A covert timing channel flaw was found in the PKCS#8 implementation in the JCE component of OpenJDK. A remote attacker able to make a Java application repeatedly compare PKCS#8 key against an attacker controlled value could possibly use this flaw to determine the key via a timing side channel.
Find out more about CVE-2017-10135 from the MITRE CVE dictionary dictionary and NIST NVD.
CVSS3 Base Score | 5.3 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N |
Attack Vector | Network |
Attack Complexity | High |
Privileges Required | None |
User Interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity Impact | None |
Availability Impact | None |
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 6 (java-1.7.0-openjdk) | RHSA-2017:2424 | 2017-08-07 |
Red Hat Enterprise Linux 6 (java-1.8.0-openjdk) | RHSA-2017:1789 | 2017-07-20 |
Oracle Java for Red Hat Enterprise Linux 6 (java-1.7.0-oracle) | RHSA-2017:1791 | 2017-07-20 |
Oracle Java for Red Hat Enterprise Linux 6 (java-1.8.0-oracle) | RHSA-2017:1790 | 2017-07-20 |
Oracle Java for Red Hat Enterprise Linux 6 (java-1.6.0-sun) | RHSA-2017:1792 | 2017-07-20 |
Red Hat Enterprise Linux 7 (java-1.7.0-openjdk) | RHSA-2017:2424 | 2017-08-07 |
Red Hat Enterprise Linux 7 (java-1.8.0-openjdk) | RHSA-2017:1789 | 2017-07-20 |
Oracle Java for Red Hat Enterprise Linux 7 (java-1.6.0-sun) | RHSA-2017:1792 | 2017-07-20 |
Oracle Java for Red Hat Enterprise Linux 7 (java-1.8.0-oracle) | RHSA-2017:1790 | 2017-07-20 |
Oracle Java for Red Hat Enterprise Linux 7 (java-1.7.0-oracle) | RHSA-2017:1791 | 2017-07-20 |