First published: Tue Jul 16 2019(Updated: )
The Elliptic Curve (EC) cryptography in the Security component of OpenJDK was modernized to use formulas that are more efficient, easier to implement, and offer greater resiliency against side-channel attacks (timing or cache). For more detailed information, refer to upstream bug: <a href="https://bugs.openjdk.java.net/browse/JDK-8208698">https://bugs.openjdk.java.net/browse/JDK-8208698</a> Upstream commit: <a href="http://hg.openjdk.java.net/jdk/jdk/rev/752e57845ad2">http://hg.openjdk.java.net/jdk/jdk/rev/752e57845ad2</a>
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1730411 is considered critical due to potential vulnerabilities associated with elliptic curve cryptography.
To fix REDHAT-BUG-1730411, update your OpenJDK to the latest version that incorporates the modernized elliptic curve cryptography.
REDHAT-BUG-1730411 addresses vulnerabilities related to inefficiencies in elliptic curve cryptography that could lead to side-channel attacks.
REDHAT-BUG-1730411 specifically affects certain versions of OpenJDK, so it's critical to reference the supported versions for your software.
Failure to address REDHAT-BUG-1730411 may leave systems exposed to potential side-channel attacks, compromising security.