IBM Support

IJ11618: TRUST ANCHORS FOR IBM CLOUD, PRIVATE KEY OBJECT LEAK IN HSM, IBM APPSCAN VULNERABILITY

Subscribe to this APAR

By subscribing, you receive periodic emails alerting you to the status of the APAR, along with a link to the fix after it becomes available. You can track this item individually or track all items by product.

Notify me when this APAR changes.

Notify me when an APAR for this component changes.

 

APAR status

  • Closed as program error.

Error description

  • Error Message: N/A
    .
    Stack Trace: N/A
    .
    

Local fix

Problem summary

  • 1. Add Trust anchors for IBM cloud
    We need to be able to populate keystore with the trust anchors
    needed to deploy and operate within the IBM Cloud.
    2. Private key objects leak in HSM
    iKeyman sometimes leak private key objects in HSM. The problem
    is the public key attribute "CKA_VERIFY" (keys used for
    verifying) is required to be set to TRUE to list both the
    private key and Trusted cert entry and thus avoid private key
    leak problem. In iKeyman code, this attribute was set to default
    value "FALSE".
    3. Vulnerability reported by IBM AppScan
    IBM Appscan reports that BufferedReader.readLine() method is
    prone to Allocation of Resources Without Limits and Reliance of
    untrusted input. (i.e. exhaust heap)
    

Problem conclusion

  • 1. Add Trust anchors for IBM cloud
    Following options are introduced to add trust anchors for IBM
    cloud to the existing keystore
    -ibmcloudtrust which applies to the -create and -convert
    operations.
    -addtrust adds legacy default set of trusted CAs or those
    required for deployment within IBM Cloud.
    2. Private key objects leak in HSM
    iKeyman code is fixed to set this attribute CKA_VERIFY to TRUE.
    Also, iKeyman CLI command parameter "-crypto" is modified to
    enable the user to pick up the token library filename from
    PKCS11 configuration file specified for the IBMPKCS11Impl
    security provider in java.security file. For more information,
    please refer to the latest iKeyman user guide.
    3. Vulnerability reported by IBM AppScan
    Replace BufferedReader.readLine() method with an internal API
    that imposes limits both on the length of each line and total
    number of lines read.
    .
    This APAR will be fixed in the following Java Releases:
       8    SR5 FP30  (8.0.5.30)
       7 R1 SR4 FP40  (7.1.4.40)
       7    SR10 FP40 (7.0.10.40)
    .
    Contact your IBM Product's Service Team for these Service
    Refreshes and Fix Packs.
    For those running stand-alone, information about the available
    Service Refreshes and Fix Packs can be found at:
               https://www.ibm.com/developerworks/java/jdk/
    

Temporary fix

Comments

APAR Information

  • APAR number

    IJ11618

  • Reported component name

    SECURITY

  • Reported component ID

    620700125

  • Reported release

    270

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt / Xsystem

  • Submitted date

    2018-11-28

  • Closed date

    2018-12-10

  • Last modified date

    2018-12-10

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

Fix information

  • Fixed component name

    SECURITY

  • Fixed component ID

    620700125

Applicable component levels

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSNVBF","label":"Runtimes for Java Technology"},"Component":"","ARM Category":[],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"270","Edition":"","Line of Business":{"code":"LOB36","label":"IBM Automation"}}]

Document Information

Modified date:
07 December 2020