Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1567126 - (CVE-2018-2794) CVE-2018-2794 OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997)
CVE-2018-2794 OpenJDK: unrestricted deserialization of data from JCEKS key st...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
impact=important,public=20180417,repo...
: Security
Depends On: 1559768 1559769 1559770 1559771 1559773 1559774 1559775 1559776 1565346 1565347 1565348 1565349 1565350 1565351 1565352 1565353 1565511 1565512 1565513 1565514 1577848 1577849 1577850 1577851 1577855 1577856 1577857 1577858 1579406 1579410
Blocks: 1569958 1559778
  Show dependency treegraph
 
Reported: 2018-04-13 09:10 EDT by Tomas Hoger
Modified: 2018-06-25 10:57 EDT (History)
4 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2018-05-24 16:52:30 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:1188 None None None 2018-04-19 12:59 EDT
Red Hat Product Errata RHSA-2018:1191 None None None 2018-04-19 14:00 EDT
Red Hat Product Errata RHSA-2018:1201 None None None 2018-04-23 13:11 EDT
Red Hat Product Errata RHSA-2018:1202 None None None 2018-04-23 13:14 EDT
Red Hat Product Errata RHSA-2018:1203 None None None 2018-04-23 13:20 EDT
Red Hat Product Errata RHSA-2018:1204 None None None 2018-04-23 13:17 EDT
Red Hat Product Errata RHSA-2018:1205 None None None 2018-04-23 13:22 EDT
Red Hat Product Errata RHSA-2018:1206 None None None 2018-04-23 13:29 EDT
Red Hat Product Errata RHSA-2018:1270 None None None 2018-04-30 12:17 EDT
Red Hat Product Errata RHSA-2018:1278 None None None 2018-05-02 18:06 EDT
Red Hat Product Errata RHSA-2018:1721 None None None 2018-05-24 14:52 EDT
Red Hat Product Errata RHSA-2018:1722 None None None 2018-05-24 14:57 EDT
Red Hat Product Errata RHSA-2018:1723 None None None 2018-05-24 15:01 EDT
Red Hat Product Errata RHSA-2018:1724 None None None 2018-05-24 15:04 EDT
Red Hat Product Errata RHSA-2018:1974 None None None 2018-06-25 10:56 EDT
Red Hat Product Errata RHSA-2018:1975 None None None 2018-06-25 10:57 EDT

  None (edit)
Description Tomas Hoger 2018-04-13 09:10:35 EDT
It was discovered that the Security component of OpenJDK did not restrict which classes could be used when deserializing keys form the JCEKS key stores. A specially crafted JCEKS key store could possibly use this flaw to execute arbitrary code with the privileges of an application reading data form the key store.

The fix adds support for a new security property jceks.key.serialFilter which can be used to specify classes that can be used when deserializing data from the JCEKS key stores.
Comment 1 Tomas Hoger 2018-04-17 16:43:40 EDT
Public now via Oracle CPU April 2018:

http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html#AppendixJAVA

The issue was fixed in Oracle JDK 10.0.1, 8u171, 7u181, and 6u191.
Comment 2 Tomas Hoger 2018-04-17 16:48:17 EDT
Relevant entry in the Oracle JDK release notes:

  security-libs/javax.crypto
  Enhanced KeyStore Mechanisms

  A new security property named jceks.key.serialFilter has been introduced.
  If this filter is configured, the JCEKS KeyStore uses it during the
  deserialization of the encrypted Key object stored inside a SecretKeyEntry.
  If it is not configured or if the filter result is UNDECIDED (for example,
  none of the patterns match), then the filter configured by
  jdk.serialFilter is consulted.

  If the system property jceks.key.serialFilter is also supplied, it
  supersedes the security property value defined here.

  The filter pattern uses the same format as jdk.serialFilter. The default
  pattern allows java.lang.Enum, java.security.KeyRep,
  java.security.KeyRep$Type, and javax.crypto.spec.SecretKeySpec but
  rejects all the others.

