First published: Mon Apr 18 2016(Updated: )
It was discovered that the Security component of OpenJDK failed to properly check DSA (Digital Signature Algorithm) parameters. The use of keys with incorrect parameters could lead to disclosure of sensitive data.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Java SE 7 | =1.6.0-update113 | |
Oracle Java SE 7 | =1.7.0-update99 | |
Oracle Java SE 7 | =1.8.0-update77 | |
Oracle JRE | =1.6.0-update113 | |
Oracle JRE | =1.7.0-update99 | |
Oracle JRE | =1.8.0-update77 | |
Oracle Java SE | =r28.3.9 | |
Red Hat IcedTea 7 | <=2.6.6 | |
Oracle Linux | =5.0 | |
Oracle Linux | =6 | |
Oracle Linux | =7 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =6.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.2 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Server | =6.7.z | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0695 is assessed as a high severity vulnerability due to potential disclosure of sensitive data.
To fix CVE-2016-0695, update your Java SE to the latest version provided by Oracle that includes the security patch.
CVE-2016-0695 affects Oracle JDK versions 1.6.0_update113, 1.7.0_update99, and 1.8.0_update77, as well as certain Oracle JRE versions.
An attacker could potentially exploit CVE-2016-0695 to use keys with incorrect DSA parameters, leading to unauthorized access to sensitive data.
Currently, the only recommended solution for CVE-2016-0695 is to apply the updates from Oracle, as there are no effective workarounds.