First published: Mon Jul 15 2019(Updated: )
It was discovered that the ChaCha20Cipher implementation in the Security component of OpenJDK used non-constant time comparison for comparing tags. A remote attacker could possible use the flaw to leak information about decryption state using the timing information.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK 17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1730078 is considered high due to the potential for information leakage based on timing attacks.
To fix REDHAT-BUG-1730078, you should update to the latest version of OpenJDK that includes the security patch.
REDHAT-BUG-1730078 affects Oracle OpenJDK 17 and potentially other versions if the flaw is present.
REDHAT-BUG-1730078 is a timing attack vulnerability involving non-constant time comparison in the ChaCha20Cipher implementation.
An attacker exploiting REDHAT-BUG-1730078 could potentially leak sensitive information regarding the decryption state through timing analysis.