First published: Mon Jul 15 2019(Updated: )
It was discovered that the ChaCha20Cipher implementation in the Security component of OpenJDK used non-constant time comparison for comparing tags. A remote attacker could possible use the flaw to leak information about decryption state using the timing information.
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK | =11.0.3 | |
Oracle JDK | =12.0.1 | |
Oracle JRE | =11.0.3 | |
Oracle JRE | =12.0.1 | |
debian/openjdk-11 | 11.0.24+8-2~deb11u1 11.0.25+9-1~deb11u1 11.0.26~6ea-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-2818 is low with a CVSS score of 3.1.
Java SE versions 11.0.3 and 12.0.1 are affected by CVE-2019-2818.
An unauthenticated attacker with network access can exploit CVE-2019-2818 through multiple protocols to compromise Java SE.
The recommended remedy for openjdk-11 on Debian is to upgrade to version 11.0.16+8-1~deb10u1 or higher.
The recommended remedy for openjdk-12 on Ubuntu is to upgrade to version 12.0.2+9-1 or higher.