You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
Bouncy Castle affected by timing side-channel for RSA key exchange ("The Marvin Attack")
Moderate severity
GitHub Reviewed
Published
May 14, 2024
to the GitHub Advisory Database
•
Updated Sep 9, 2024
An issue was discovered in Bouncy Castle Java TLS API and JSSE Provider before 1.78. Timing-based leakage may occur in RSA based handshakes because of exception processing.
An issue was discovered in Bouncy Castle Java TLS API and JSSE Provider before 1.78. Timing-based leakage may occur in RSA based handshakes because of exception processing.
References