JDK-8208583 : Better management of internal KeyStore buffers
  • Type: Bug
  • Component: security-libs
  • Sub-Component: javax.crypto
  • Affected Version: 8u172
  • Priority: P3
  • Status: Closed
  • Resolution: Fixed
  • Submitted: 2018-07-31
  • Updated: 2020-01-06
  • Resolved: 2018-08-03
The Version table provides details related to the release that this issue/RFE will be addressed.

Unresolved : Release in which this issue/RFE will be addressed.
Resolved: Release in which this issue/RFE has been resolved.
Fixed : Release in which this issue/RFE has been fixed. The release containing this fix may be available for download as an Early Access Release or a General Availability Release.

To download the current JDK release, click here.
JDK 11 JDK 12 JDK 8 Other
11.0.2Fixed 12 b06Fixed 8u181Fixed openjdk7uFixed
Related Reports
Relates :  
Relates :  
Relates :  
Relates :  
Description
com.sun.crypto.provider.JceKeyStore uses com.sun.crypto.provider.KeyProtector to protect access to private keys. The KeyProtector class uses a PBEKey for that purpose. Given that the short life usage in some of these keys, the JDK can better manage when internal PBEKey buffers could get discarded. PBEKeys handed to external API calls will have to rely on the Cleaner mechanism for such discards.
Comments
Removing JDK 11u fix request until JDK-8209862 is fully assessed.
05-09-2018

Fix Request A useful fix to have in JDK 11 LTS. The JDK libraries should make best efforts to protect contents of crypto buffers and keystores. The patch involves tighening up crypto code so that buffer contents are deleted as soon as is practical. A test case for these fixes is not practical but I'd be happy to describe how to manually verify with SQE teams. Patches should apply cleanly.
23-08-2018