First published: Fri Jul 10 2015(Updated: )
It was discovered that the JCE (Java Cryptography Extension) component in OpenJDK failed to use constant time comparisons in multiple cases. An attacker could possibly use these flaws to disclose sensitive information by measuring time used to perform operations using these non-constant time comparisons.
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JRockit | =r28.3.6 | |
Oracle JDK | =1.6.0-update95 | |
Oracle JDK | =1.7.0-update75 | |
Oracle JDK | =1.7.0-update80 | |
Oracle JDK | =1.8.0-update_33 | |
Oracle JDK | =1.8.0-update45 | |
Oracle JRE | =1.6.0-update_95 | |
Oracle JRE | =1.7.0-update_75 | |
Oracle JRE | =1.7.0-update_80 | |
Oracle JRE | =1.8.0-update_33 | |
Oracle JRE | =1.8.0-update_45 | |
debian/openjdk-8 | 8u432-b06-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-2601 is medium with a severity value of 5.
Oracle Java SE versions 6u95, 7u80, and 8u45, JRockit R28.3.6, and Java SE Embedded versions 7u75 and 8u33 are affected.
Remote attackers can exploit CVE-2015-2601 to affect confidentiality via vectors related to JCE.
You can find more information about CVE-2015-2601 at the following references: [http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA](http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA), [https://rhn.redhat.com/errata/RHSA-2015-1230.html](https://rhn.redhat.com/errata/RHSA-2015-1230.html), [https://rhn.redhat.com/errata/RHSA-2015-1229.html](https://rhn.redhat.com/errata/RHSA-2015-1229.html).
To fix CVE-2015-2601, it is recommended to apply the patches provided by Oracle. Please refer to the references for the specific patches.