First published: Tue Jan 17 2017(Updated: )
A covert timing channel flaw was found in the DSA implementation in the Libraries component of OpenJDK. A remote attacker able to make a Java application generate DSA signatures on demand could possibly use this flaw to extract certain information about the used key via a timing side channel.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1413920 is considered critical due to the potential for information leakage via a covert timing channel.
To mitigate REDHAT-BUG-1413920, you should apply the latest security patches for OpenJDK provided by your vendor.
REDHAT-BUG-1413920 affects systems running vulnerable versions of OpenJDK that utilize the DSA signature generation.
Exploiting REDHAT-BUG-1413920 could allow an attacker to infer sensitive information about cryptographic keys using timing attacks.
REDHAT-BUG-1413920 was discovered through analysis of the DSA implementation in OpenJDK, highlighting its vulnerability to covert timing channels.