First published: Sun Jan 14 2018(Updated: )
It was discovered that multiple encryption key classes (DESKey, DESedeKey, PBEKey, PBKDF2KeyImpl) in the crypto provider in the Libraries component of OpenJDK did not properly synchronize access to their internal key data from multiple threads. This could possibly cause a multi-threaded Java application to apply weak encryption to data because of use of key that was zeroed out during object finalization.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK 8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1534298 is classified as moderate, indicating a potential risk in multi-threaded Java applications using affected encryption key classes.
To fix REDHAT-BUG-1534298, you should update to the latest version of OpenJDK that includes the patch for this vulnerability.
REDHAT-BUG-1534298 affects multiple versions of OpenJDK, particularly those that include the DESKey, DESedeKey, PBEKey, and PBKDF2KeyImpl classes.
Failing to address REDHAT-BUG-1534298 may lead to vulnerabilities in multi-threaded applications, potentially exposing key data.
Currently, there are no recommended workarounds for REDHAT-BUG-1534298, and up-to-date patches are the best solution.