Back to bug 1563749

Who When What Removed Added
Andrej Nemec 2018-04-04 15:24:16 UTC Blocks 1563752
Kurt Seifried 2018-04-05 19:18:45 UTC Whiteboard impact=low,public=20120330,reported=20180402,source=internet,cvss3=4.0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,cwe=CWE-327,rhn_satellite_6/bouncycastle=new,sam-1/bouncycastle=new,fedora-all/bouncycastle=notaffected,epel-all/bouncycastle=notaffected,jdv-6/bouncycastle=notaffected,rhel-8/bouncycastle=notaffected,rhscl-3/rh-eclipse46-bouncycastle=notaffected,rhev-m-4/eap7/bouncycastle=notaffected impact=low,public=20120330,reported=20180402,source=internet,cvss3=4.0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,cwe=CWE-327,rhn_satellite_6/bouncycastle=affected,sam-1/bouncycastle=wontfix,fedora-all/bouncycastle=notaffected,epel-all/bouncycastle=notaffected,jdv-6/bouncycastle=notaffected,rhel-8/bouncycastle=notaffected,rhscl-3/rh-eclipse46-bouncycastle=notaffected,rhev-m-4/eap7/bouncycastle=notaffected
Kurt Seifried 2018-04-05 19:21:28 UTC Depends On 1564248, 1564247
Kurt Seifried 2018-04-05 19:24:51 UTC Status NEW CLOSED
Resolution --- WONTFIX
Last Closed 2018-04-05 15:24:51 UTC
Bharti Kundal 2018-07-24 02:13:13 UTC Status CLOSED NEW
CC bkundal
Resolution WONTFIX ---
Keywords Reopened
Bharti Kundal 2018-07-24 02:16:50 UTC CC anemec
Flags needinfo?(anemec)
Bharti Kundal 2018-07-24 02:28:55 UTC CC bmaxwell, cdewolf, chazlett, csutherl, darran.lofthouse, dimitris, dosoudil, jawilson, jshepherd, lgao, myarboro, pgier, psakar, pslavice, psotirop, rnetuka, rsvoboda, twalsh, vtunka
Whiteboard impact=low,public=20120330,reported=20180402,source=internet,cvss3=4.0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,cwe=CWE-327,rhn_satellite_6/bouncycastle=affected,sam-1/bouncycastle=wontfix,fedora-all/bouncycastle=notaffected,epel-all/bouncycastle=notaffected,jdv-6/bouncycastle=notaffected,rhel-8/bouncycastle=notaffected,rhscl-3/rh-eclipse46-bouncycastle=notaffected,rhev-m-4/eap7/bouncycastle=notaffected impact=low,public=20120330,reported=20180402,source=internet,cvss3=4.0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,cwe=CWE-327,rhn_satellite_6/bouncycastle=affected,sam-1/bouncycastle=wontfix,fedora-all/bouncycastle=notaffected,epel-all/bouncycastle=notaffected,jdv-6/bouncycastle=notaffected,rhel-8/bouncycastle=notaffected,rhscl-3/rh-eclipse46-bouncycastle=notaffected,rhev-m-4/eap7/bouncycastle=notaffected,eap-7/bouncycastle=affected
Andrej Nemec 2018-07-24 07:49:23 UTC Flags needinfo?(anemec)
errata-xmlrpc 2018-10-16 15:22:46 UTC Link ID Red Hat Product Errata RHSA-2018:2927
PnT Account Manager 2018-10-19 21:48:10 UTC CC bkundal
Gianluca Sforna 2018-10-25 15:42:05 UTC CC giallu
PnT Account Manager 2018-11-05 23:06:34 UTC CC ylavi
Doran Moppert 2018-11-23 01:40:45 UTC CC dfediuck, sbonazzo
Whiteboard impact=low,public=20120330,reported=20180402,source=internet,cvss3=4.0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,cwe=CWE-327,rhn_satellite_6/bouncycastle=affected,sam-1/bouncycastle=wontfix,fedora-all/bouncycastle=notaffected,epel-all/bouncycastle=notaffected,jdv-6/bouncycastle=notaffected,rhel-8/bouncycastle=notaffected,rhscl-3/rh-eclipse46-bouncycastle=notaffected,rhev-m-4/eap7/bouncycastle=notaffected,eap-7/bouncycastle=affected impact=low,public=20120330,reported=20180402,source=internet,cvss3=4.0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,cwe=CWE-327,rhn_satellite_6/bouncycastle=affected,sam-1/bouncycastle=wontfix,fedora-all/bouncycastle=notaffected,epel-all/bouncycastle=notaffected,jdv-6/bouncycastle=notaffected,rhel-8/bouncycastle=notaffected,rhscl-3/rh-eclipse46-bouncycastle=notaffected,rhev-m-4/eap7-bouncycastle=notaffected,eap-7/bouncycastle=affected
