CVE-2023-33202

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

tony mancill

unread,
Dec 1, 2023, 12:10:05 AM12/1/23
to
On Thu, Nov 30, 2023 at 09:51:09PM +0000, Debian Bug Tracking System wrote:
> Subject: Bug#1056754: fixed in bouncycastle 1.77-1
>
> Source: bouncycastle
> Version: 1.77-1
> Distribution: unstable
> Changed-By: Markus Koschany <a...@debian.org>
> * New upstream version 1.77. (Closes: #1049356)

Hi Markus,

Thank you for your efforts to get BC updated.

> * Remove backward-compatibility.patch. It is time to fix those issues
> properly in our reverse-dependencies.

I agree completely. And thank you for filing bugs for the r-deps that
need to be addressed.

Cheers,
tony

Markus Koschany

unread,
Dec 1, 2023, 4:10:05 AM12/1/23
to
Hi tony,
thanks. Fortunately there is enough time to fix them. I'll try to help fixing
them step by step.

signature.asc
0 new messages