pki-core-10.5.1-13.1.el7

エラータID: AXSA:2018-3231:02

Release date: 
Friday, June 29, 2018 - 16:06
Subject: 
pki-core-10.5.1-13.1.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
Moderate
Description: 

The Public Key Infrastructure (PKI) Core contains fundamental packages required by Asianux Certificate System.

Security Fix(es):

* pki-core: Mishandled ACL configuration in AAclAuthz.java reverses rules that allow and deny access (CVE-2018-1080)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

This issue was discovered by Fraser Tweedale (Asianux).

Bug Fix(es):

* Previously, when ECC keys were enrolled, Certificate Management over CMS (CMC) authentication failed with a "TokenException: Unable to insert certificate into temporary database" error. As a consequence, the enrollment failed. This update fixes the problem. As a result, the mentioned bug no longer occurs. (BZ#1550581)

* Previously, Certificate System used the same enrollment profiles for issuing RSA and ECC certificates. As a consequence, the key usage extension in issued certificates did not meet the Common Criteria standard. This update adds ECC-specific enrollment profiles where the key usage extension for TLS server and client certificates are different as described in RFC 6960. Additionally, the update changes existing profiles to issue only RSA certificates. As a result, the key usage extension in ECC certificates now meets the Common Criteria standard. (BZ#1554726)

* The Certificate System server rejects saving invalid access control lists (ACL). As a consequence, when saving an ACL with an empty expression, the server rejected the update and the pkiconsole utility displayed an StringIndexOutOfBoundsException error. With this update, the utility rejects empty ACL expressions. As a result, invalid ACLs cannot be saved and the error is no longer displayed. (BZ#1557883)

* Previously, due to a bug in the Certificate System installation procedure, installing a Key Recovery Authority (KRA) with ECC keys failed. To fix the problem, the installation process has been updated to handle both RSA and ECC subsystems automatically. As a result, installing subsystems with ECC keys no longer fail. (BZ#1581134)

* Previously, during verification, Certificate System encoded the ECC public key incorrectly in CMC Certificate Request Message Format (CRMF) requests. As a consequence, requesting an ECC certificate with Certificate Management over CMS (CMC) in CRMF failed. The problem has been fixed, and as a result, CMC CRMF requests using ECC keys work as expected. (BZ#1585945)

Enhancement(s):

* The pkispawn man page has been updated and now describes the --skip-configuration and --skip-installation parameters. (BZ#1551067)

* With this update, Certificate System adds the Subject Alternative Name (SAN) extension by default to server certificates and sets it to the Common Name (CN) of the certificate. (BZ#1581135)

* With this enhancement, users can create Certificate Request Message Format (CRMF) requests without the key archival option when using the CRMFPopClient utility. This feature increases flexibility because a Key Recovery Authority (KRA) certificate is no longer required. Previously, if the user did not pass the "-b transport_certificate_file" option to CRMFPopClient, the utility automatically used the KRA transport certificate stored in the transport.txt file. With this update, if "-b transport_certificate_file" is not specified, Certificate System creates a request without using key archival. (BZ#1588945)

CVE-2018-1080
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be provided.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. pki-core-10.5.1-13.1.el7.src.rpm
    MD5: df803cf57dbceb77380bddc9951b1cf3
    SHA-256: 3ab23a382ce8bb4e3ea66eb73d8385db98db9263c8b8ed293408b8a4790eb8a7
    Size: 4.59 MB

Asianux Server 7 for x86_64
  1. pki-base-10.5.1-13.1.el7.noarch.rpm
    MD5: a420d9e0fbe9158a55977602aae47d60
    SHA-256: 156e8f36fc92a15a6abe705f64d8ec32ebb207d7814fc2ef732f62871f02bf15
    Size: 399.55 kB
  2. pki-base-java-10.5.1-13.1.el7.noarch.rpm
    MD5: f23a68213a59dee48fa41e686742aa79
    SHA-256: 90180ee21fdc89ec3bafa560e0ad92ff6b806b7ff5d11f1d139fbc2363fdcf82
    Size: 1.17 MB
  3. pki-ca-10.5.1-13.1.el7.noarch.rpm
    MD5: f69a770bfb6039fdc0c3a3dabfb1155c
    SHA-256: d3ad33c30b6ba7ece8259a0e5a851a9633987cdad609836aa40098cee1c749c1
    Size: 464.25 kB
  4. pki-kra-10.5.1-13.1.el7.noarch.rpm
    MD5: 858002361ec6b40c167720cdd92ffc07
    SHA-256: a6839f69bcf6cf39b1267e251c8d50d49cfd3b8de867c5c2524a0228e338155c
    Size: 285.21 kB
  5. pki-server-10.5.1-13.1.el7.noarch.rpm
    MD5: c60d196203e4a1e6e1b1e19c90d0e825
    SHA-256: 30cdd26b17b97a985d3ffae7ec68bd81d6aae03dd06b12b101c09b2a99308dda
    Size: 2.84 MB
  6. pki-symkey-10.5.1-13.1.el7.x86_64.rpm
    MD5: 13c693a6c9ed3df0174de0600f02dde2
    SHA-256: be2c0aed3f4723c0066ecf59fa587de4bb1984e3672d5444cc902c928273a4bf
    Size: 144.71 kB
  7. pki-tools-10.5.1-13.1.el7.x86_64.rpm
    MD5: 85827f7da5c79892b0ed017b831410f1
    SHA-256: a2654c88bbac46267f62a7f70440e53d8a000dd9ee2da0d8301c8bf4edaae3c9
    Size: 716.18 kB