  Customers storing a SecretKey that does not serialize to the above types
  must modify the filter to make the key extractable.

  JDK-8189997 (not public)

http://www.oracle.com/technetwork/java/javase/8u171-relnotes-4308888.html
http://www.oracle.com/technetwork/java/javaseproducts/documentation/javase7supportreleasenotes-1601161.html#R170_181
http://www.oracle.com/technetwork/java/javase/documentation/overview-156328.html#R160_191
Comment 3 errata-xmlrpc 2018-04-19 12:59:49 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2018:1188 https://access.redhat.com/errata/RHSA-2018:1188
Comment 4 errata-xmlrpc 2018-04-19 14:00:29 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:1191 https://access.redhat.com/errata/RHSA-2018:1191
Comment 6 errata-xmlrpc 2018-04-23 13:11:42 EDT
This issue has been addressed in the following products:

  Oracle Java for Red Hat Enterprise Linux 7

Via RHSA-2018:1201 https://access.redhat.com/errata/RHSA-2018:1201
Comment 7 errata-xmlrpc 2018-04-23 13:14:53 EDT
This issue has been addressed in the following products:

  Oracle Java for Red Hat Enterprise Linux 6

Via RHSA-2018:1202 https://access.redhat.com/errata/RHSA-2018:1202
Comment 8 errata-xmlrpc 2018-04-23 13:17:25 EDT
This issue has been addressed in the following products:

  Oracle Java for Red Hat Enterprise Linux 7

Via RHSA-2018:1204 https://access.redhat.com/errata/RHSA-2018:1204
Comment 9 errata-xmlrpc 2018-04-23 13:19:54 EDT
This issue has been addressed in the following products:

  Oracle Java for Red Hat Enterprise Linux 6

Via RHSA-2018:1203 https://access.redhat.com/errata/RHSA-2018:1203
Comment 10 errata-xmlrpc 2018-04-23 13:21:56 EDT
This issue has been addressed in the following products:

  Oracle Java for Red Hat Enterprise Linux 7

Via RHSA-2018:1205 https://access.redhat.com/errata/RHSA-2018:1205
Comment 11 errata-xmlrpc 2018-04-23 13:29:48 EDT
This issue has been addressed in the following products:

  Oracle Java for Red Hat Enterprise Linux 6

Via RHSA-2018:1206 https://access.redhat.com/errata/RHSA-2018:1206
Comment 12 errata-xmlrpc 2018-04-30 12:17:18 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2018:1270 https://access.redhat.com/errata/RHSA-2018:1270
Comment 13 errata-xmlrpc 2018-05-02 18:06:14 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:1278 https://access.redhat.com/errata/RHSA-2018:1278
Comment 16 errata-xmlrpc 2018-05-24 14:52:37 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Supplementary

Via RHSA-2018:1721 https://access.redhat.com/errata/RHSA-2018:1721
Comment 17 errata-xmlrpc 2018-05-24 14:57:07 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6 Supplementary

Via RHSA-2018:1722 https://access.redhat.com/errata/RHSA-2018:1722
Comment 18 errata-xmlrpc 2018-05-24 15:00:57 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Supplementary

Via RHSA-2018:1723 https://access.redhat.com/errata/RHSA-2018:1723
Comment 19 errata-xmlrpc 2018-05-24 15:04:34 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6 Supplementary

Via RHSA-2018:1724 https://access.redhat.com/errata/RHSA-2018:1724
Comment 20 errata-xmlrpc 2018-06-25 10:56:44 EDT
This issue has been addressed in the following products:

  Red Hat Satellite 5.6
  Red Hat Satellite 5.7

Via RHSA-2018:1974 https://access.redhat.com/errata/RHSA-2018:1974
Comment 21 errata-xmlrpc 2018-06-25 10:57:19 EDT
This issue has been addressed in the following products:

  Red Hat Satellite 5.8

Via RHSA-2018:1975 https://access.redhat.com/errata/RHSA-2018:1975

Note You need to log in before you can comment on or make changes to this bug.