Skip to content

[GHSA-4h8f-2wvx-gg5w] Bouncy Castle Java Cryptography API vulnerable to DNS poisoning#7407

Closed
kmoens wants to merge 1 commit into
kmoens/advisory-improvement-7407from
kmoens-GHSA-4h8f-2wvx-gg5w
Closed

[GHSA-4h8f-2wvx-gg5w] Bouncy Castle Java Cryptography API vulnerable to DNS poisoning#7407
kmoens wants to merge 1 commit into
kmoens/advisory-improvement-7407from
kmoens-GHSA-4h8f-2wvx-gg5w

Conversation

@kmoens
Copy link
Copy Markdown

@kmoens kmoens commented Apr 16, 2026

Updates

  • Affected products

Comments
The bcprov-jdk15on is also affected by this vulnerability.

Copilot AI review requested due to automatic review settings April 16, 2026 11:30
@github-actions github-actions Bot changed the base branch from main to kmoens/advisory-improvement-7407 April 16, 2026 11:31
Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Updates the GHSA advisory for CVE-2024-34447 (Bouncy Castle DNS poisoning hostname verification issue) by expanding the set of affected Maven artifacts.

Changes:

  • Updates the advisory modified timestamp.
  • Adds an additional affected Maven package entry under affected.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Comment on lines +133 to +136
"package": {
"ecosystem": "Maven",
"name": "org.bouncycastle:bcprov-jdk15"
},
Copy link

Copilot AI Apr 16, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

PR description notes that bcprov-jdk15on is also affected, but this change adds org.bouncycastle:bcprov-jdk15 instead. Please confirm the intended Maven coordinate and update the affected list accordingly (add bcprov-jdk15on if that's the correct artifact, or adjust the PR description if not).

Copilot uses AI. Check for mistakes.
"type": "ECOSYSTEM",
"events": [
{
"introduced": "1.61"
Copy link

Copilot AI Apr 16, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The newly added affected range for org.bouncycastle:bcprov-jdk15 only specifies an introduced version and no fixed version, which will mark all versions >= 1.61 as affected indefinitely. If this vulnerability is fixed in the same release as the other bcprov-* artifacts in this advisory, add the corresponding fixed event (e.g., 1.78) for consistency and accurate remediation guidance.

Suggested change
"introduced": "1.61"
"introduced": "1.61"
},
{
"fixed": "1.78"

Copilot uses AI. Check for mistakes.
@kmoens kmoens closed this Apr 16, 2026
@github-actions github-actions Bot deleted the kmoens-GHSA-4h8f-2wvx-gg5w branch April 16, 2026 11:52
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants