Need to address side-channel handling of RSA PKCS#1 v1.5 padding errors.
OpenJDK-8 upstream commit: https://github.com/openjdk/jdk8u/commit/3cdd3081565d890801a27a1f9ac8bc53e5711ce6 OpenJDK-11 upstream commit: https://github.com/openjdk/jdk11u/commit/2adb01e8c5fbcc3dfa9f82df3deccb3a1705bf13 OpenJDK-17 upstream commit: https://github.com/openjdk/jdk17u/commit/73aa304234f2ec17abbb640b7f2d0503cf1bfc91 OpenJDK-21 upstream commit: https://github.com/openjdk/jdk21u/commit/d5c94adf69ba20f5652453729620c4f1c8e4860e
This CVE was fixed in Oracle Java SE 8u451, 8u451-perf, 11.0.27, 17.0.15, 21.0.7, 24.0.1. Release notes: https://www.oracle.com/java/technologies/javase/8u451-relnotes.html#R180_451 https://www.oracle.com/java/technologies/javase/8u451-perf-relnotes.html https://www.oracle.com/java/technologies/javase/11-0-27-relnotes.html#R11_0_27 https://www.oracle.com/java/technologies/javase/17-0-15-relnotes.html#R17_0_15 https://www.oracle.com/java/technologies/javase/21-0-7-relnotes.html https://www.oracle.com/java/technologies/javase/24-0-1-relnotes.html