First published: Tue Jan 17 2017(Updated: )
It was discovered that the ECDSASignature class in the Libraries component of OpenJDK accepted signatures using non-canonical DER encoding. This could cause a Java application to accept signature in an incorrect format not accepted by other cryptographic tools.
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK | =1.6-update_131 | |
Oracle JDK | =1.7-update_121 | |
Oracle JDK | =1.8-update_111 | |
Oracle JDK | =1.8-update_112 | |
Oracle JRE | =1.6-update_131 | |
Oracle JRE | =1.7-update_121 | |
Oracle JRE | =1.8-update_111 | |
Oracle JRE | =1.8-update_112 | |
Oracle JRockit | =r28.3.12 | |
debian/openjdk-8 | 8u432-b06-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.