Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1219223 - (CVE-2015-0138) CVE-2015-0138 IBM JDK: ephemeral RSA keys accepted for non-export SSL/TLS cipher suites (FREAK)
CVE-2015-0138 IBM JDK: ephemeral RSA keys accepted for non-export SSL/TLS cip...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20150311,repor...
: Security
Depends On:
Blocks: 1209063
  Show dependency treegraph
 
Reported: 2015-05-06 17:00 EDT by Tomas Hoger
Modified: 2015-06-11 09:22 EDT (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-05-20 16:39:27 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:1006 normal SHIPPED_LIVE Critical: java-1.6.0-ibm security update 2015-05-13 13:34:08 EDT
Red Hat Product Errata RHSA-2015:1007 normal SHIPPED_LIVE Critical: java-1.7.0-ibm security update 2015-05-13 13:33:04 EDT
Red Hat Product Errata RHSA-2015:1020 normal SHIPPED_LIVE Critical: java-1.7.1-ibm security update 2015-05-20 19:05:51 EDT
Red Hat Product Errata RHSA-2015:1021 normal SHIPPED_LIVE Important: java-1.5.0-ibm security update 2015-05-20 18:36:22 EDT
Red Hat Product Errata RHSA-2015:1091 normal SHIPPED_LIVE Low: Red Hat Satellite IBM Java Runtime security update 2015-06-11 13:21:29 EDT

  None (edit)
Description Tomas Hoger 2015-05-06 17:00:20 EDT
IBM JDK versions 5.0 SR16-FP10, 6 SR16-FP4, 6R1 SR8-FP4, 7 SR9, 7R1 SR3 and 8 SR1 correct an issue known as "FREAK" (Factoring RSA Export Keys).  An SSL/TLS client using IBM JDK's JSSE can accept ephemeral RSA keys even when using non-export cipher suites.  A MITM attacker could possibly use this flaw to impersonate server which enables export cipher suites.  This issue is similar to CVE-2015-0204 (bug 1180184) which affected OpenSSL.

Description of the flaw in the IBM security bulletin:

A vulnerability in various IBM SSL/TLS implementations could allow a remote attacker to downgrade the security of certain SSL/TLS connections. An IBM SSL/TLS client implementation could accept the use of an RSA temporary key in a non-export RSA key exchange ciphersuite. This could allow a remote attacker using man-in-the-middle techniques to facilitate brute-force decryption of TLS/SSL traffic between vulnerable clients and servers. This vulnerability is also known as the FREAK attack.

References:

http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_May_2015
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
https://www.smacktls.com/#freak
Comment 1 Tomas Hoger 2015-05-07 08:32:40 EDT
In addition to fixing the bug that causes client to accept ephemeral RSA keys for non-export cipher suites, these updates also disable export cipher suites by default in IBM JDK 5.0 and 6.  They were previously disabled in IBM JDK 7.
Comment 2 errata-xmlrpc 2015-05-13 09:34:05 EDT
This issue has been addressed in the following products:

  Supplementary for Red Hat Enterprise Linux 5

Via RHSA-2015:1007 https://rhn.redhat.com/errata/RHSA-2015-1007.html
Comment 3 errata-xmlrpc 2015-05-13 09:36:00 EDT
This issue has been addressed in the following products:

  Supplementary for Red Hat Enterprise Linux 6
  Supplementary for Red Hat Enterprise Linux 5

Via RHSA-2015:1006 https://rhn.redhat.com/errata/RHSA-2015-1006.html
Comment 4 errata-xmlrpc 2015-05-20 14:37:11 EDT
This issue has been addressed in the following products:

  Supplementary for Red Hat Enterprise Linux 5
  Supplementary for Red Hat Enterprise Linux 6

Via RHSA-2015:1021 https://rhn.redhat.com/errata/RHSA-2015-1021.html
Comment 5 errata-xmlrpc 2015-05-20 15:06:46 EDT
This issue has been addressed in the following products:

  Supplementary for Red Hat Enterprise Linux 6
  Supplementary for Red Hat Enterprise Linux 7

Via RHSA-2015:1020 https://rhn.redhat.com/errata/RHSA-2015-1020.html
Comment 6 errata-xmlrpc 2015-06-11 09:22:17 EDT
This issue has been addressed in the following products:

  Red Hat Satellite Server v 5.6
  Red Hat Satellite Server v 5.7

Via RHSA-2015:1091 https://rhn.redhat.com/errata/RHSA-2015-1091.html

Note You need to log in before you can comment on or make changes to this bug.