[ 
https://issues.apache.org/jira/browse/DERBY-4468?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Knut Anders Hatlen resolved DERBY-4468.
---------------------------------------

    Fix Version/s: 10.6.1.0
       Resolution: Fixed

The vulnerable mechanism was deprecated in Derby 10.6 (a new mechanism was 
implemented in DERBY-4483 and replaced the vulnerable one as the default), so 
I'm marking this issue as fixed. Thanks for reporting the issue, Marcell!

See DERBY-4483 and Marcell's writeup describing the problem at 
http://marcellmajor.com/derbyhash.html for details.

> Security weaknesses
> -------------------
>
>                 Key: DERBY-4468
>                 URL: https://issues.apache.org/jira/browse/DERBY-4468
>             Project: Derby
>          Issue Type: Bug
>         Environment: All platform.
>            Reporter: Marcell Major
>             Fix For: 10.6.1.0
>
>   Original Estimate: 24h
>  Remaining Estimate: 24h
>
> There are security weaknesses in Derby password handling. I want to share the 
> details with Derby developers but I cannot find the suitable confidential 
> forum/mail address for that. Please give me an email address to send it to 
> the correct mailbox...

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to