Bug 2014508 (CVE-2021-35565) - CVE-2021-35565 OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967)
Summary: CVE-2021-35565 OpenJDK: Loop in HttpsServer triggered during TLS session clos...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2021-35565
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2012335 2012339 2026908 2026910 2026911 2012332 2012333 2012334 2012336 2012337 2012338 2014299 2014300 2014301 2014302 2026909
Blocks: 2011827
TreeView+ depends on / blocked
 
Reported: 2021-10-15 12:48 UTC by Tomas Hoger
Modified: 2021-12-13 09:51 UTC (History)
8 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-10-20 14:08:36 UTC


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2021:3952 0 None None None 2021-10-25 01:19:47 UTC
Red Hat Product Errata RHBA-2021:3954 0 None None None 2021-10-25 01:22:59 UTC
Red Hat Product Errata RHBA-2021:3963 0 None None None 2021-10-25 12:33:31 UTC
Red Hat Product Errata RHBA-2021:3964 0 None None None 2021-10-25 12:33:18 UTC
Red Hat Product Errata RHBA-2021:3965 0 None None None 2021-10-25 12:32:12 UTC
Red Hat Product Errata RHBA-2021:3966 0 None None None 2021-10-25 12:32:39 UTC
Red Hat Product Errata RHBA-2021:3969 0 None None None 2021-10-25 12:58:37 UTC
Red Hat Product Errata RHBA-2021:3970 0 None None None 2021-10-25 12:57:14 UTC
Red Hat Product Errata RHBA-2021:3979 0 None None None 2021-10-25 17:53:09 UTC
Red Hat Product Errata RHBA-2021:3983 0 None None None 2021-10-26 01:24:58 UTC
Red Hat Product Errata RHBA-2021:3984 0 None None None 2021-10-26 01:29:56 UTC
Red Hat Product Errata RHBA-2021:3985 0 None None None 2021-10-26 01:30:48 UTC
Red Hat Product Errata RHBA-2021:3986 0 None None None 2021-10-26 01:28:19 UTC
Red Hat Product Errata RHBA-2021:3993 0 None None None 2021-10-26 10:35:32 UTC
Red Hat Product Errata RHBA-2021:3994 0 None None None 2021-10-26 11:28:53 UTC
Red Hat Product Errata RHBA-2021:3995 0 None None None 2021-10-26 11:29:12 UTC
Red Hat Product Errata RHBA-2021:4041 0 None None None 2021-11-01 10:43:10 UTC
Red Hat Product Errata RHBA-2021:4048 0 None None None 2021-11-01 18:51:57 UTC
Red Hat Product Errata RHBA-2021:4125 0 None None None 2021-11-04 11:21:14 UTC
Red Hat Product Errata RHBA-2021:4126 0 None None None 2021-11-04 11:21:42 UTC
Red Hat Product Errata RHBA-2021:4127 0 None None None 2021-11-04 12:55:54 UTC
Red Hat Product Errata RHBA-2021:4583 0 None None None 2021-11-10 13:05:53 UTC
Red Hat Product Errata RHBA-2021:4584 0 None None None 2021-11-10 08:16:43 UTC
Red Hat Product Errata RHBA-2021:4670 0 None None None 2021-11-16 03:50:28 UTC
Red Hat Product Errata RHBA-2021:4732 0 None None None 2021-11-18 12:15:15 UTC
Red Hat Product Errata RHBA-2021:4842 0 None None None 2021-11-29 12:31:38 UTC
Red Hat Product Errata RHBA-2021:5079 0 None None None 2021-12-13 08:05:41 UTC
Red Hat Product Errata RHBA-2021:5083 0 None None None 2021-12-13 09:51:23 UTC
Red Hat Product Errata RHSA-2021:3884 0 None None None 2021-10-20 13:18:16 UTC
Red Hat Product Errata RHSA-2021:3885 0 None None None 2021-10-20 13:32:32 UTC
Red Hat Product Errata RHSA-2021:3886 0 None None None 2021-10-20 13:08:56 UTC
Red Hat Product Errata RHSA-2021:3887 0 None None None 2021-10-20 13:44:55 UTC
Red Hat Product Errata RHSA-2021:3889 0 None None None 2021-10-20 14:37:55 UTC
Red Hat Product Errata RHSA-2021:3891 0 None None None 2021-10-20 13:53:21 UTC
Red Hat Product Errata RHSA-2021:3892 0 None None None 2021-10-20 15:22:58 UTC
Red Hat Product Errata RHSA-2021:3893 0 None None None 2021-10-20 13:39:50 UTC
Red Hat Product Errata RHSA-2021:3960 0 None None None 2021-10-25 11:55:40 UTC
Red Hat Product Errata RHSA-2021:3961 0 None None None 2021-10-25 11:55:58 UTC
Red Hat Product Errata RHSA-2021:3967 0 None None None 2021-10-25 12:24:27 UTC
Red Hat Product Errata RHSA-2021:3968 0 None None None 2021-10-25 12:25:04 UTC
Red Hat Product Errata RHSA-2021:5030 0 None None None 2021-12-08 16:19:50 UTC

