-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.3896
                       bouncycastle security update
                              6 November 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           bouncycastle
Publisher:         Debian
Operating System:  Debian GNU/Linux
                   Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Access Privileged Data -- Unknown/Unspecified
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-26939  

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2020/11/msg00007.html

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running bouncycastle check for an updated version of the software 
         for their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian LTS Advisory DLA-2433-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                           Chris Lamb
November 05, 2020                             https://wiki.debian.org/LTS
- - -------------------------------------------------------------------------

Package        : bouncycastle
Version        : 1.56-1+deb9u3
CVE ID         : CVE-2020-26939

It was discovered that there was an issue in the bouncycastle crypto
library where attackers could obtain sensitive information due to
observable differences in its response to invalid input.

For Debian 9 "Stretch", this problem has been fixed in version
1.56-1+deb9u3.

We recommend that you upgrade your bouncycastle packages.

For the detailed security status of bouncycastle please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/bouncycastle

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----
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=wAZE
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=3njc
-----END PGP SIGNATURE-----