First published: Mon Oct 17 2016(Updated: )
It was discovered that the Libraries component of OpenJDK did not allow users to restrict the set of algorithms allowed for Jar integrity verification. This flaw could allow an attacker to modify content of the Jar file that used weak signing key or hash algorithm. The fix for this issue adds new security property - jdk.jar.disabledAlgorithms - which defines a set of algorithms not allowed to be used during Jar verification. MD2 hash algorithm and RSA keys with less than 1024 bits are disabled by default. Future updates are also expected to disable MD5 hash algorithm by default.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK | =1.6.0-update121 | |
Oracle JDK | =1.7.0-update111 | |
Oracle JDK | =1.8.0-update101 | |
Oracle JDK | =1.8.0-update102 | |
Oracle JRE | =1.6.0-update121 | |
Oracle JRE | =1.7.0-update111 | |
Oracle JRE | =1.8.0-update101 | |
Oracle JRE | =1.8.0-update102 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.