Description
In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.
Remediation
References
https://github.com/bcgit/bc-java/commit/50a53068c094d6cff37659da33c9b4505becd389#diff-5578e61500abb2b87b300d3114bdfd7d
https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html
https://usn.ubuntu.com/3727-1/
https://access.redhat.com/errata/RHSA-2018:2669
https://access.redhat.com/errata/RHSA-2018:2927
https://security.netapp.com/advisory/ntap-20181127-0004/
https://www.oracle.com/security-alerts/cpuoct2020.html
https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E
Related Vulnerabilities
CVE-2021-34078 Vulnerability in npm package lifion-verify-deps
CVE-2021-21290 Vulnerability in maven package io.netty:netty-common
CVE-2021-23413 Vulnerability in npm package jszip
CVE-2023-34610 Vulnerability in maven package com.cedarsoftware:json-io
CVE-2021-21391 Vulnerability in npm package ckeditor5-engine