Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1242456 - (CVE-2015-2613) CVE-2015-2613 NSS / JCE: missing EC parameter validation in ECDH_Derive() (OpenJDK JCE, 8075833)
CVE-2015-2613 NSS / JCE: missing EC parameter validation in ECDH_Derive() (Op...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20150714,repor...
: Security
Depends On: 1300624 1300628
Blocks: 1235167 1244111
  Show dependency treegraph
 
Reported: 2015-07-13 07:47 EDT by Tomas Hoger
Modified: 2016-01-21 05:08 EST (History)
4 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-08-25 16:31:52 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
OpenJDK8 / JCE patch (1.02 KB, patch)
2015-07-13 07:52 EDT, Tomas Hoger
no flags Details | Diff


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:1241 normal SHIPPED_LIVE Critical: java-1.8.0-oracle security update 2017-12-15 10:34:28 EST
Red Hat Product Errata RHSA-2015:1242 normal SHIPPED_LIVE Critical: java-1.7.0-oracle security update 2017-12-15 10:31:57 EST
Red Hat Product Errata RHSA-2015:1485 normal SHIPPED_LIVE Critical: java-1.7.1-ibm security update 2015-07-22 19:56:33 EDT
Red Hat Product Errata RHSA-2015:1488 normal SHIPPED_LIVE Critical: java-1.7.0-ibm security update 2015-07-23 19:20:39 EDT

  None (edit)
Description Tomas Hoger 2015-07-13 07:47:27 EDT
It was discovered that the Elliptic Curve (EC) cryptography code as used in
Mozilla NSS (Network Security Services) library and OpenJDK JCE (Java
Cryptography Extension) component failed to properly validate EC parameters as
used in ECDH_Derive() function, which performs ECDH (Elliptic Curve
Diffie-Hellman) key derivation.  A remote attacker could use this flaw to
disclose sensitive information.

The OpenJDK packages as shipped with Red Hat Enterprise Linux 5, 6 and 7 do not
build the affected EC code and are therefore not directly affected.  Future
versions may provide EC support via NSS, see e.g. bug 1075702.
Comment 2 Tomas Hoger 2015-07-13 07:52:19 EDT
Created attachment 1051378 [details]
OpenJDK8 / JCE patch
Comment 3 Tomas Hoger 2015-07-15 02:24:12 EDT
Public now via Oracle Critical Patch Update - July 2015.  Fixed in Oracle Java SE 7u85 and 8u51.

External References:

http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA
Comment 4 Tomas Hoger 2015-07-15 07:09:12 EDT
This issue was already known to NSS upstream for a while, and is tracked via the following upstream bug:

https://bugzilla.mozilla.org/show_bug.cgi?id=380351

It seems it was handled as low priority issue there, as the only place where NSS called ECDH_Derive() is preceded by a call to EC_ValidatePublicKey(), making another call to EC_ValidatePublicKey() in ECDH_Derive() redundant.  However, ECDH_Derive() is part of the exposed NSS API, other applications using NSS may call it without performing parameter validation before the call.
Comment 5 Tomas Hoger 2015-07-16 10:53:04 EDT
OpenJDK 8 upstream commit:

http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/dcc75a75d3a3
Comment 6 errata-xmlrpc 2015-07-17 04:05:40 EDT
This issue has been addressed in the following products:

  Oracle Java for Red Hat Enterprise Linux 6
  Oracle Java for Red Hat Enterprise Linux 7
  Oracle Java for Red Hat Enterprise Linux 5

Via RHSA-2015:1242 https://rhn.redhat.com/errata/RHSA-2015-1242.html
Comment 7 errata-xmlrpc 2015-07-17 04:08:42 EDT
This issue has been addressed in the following products:

  Oracle Java for Red Hat Enterprise Linux 6
  Oracle Java for Red Hat Enterprise Linux 7

Via RHSA-2015:1241 https://rhn.redhat.com/errata/RHSA-2015-1241.html
Comment 8 errata-xmlrpc 2015-07-22 15:57:17 EDT
This issue has been addressed in the following products:

  Supplementary for Red Hat Enterprise Linux 7
  Supplementary for Red Hat Enterprise Linux 6

Via RHSA-2015:1485 https://rhn.redhat.com/errata/RHSA-2015-1485.html
Comment 9 errata-xmlrpc 2015-07-23 15:21:49 EDT
This issue has been addressed in the following products:

  Supplementary for Red Hat Enterprise Linux 5

Via RHSA-2015:1488 https://rhn.redhat.com/errata/RHSA-2015-1488.html
Comment 10 Huzaifa S. Sidhpurwala 2015-08-17 02:11:20 EDT
This issue was addressed by Mozilla upstream via the following commit:

https://hg.mozilla.org/projects/nss/rev/a3a37589ba7d

(This commit is on nss-3.21, no intentions to backport to older versions yet.)

Note You need to log in before you can comment on or make changes to this bug.