Bug 1298949 (CVE-2016-0475) - CVE-2016-0475 OpenJDK: PBE incorrect key lengths (Libraries, 8138589)
Summary: CVE-2016-0475 OpenJDK: PBE incorrect key lengths (Libraries, 8138589)
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2016-0475
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1295699
TreeView+ depends on / blocked
 
Reported: 2016-01-15 13:39 UTC by Tomas Hoger
Modified: 2021-02-17 04:30 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
It was discovered that the password-based encryption (PBE) implementation in the Libraries component in OpenJDK used an incorrect key length. This could, in certain cases, lead to generation of keys that were weaker than expected.
Clone Of:
Environment:
Last Closed: 2016-02-02 15:20:56 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:0049 0 normal SHIPPED_LIVE Critical: java-1.8.0-openjdk security update 2016-01-21 00:30:34 UTC
Red Hat Product Errata RHSA-2016:0050 0 normal SHIPPED_LIVE Important: java-1.8.0-openjdk security update 2016-01-21 00:14:13 UTC
Red Hat Product Errata RHSA-2016:0055 0 normal SHIPPED_LIVE Critical: java-1.8.0-oracle security update 2017-12-15 03:12:59 UTC
Red Hat Product Errata RHSA-2016:0098 0 normal SHIPPED_LIVE Critical: java-1.8.0-ibm security update 2016-02-02 18:39:03 UTC

Description Tomas Hoger 2016-01-15 13:39:03 UTC
It was discovered that the password-based encryption (PBE) implementation in the Libraries component of OpenJDK specified incorrect key length.  This could lead to generation of keys that were weaker than expected in certain cases.

Comment 1 Tomas Hoger 2016-01-19 21:52:11 UTC
Public now via Oracle Critical Patch Update - January 2016.  Fixed in Oracle Java SE 8u71.

External References:

http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html#AppendixJAVA

Comment 2 Tomas Hoger 2016-01-20 14:02:00 UTC
OpenJDK 8 upstream commit:

http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/5ea62bb625b6

Comment 3 errata-xmlrpc 2016-01-20 19:15:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2016:0050 https://rhn.redhat.com/errata/RHSA-2016-0050.html

Comment 4 errata-xmlrpc 2016-01-20 19:32:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:0049 https://rhn.redhat.com/errata/RHSA-2016-0049.html

Comment 5 errata-xmlrpc 2016-01-21 11:41:12 UTC
This issue has been addressed in the following products:

  Oracle Java for Red Hat Enterprise Linux 6
  Oracle Java for Red Hat Enterprise Linux 7

Via RHSA-2016:0055 https://rhn.redhat.com/errata/RHSA-2016-0055.html

Comment 6 Tomas Hoger 2016-01-22 10:23:31 UTC
Oracle JDK 8u71 has this note related to this change:

  Problem with PBE algorithms using AES crypto corrected

  An error was corrected for PBE using 256-bit AES ciphers such that the
  derived key may be different and not equivalent to keys previously derived
  from the same password.

  JDK-8138589 (not public)

http://www.oracle.com/technetwork/java/javase/8u71-relnotes-2773756.html

Comment 7 errata-xmlrpc 2016-02-02 13:39:55 UTC
This issue has been addressed in the following products:

  Supplementary for Red Hat Enterprise Linux 7

Via RHSA-2016:0098 https://rhn.redhat.com/errata/RHSA-2016-0098.html


Note You need to log in before you can comment on or make changes to this bug.