This vulnerability is associated with program files gcm128w, gcm512w.
This issue affects BC-FJA: from 2.1.0 through 2.1.2.
Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
If possible pass whole message to GCM via doFinal(..) for decryption. Issue only occurs when decryption is chunked at certain boundaries.
| Link | Providers |
|---|---|
| https://do-not-publish.bouncycastle.org/do_not_publish |
|
Fri, 08 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in Legion of the Bouncy Castle Inc. BC-FJA BC-FIPS on Linux, X86_64, AVX, AVX-512f. This vulnerability is associated with program files gcm128w, gcm512w. This issue affects BC-FJA: from 2.1.0 through 2.1.2. | |
| Title | GCM chunking can lead to bad tag exception on decryption | |
| Weaknesses | CWE-1068 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: bcorg
Published:
Updated: 2026-05-08T12:51:03.873Z
Reserved: 2026-05-08T05:23:49.585Z
Link: CVE-2026-8149
Updated: 2026-05-08T12:50:59.531Z
Status : Awaiting Analysis
Published: 2026-05-08T07:16:29.603
Modified: 2026-05-08T15:38:02.517
Link: CVE-2026-8149
No data.
OpenCVE Enrichment
Updated: 2026-05-08T08:30:04Z