DescriptionBouncyCastle TLS prior to version 1.0.3, when configured to use the JCE (Java Cryptography Extension) for cryptographic functions, provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable application. This vulnerability is referred to as "ROBOT."
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs884241

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
bouncycastle (PTS)stretch1.56-1+deb9u2fixed
stretch (security)1.56-1+deb9u3fixed
bullseye, sid1.68-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
bouncycastlesourcewheezy(not affected)
bouncycastlesourcejessie(not affected)


[jessie] - bouncycastle <not-affected> (Vulnerable code introduced in 1.56 with tls API addition)
[wheezy] - bouncycastle <not-affected> (Vulnerable code not present)
Introduced by:
Fixed by:
Fixed in 1.59 beta 9

Search for package or bug name: Reporting problems