First published: Mon Oct 18 2021(Updated: )
It was discovered that the TLS implementation in the JSSE component of OpenJDK used non-constant comparisons when checking various data (such as session identifiers or verification data blocks) during TLS handshakes. A malicious TLS client could possibly use this flaw to recover that data by observing timing differences in processing of various inputs.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK 17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2015311 is rated as high due to potential data recovery by malicious TLS clients.
To fix REDHAT-BUG-2015311, update to the latest version of OpenJDK where this vulnerability has been patched.
The potential impacts of REDHAT-BUG-2015311 include exposure of sensitive data during TLS handshakes.
REDHAT-BUG-2015311 affects Oracle OpenJDK 17 and possibly other versions prior to the remediation.
There is no known effective workaround for REDHAT-BUG-2015311 other than applying the recommended updates.