First published: Mon Jan 15 2018(Updated: )
It was discovered that the DHKeyAgreement and P11KeyAgreement implementations in the JCE component of OpenJDK did not guarantee sufficient strength of used keys to adequately protect generated shared secret. This could make it easier to break encryption by attacking key agreement rather than the encryption using the negotiated key. The patch for this issue causes classes' method generateSecret(String algorithm) to fail unless it's call for "TlsPremasterSecret", or the "jdk.crypto.KeyAgreement.legacyKDF" system property is set to true.
Credit: secalert_us@oracle.com secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openjdk-8 | 8u442-ga-2 | |
Oracle Java SE 7 | =1.6.0-update171 | |
Oracle Java SE 7 | =1.7.0-update161 | |
Oracle Java SE 7 | =1.8.0-update152 | |
Oracle Java SE 7 | =9.0.1 | |
Oracle JRE | =1.6.0-update171 | |
Oracle JRE | =1.7.0-update161 | |
Oracle JRE | =1.8.0-update152 | |
Oracle JRE | =9.0.1 | |
Oracle Java SE | =r28.3.16 | |
Red Hat Satellite | =5.6 | |
Red Hat Satellite | =5.7 | |
Red Hat Satellite | =5.8 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.5 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.10 | |
Schneider Electric EcoStruxure Data Center Expert | <7.6.0 | |
HP StorageWorks Command View | >=8.6.2-01 | |
HP StorageWorks Command View | >=8.6.2-01 | |
HP P9000 Command View Advanced Edition Software | >=8.6.2-01 | |
Oracle Java SE 7 | =1.9.0.1 | |
Oracle JRE | =1.9.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-2618 is medium, with a CVSS score of 5.9.
The impacted software for CVE-2018-2618 includes Java SE 6u171, 7u161, 8u152, and 9.0.1; Java SE Embedded 8u151; and JRockit R28.3.16.
To fix CVE-2018-2618, upgrade to OpenJDK 8u382-ga-2 (for Debian) or OpenJDK 7 or 8 (for Ubuntu).
Yes, Oracle JDK versions 1.6.0-update171, 1.7.0-update161, 1.8.0-update152, and 1.9.0.1, as well as Oracle JRE versions 1.6.0-update171, 1.7.0-update161, 1.8.0-update152, and 1.9.0.1 are affected by CVE-2018-2618.
Yes, Redhat Satellite versions 5.6, 5.7, and 5.8, as well as Redhat Enterprise Linux versions 6.0, 7.0, 7.4, 7.5, and 7.6 are affected by CVE-2018-2618.