Description Tomas Hoger 2021-10-15 12:48:18 UTC
An inifinte loop flaw was found in the HttpsServer class implementation in the JSSE component of OpenJDK.  A remote attacker could possibly use this flaw to cause a Java application implementing HTTPS server functionality to loop during the TLS session closing and consume an excessive amount of CPU time.

Comment 1 Tomas Hoger 2021-10-19 20:23:20 UTC
Public now via Oracle CPU October 2021:

https://www.oracle.com/security-alerts/cpuoct2021.html#AppendixJAVA

Fixed in Oracle Java SE 17.0.1, 11.0.13, 8u311, and 7u321.

Comment 6 errata-xmlrpc 2021-10-20 13:08:55 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Extended Update Support

Via RHSA-2021:3886 https://access.redhat.com/errata/RHSA-2021:3886

Comment 7 errata-xmlrpc 2021-10-20 13:18:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Extended Update Support

Via RHSA-2021:3884 https://access.redhat.com/errata/RHSA-2021:3884

Comment 8 errata-xmlrpc 2021-10-20 13:32:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Extended Update Support

Via RHSA-2021:3885 https://access.redhat.com/errata/RHSA-2021:3885

Comment 9 errata-xmlrpc 2021-10-20 13:39:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:3893 https://access.redhat.com/errata/RHSA-2021:3893

Comment 10 errata-xmlrpc 2021-10-20 13:44:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Extended Update Support

Via RHSA-2021:3887 https://access.redhat.com/errata/RHSA-2021:3887

Comment 11 errata-xmlrpc 2021-10-20 13:53:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:3891 https://access.redhat.com/errata/RHSA-2021:3891

Comment 12 Product Security DevOps Team 2021-10-20 14:08:36 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-35565

Comment 13 errata-xmlrpc 2021-10-20 14:37:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2021:3889 https://access.redhat.com/errata/RHSA-2021:3889

Comment 14 errata-xmlrpc 2021-10-20 15:22:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2021:3892 https://access.redhat.com/errata/RHSA-2021:3892

Comment 15 errata-xmlrpc 2021-10-25 11:55:38 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 8u312

Via RHSA-2021:3960 https://access.redhat.com/errata/RHSA-2021:3960

Comment 16 errata-xmlrpc 2021-10-25 11:55:56 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 8u312

Via RHSA-2021:3961 https://access.redhat.com/errata/RHSA-2021:3961

Comment 17 errata-xmlrpc 2021-10-25 12:24:26 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 11.0.13

Via RHSA-2021:3967 https://access.redhat.com/errata/RHSA-2021:3967

Comment 18 errata-xmlrpc 2021-10-25 12:25:03 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 11.0.13

Via RHSA-2021:3968 https://access.redhat.com/errata/RHSA-2021:3968

Comment 20 errata-xmlrpc 2021-12-08 16:19:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Supplementary

Via RHSA-2021:5030 https://access.redhat.com/errata/RHSA-2021:5030


Note You need to log in before you can comment on or make changes to this bug.