Mat Booth 2019-04-10 11:19:47 UTC CC mat.booth
PnT Account Manager 2019-04-22 21:34:07 UTC CC tjay
PnT Account Manager 2019-05-02 21:52:19 UTC CC anemec
Joshua Padman 2019-05-23 10:14:53 UTC Whiteboard impact=low,public=20120330,reported=20180402,source=internet,cvss3=4.0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,cwe=CWE-327,rhn_satellite_6/bouncycastle=affected,sam-1/bouncycastle=wontfix,fedora-all/bouncycastle=notaffected,epel-all/bouncycastle=notaffected,jdv-6/bouncycastle=notaffected,rhel-8/bouncycastle=notaffected,rhscl-3/rh-eclipse46-bouncycastle=notaffected,rhev-m-4/eap7-bouncycastle=notaffected,eap-7/bouncycastle=affected impact=low,public=20120330,reported=20180402,source=internet,cvss3=4.0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,cwe=CWE-327,rhn_satellite_6/bouncycastle=affected,sam-1/bouncycastle=wontfix,fedora-all/bouncycastle=notaffected,epel-all/bouncycastle=notaffected,jdv-6/bouncycastle=new,rhel-8/bouncycastle=notaffected,rhscl-3/rh-eclipse46-bouncycastle=notaffected,rhev-m-4/eap7-bouncycastle=notaffected,eap-7/bouncycastle=affected
Product Security DevOps Team 2019-06-10 10:19:38 UTC Status NEW CLOSED
Resolution --- ERRATA
Last Closed 2018-04-05 19:24:51 UTC 2019-06-10 10:19:38 UTC
Product Security DevOps Team 2019-09-29 14:35:58 UTC Whiteboard impact=low,public=20120330,reported=20180402,source=internet,cvss3=4.0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,cwe=CWE-327,rhn_satellite_6/bouncycastle=affected,sam-1/bouncycastle=wontfix,fedora-all/bouncycastle=notaffected,epel-all/bouncycastle=notaffected,jdv-6/bouncycastle=new,rhel-8/bouncycastle=notaffected,rhscl-3/rh-eclipse46-bouncycastle=notaffected,rhev-m-4/eap7-bouncycastle=notaffected,eap-7/bouncycastle=affected
Jonathan Christison 2020-05-18 16:48:52 UTC CC ganandan, jochrist, jwon, swoodman
Sandipan Roy 2022-04-19 05:12:24 UTC Blocks 2076448
Sage McTaggart 2022-04-19 21:22:50 UTC Doc Text A flaw involving a risky cryptographic algorithim was found for Bouncycastle. BKS-V1 contained a design flaw resulting from the use of the SHA-1 hash function, as it has a 16 bit MAC key size and a 160 bit SHA-1 hash function. An attacker can brute force the password due to the trivial hash collisions, resulting in a loss of confidentiality and integrity.
RaTasha Tillery-Smith 2022-04-20 12:47:24 UTC Doc Text A flaw involving a risky cryptographic algorithim was found for Bouncycastle. BKS-V1 contained a design flaw resulting from the use of the SHA-1 hash function, as it has a 16 bit MAC key size and a 160 bit SHA-1 hash function. An attacker can brute force the password due to the trivial hash collisions, resulting in a loss of confidentiality and integrity. A flaw involving a risky cryptographic algorithm was found in Bouncycastle. BKS-V1 contained a design flaw resulting from using the SHA-1 hash function, as it contains a 16-bit MAC key size and a 160-bit SHA-1 hash function. This flaw allows an attacker to brute force the password due to the trivial hash collisions, resulting in a loss of confidentiality and integrity.
Pedro Sampaio 2023-08-08 16:50:09 UTC CC rruss

Back to bug 1563749