GHSA-v435-xc8x-wvr9
GitHub Security Advisory
Bouncy Castle affected by timing side-channel for RSA key exchange ("The Marvin Attack")
✓ GitHub Reviewed
MODERATE
Has CVE
Advisory Details
An issue was discovered in Bouncy Castle Java TLS API and JSSE Provider before 1.78. Timing-based leakage may occur in RSA based handshakes because of exception processing.
Affected Packages
Maven
org.bouncycastle:bctls-fips
Affected versions:
0
(fixed in 1.0.19)
Maven
org.bouncycastle:bcprov-jdk18on
Affected versions:
0
(fixed in 1.78)
Maven
org.bouncycastle:bcprov-jdk15on
Affected versions:
0
(fixed in 1.78)
Maven
org.bouncycastle:bcprov-jdk15to18
Affected versions:
0
(fixed in 1.78)
Maven
org.bouncycastle:bcprov-jdk14
Affected versions:
0
(fixed in 1.78)
Maven
org.bouncycastle:bctls-jdk18on
Affected versions:
0
(fixed in 1.78)
Maven
org.bouncycastle:bctls-jdk14
Affected versions:
0
(fixed in 1.78)
Maven
org.bouncycastle:bctls-jdk15to18
Affected versions:
0
(fixed in 1.78)
NuGet
BouncyCastle
Affected versions:
0
NuGet
BouncyCastle.Cryptography
Affected versions:
0
(fixed in 2.3.1)
Related CVEs
Key Information
5.0
/10
Dataset
Last updated: September 20, 2025 6:20 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.