First published: Tue Oct 19 2021(Updated: )
It was discovered that the default TLS cipher suite configuration in the JSSE component of OpenJDK preferred certain weak ciphers over stronger ciphers. This issue was addressed by: - Preferring ciphers with forward secrecy. - Lowering priority of ciphers using RSA encryption key exchange. - Lowering priority of ciphers using SHA-1 hashing algorithm. Upstream commit: <a href="https://github.com/openjdk/jdk11u/commit/af4b37301d33723806c38cf8ae5d85b7fa7ef39f">https://github.com/openjdk/jdk11u/commit/af4b37301d33723806c38cf8ae5d85b7fa7ef39f</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Sun JSSE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2015648 is significant due to the preference for weak TLS ciphers which can lead to potential security vulnerabilities.
To fix REDHAT-BUG-2015648, update your OpenJDK JSSE to the latest version where the cipher suite configuration is corrected.
The risks associated with REDHAT-BUG-2015648 include data interception and denial of service due to the use of weak TLS ciphers.
OpenJDK JSSE versions prior to the patch addressing REDHAT-BUG-2015648 are affected.
The changes made to resolve REDHAT-BUG-2015648 include preferring ciphers with forward secrecy and lowering the priority of ciphers using RSA encryption.