It was discovered that the ChaCha20Cipher implementation in the Security component of OpenJDK used non-constant time comparison for comparing tags. A remote attacker could possible use the flaw to leak information about decryption state using the timing information.
Public now via Oracle CPU July 2019: https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html#AppendixJAVA Fixed in Oracle Java SE 12.0.2 and 11.0.4.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:1817 https://access.redhat.com/errata/RHSA-2019:1817
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:1810 https://access.redhat.com/errata/RHSA-2019:1810
OpenJDK-11 upstream commit: http://hg.openjdk.java.net/jdk-updates/jdk11u/rev/7f92fc4cdf02