First published: Mon Jul 17 2017(Updated: )
A covert timing channel flaw was found in the PKCS#8 implementation in the JCE component of OpenJDK. A remote attacker able to make a Java application repeatedly compared PKCS#8 key against an attacker controlled value could possibly use this flaw to determine the key via a timing side channel.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK 17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1471871 is considered to be high due to the potential for key exposure through a covert timing channel.
To fix REDHAT-BUG-1471871, you should upgrade to the latest version of OpenJDK that addresses this vulnerability.
Users of Oracle OpenJDK, particularly those using versions vulnerable to the PKCS#8 timing channel flaw, are affected by REDHAT-BUG-1471871.
REDHAT-BUG-1471871 can be exploited by attackers who repeatedly compare PKCS#8 keys, potentially allowing them to infer the key through timing differences.
Currently, there are no recommended workarounds for REDHAT-BUG-1471871 other than applying the necessary upgrades to mitigate the flaw.