{"id":"MGASA-2015-0487","summary":"Updated bouncycastle packages fix security vulnerability","details":"The Bouncy Castle Java library before 1.51 does not validate a point is withing\nthe elliptic curve, which makes it easier for remote attackers to obtain\nprivate keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key\nexchanges, aka an \"invalid curve attack\" (CVE-2015-7940).\n","modified":"2026-04-16T01:45:23.629957630Z","published":"2015-12-28T19:23:26Z","upstream":["CVE-2015-7940"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0487.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=16996"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00036.html"}],"affected":[{"package":{"name":"bouncycastle","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/bouncycastle?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.50-3.1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0487.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}