First published: Tue Apr 14 2020(Updated: )
It was discovered that the TLS/SSL implementation in the JSEE component of OpenJDK did not properly handle application data packets received prior to the handshake completion. This could allow unauthorized injection of data at the beginning a TLS session.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK 17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1823853 is classified as critical due to the potential for unauthorized data injection in TLS sessions.
To fix REDHAT-BUG-1823853, update your OpenJDK to the latest patched version that addresses this vulnerability.
The affected software for REDHAT-BUG-1823853 is specifically Oracle OpenJDK, especially version 17.
REDHAT-BUG-1823853 facilitates unauthorized injection of data prior to the completion of the TLS handshake.
There are no recommended workarounds for REDHAT-BUG-1823853; updating OpenJDK is the best course of action.