First published: Fri Apr 15 2022(Updated: )
It was discovered that the Libraries component in OpenJDK failed to properly verify ECDSA (Elliptic Curve Digital Signature Algorithm) signatures. A remote attacker could use this flaw to make a Java application compute an invalid signature for arbitrary forged content, thus bypassing the signature verification process.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK 17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2075821 is classified as critical due to the potential for remote exploitation.
To fix REDHAT-BUG-2075821, update OpenJDK to the latest stable version where the vulnerability has been addressed.
The potential impacts of REDHAT-BUG-2075821 include arbitrary signature forgery, which could lead to bypassing security measures in Java applications.
Users of Oracle OpenJDK, specifically version 17, are affected by REDHAT-BUG-2075821.
Currently, there are no known effective workarounds for REDHAT-BUG-2075821, making updates the recommended action.