First published: Mon Apr 17 2023(Updated: )
It was discovered that the TLS implementation in the JSSE component of OpenJDK did not correctly handle half-duplex connections during TLS handshake. A remote attacker attacker could use this flaw to affect confidentiality or integrity of a TLS connection.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK 17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2187435 is considered significant due to its potential impact on the confidentiality and integrity of TLS connections.
To fix REDHAT-BUG-2187435, upgrade to the patched versions of OpenJDK that address the TLS handshake vulnerability.
OpenJDK 17 and possibly earlier versions are affected by REDHAT-BUG-2187435.
Yes, a remote attacker can exploit REDHAT-BUG-2187435 to manipulate TLS connections.
The TLS implementation in the JSSE component of OpenJDK is primarily involved in REDHAT-BUG-2187435.