Severity
Moderate
Affected Packages
20
CVEs
1
Security update for bouncycastle
This update for bouncycastle fixes the following issues:
Update to version 1.78.1, including fixes for:
- CVE-2024-30171: Fixed timing side-channel attacks against RSA decryption (both PKCS#1v1.5 and OAEP). (bsc#1223252)
- ID
- SUSE-SU-2024:1539-1
- Severity
- moderate
- URL
- https://www.suse.com/support/update/announcement/2024/suse-su-20241539-1/
- Published
-
2024-05-07T07:23:51
(2 months ago) - Modified
-
2024-05-07T07:23:51
(2 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings |
|
|
Suse | URL of this CSAF notice |
|
|
Suse | URL for SUSE-SU-2024:1539-1 |
|
|
Suse | E-Mail link for SUSE-SU-2024:1539-1 |
|
|
Bugzilla | SUSE Bug 1223252 |
|
|
CVE | SUSE CVE CVE-2024-30171 page |
|
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/bouncycastle?arch=noarch&distro=sles-15&sp=4 | suse |
![]() |
< 1.78.1-150200.3.29.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/bouncycastle?arch=noarch&distro=sles-15&sp=3 | suse |
![]() |
< 1.78.1-150200.3.29.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/bouncycastle?arch=noarch&distro=sles-15&sp=2 | suse |
![]() |
< 1.78.1-150200.3.29.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/bouncycastle?arch=noarch&distro=opensuse-leap-15.5 | suse |
![]() |
< 1.78.1-150200.3.29.1 | opensuse-leap-15.5 | noarch | |
Affected | pkg:rpm/suse/bouncycastle-util?arch=noarch&distro=sles-15&sp=4 | suse |
![]() |
< 1.78.1-150200.3.29.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/bouncycastle-util?arch=noarch&distro=sles-15&sp=3 | suse |
![]() |
< 1.78.1-150200.3.29.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/bouncycastle-util?arch=noarch&distro=sles-15&sp=2 | suse |
![]() |
< 1.78.1-150200.3.29.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/bouncycastle-util?arch=noarch&distro=opensuse-leap-15.5 | suse |
![]() |
< 1.78.1-150200.3.29.1 | opensuse-leap-15.5 | noarch | |
Affected | pkg:rpm/suse/bouncycastle-tls?arch=noarch&distro=opensuse-leap-15.5 | suse |
![]() |
< 1.78.1-150200.3.29.1 | opensuse-leap-15.5 | noarch | |
Affected | pkg:rpm/suse/bouncycastle-pkix?arch=noarch&distro=sles-15&sp=4 | suse |
![]() |
< 1.78.1-150200.3.29.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/bouncycastle-pkix?arch=noarch&distro=sles-15&sp=3 | suse |
![]() |
< 1.78.1-150200.3.29.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/bouncycastle-pkix?arch=noarch&distro=sles-15&sp=2 | suse |
![]() |
< 1.78.1-150200.3.29.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/bouncycastle-pkix?arch=noarch&distro=opensuse-leap-15.5 | suse |
![]() |
< 1.78.1-150200.3.29.1 | opensuse-leap-15.5 | noarch | |
Affected | pkg:rpm/suse/bouncycastle-pg?arch=noarch&distro=sles-15&sp=4 | suse |
![]() |
< 1.78.1-150200.3.29.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/bouncycastle-pg?arch=noarch&distro=sles-15&sp=3 | suse |
![]() |
< 1.78.1-150200.3.29.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/bouncycastle-pg?arch=noarch&distro=sles-15&sp=2 | suse |
![]() |
< 1.78.1-150200.3.29.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/bouncycastle-pg?arch=noarch&distro=opensuse-leap-15.5 | suse |
![]() |
< 1.78.1-150200.3.29.1 | opensuse-leap-15.5 | noarch | |
Affected | pkg:rpm/suse/bouncycastle-mail?arch=noarch&distro=opensuse-leap-15.5 | suse |
![]() |
< 1.78.1-150200.3.29.1 | opensuse-leap-15.5 | noarch | |
Affected | pkg:rpm/suse/bouncycastle-jmail?arch=noarch&distro=opensuse-leap-15.5 | suse |
![]() |
< 1.78.1-150200.3.29.1 | opensuse-leap-15.5 | noarch | |
Affected | pkg:rpm/suse/bouncycastle-javadoc?arch=noarch&distro=opensuse-leap-15.5 | suse |
![]() |
< 1.78.1-150200.3.29.1 | opensuse-leap-15.5 | noarch |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |