Your submission was sent successfully! Close

CVE-2016-5542

Published: 25 October 2016

Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect integrity via vectors related to Libraries.

From the Ubuntu security team

It was discovered that OpenJDK did not restrict the set of algorithms used for Jar integrity verification. An attacker could use this to modify without detection the content of a JAR file, affecting system integrity.

Priority

Medium

CVSS 3 base score: 3.1

Status

Package Release Status
openjdk-6
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 16.04 ESM (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was released [6b40-1.13.12-0ubuntu0.14.04.3])
openjdk-7
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 16.04 ESM (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was released [7u121-2.6.8-1ubuntu0.14.04.1])
openjdk-8
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 16.04 ESM (Xenial Xerus)
Released (8u111-b14-2ubuntu0.16.04.2)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Notes

AuthorNote
sbeattie
The following algorithms and key sizes are restricted in
this release:
- MD2 (in either the digest or signature algorithm)
- RSA keys less than 1024 bits
Upstream is planning to restrict MD5-based signatures in
signed JARs in the January 2017 CPU.
.
The list of disabled algorithms is controlled via a new security
property, jdk.jar.disabledAlgorithms, in the java.security
file. This property contains a list of disabled algorithms and
key sizes for cryptographically signed JAR files.

References