OBSOLETE Patch-ID# 114356-19
Download this patch from My Oracle Support
Your use of the firmware, software and any other materials contained
in this update is subject to My Oracle Support Terms of Use, which
may be viewed at My Oracle Support.
|
For further information on patching best practices and resources, please
see the following links:
|
Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved.
|
Keywords: security tcp ip session terminates openssh ssh client pat
Synopsis: Obsoleted by: 122300-47 SunOS 5.9: /usr/bin/ssh patch
Date: Sep/16/2009
Install Requirements: Reboot after installing this patch to activate the changes delivered. An alternative may be specified in the Special Install Instructions.
Solaris Release: 9
SunOS Release: 5.9
Unbundled Product:
Unbundled Release:
Xref: This patch available for x86 as patch 114357
Topic: SunOS 5.9: /usr/bin/ssh patch
Relevant Architectures: sparc
Bugs fixed with this patch:
Changes incorporated in this version: 6221040
Patches accumulated and obsoleted by this patch:
Patches which conflict with this patch:
Patches required with this patch: 112908-27 (or greater)
Obsoleted by: 122300-47
Files included with this patch:
/usr/bin/scp
/usr/bin/sftp
/usr/bin/ssh
/usr/bin/ssh-add
/usr/bin/ssh-agent
/usr/bin/ssh-keygen
Problem Description:
6221040 ssh sets not only LANG but also LC_ALL
(from 114356-18)
6822454 ssh patches 114356-17, 114357-17 do not need system reboot
(from 114356-17)
6761890 ssh protocol security vulnerability may be used to reveal some plaintext
(from 114356-16)
6697679 sftp - 'ls -l' must print usernames/groupnames instead of uids/gids
(from 114356-15)
6704823 bugfix 6684003 prevents ssh from X forwarding on IPv4-only system
(from 114356-14)
6684003 fix CVE-2008-1483 in SunSSH
(from 114356-13)
6450490 ssh prints banner even when in quiet mode
(from 114356-12)
6472377 use of system() can cause execution of arbitrary code through malformed filenames (CVE-2006-0225)
(from 114356-11)
6466370 security vulnerabilities in OpenSSL may lead to DoS or code execution (CVE-2006-3738,CVE-2006-4343)
6467218 fix RSA signature forgery (CVE-2006-4339)
6476279 multiple vulnerabilities in OpenSSL (CVE-2006-2937, CVE-2006-2940)
6476772 update OpenSSL version string with information about security patches included
(from 114356-10)
6490435 114356-09 needs prepatch script renamed to prePatch
(from 114356-09)
6410762 S9 ssh patch 113273-11 does not check for SUNWfns dependencies
(from 114356-08)
6402708 new ssh in Solaris 9 exits if key fingerprint cannot be found in known_host files
(from 114356-07)
6176256 S9 ssh backporting project
4406914 support draft-ietf-secsh-dh-group-exchange-01.txt
4452339 key_fingerprint needs to support md5/sha/bubblebabble output
4614979 ssh connections break after the rekey interval elapses on
4621219 sftp prints incorrect error message if connection refused
4635546 superfluous IP options check in ssh should be removed
4680230 usr/src/cmd/ssh/ssh Makefile needs to have lib dependencies
4707788 implement ClientAlive on the server side
4708846 vis in libopenbsd-compat has I18N problem
4709475 ssh and ssh-keygen: not extracted messages for localization
4710108 sshd: locale environments are not passed to shells
4710111 ssh-agent: strings 'echo' should not be extracted for localization
4711335 sshd V1 authentication behaves poorly for invalid users
4713097 sftp: word 'abormally' should be 'abnormally'
4713592 ssh & friends print incorrect error message if server breaks connection at login
4714596 request for filename option in sftp command line
4719654 ssh: localized messages should be extracted per sentence
4720595 ssh-keygen does not finish with dsa key
4733532 scp leaves connection open
4740969 cli_write() in libssh.a has a memory leak
4750989 expired passwords not working with KbdInteractiveAuthentication yes
4759759 ssh(1) doesn't terminate proxy commands on exit
4777436 ssh client should ignore signals which are already ignored
4784872 locales != RFC-1766 language tags
4799122 ssh doesn't use getopt(3c) (concatenated options don't work)
4811575 ssh-keygen list fails on long public key entries (base64 encoding > 1024b)
4816590 ssh in Solaris 9 doesn't forward the X11 session from 3-party software
4828467 sftp client sends directory path that causes windows interop problems
4837140 sshd sets bogus fixed path and ignores /etc/default/login
4841566 ksh limits ssh/Xauth using -X option with uid's 99 or less
4857179 ssh and password expiry do not work
4862449 SUNWssh needs a resync
4924554 resync'ed ssh cores after connect from Solaris 9 client with mixed locale setting
4925970 sshd logging extra warning messages on console
4926391 fatal_remove_cleanup() should not fatal()
4926624 ssh exits with -1 if stdin is not a terminal
4928964 sshd breaks finger
4964839 SUNWsshdr needs to remove CheckMail from sshd_config
4966521 sshd core dumps/drops connection if server has many locales
4967674 sshd sets LC_ALL and LANG to strange values
4969306 sshd dumps core on root login
4971630 ssh attempts to do exit(-1) arbitrarily when not using ptys
4971810 fix for 4406914 is incomplete - /etc/ssh/moduli is missing
4975057 ssh got smarter about proxy commands, but not enough: always prepends "exec "
4976155 ssh crashes with SEGV when connecting to Sun_SSH_1.1 (in iso_8859_1)
4976745 sshd has a small malloc problem
4977574 sshd dumps core when some clients connect
4982991 Please enter user name: prompt doesn't go away quickly enough
4990122 sshd has a(nother) malloc problem
5002100 ssh displays wrong (useless) 'Last login' date and time
5005870 sshd setsockopt SO_KEEPALIVE Invalid argument error
5006690 sshd does not pass PAM environment variables to its children
5006695 SUNWssh should support GSS-API extensions to SSHv2 (PSARC 2003/778)
5006762 sshd(1M) does not support optimistic key exchange (SSHv2)
5012765 sshd(1M) should do something about privileges (PSARC 2004/677)
5013640 sshd core dumps while trying to log messages, take 2
5014180 ssh should keep /dev/random open
5014600 ssh-add cores if the agent socket could not be opened
5014969 default X11Forwarding to yes in sshd_config (PSARC 2004/011)
5019044 sshd(1M) lets libgss spew on stderr on startup about unconfigured mechs
5020325 sftp: 'get *' coredumps
5021347 ssh commands link with -ldl, shouldn't (-z ignore masked this)
5022903 ssh(1) should support send-break extension
5023074 SUNWsshdr: /etc/ssh is not a valid temp directory during install
5025296 sshd should use closefrom() instead of a 3-to-64 close() loop
5036242 sshd(1M) should workaround KEXGSS_HOSTKEY bug in MacOS ssh(1) with GSS
5048596 ssh(1) host-based authentication should try all client host keys, not just 1st
5049660 locale problems with ssh
5054240 ssh should be more descriptive when GSS key exchange fails
5054835 sshd GSS error logic needs a little work
5058293 ssh packages do not declare dependency on GSS-API
5060425 ssh backspace not working
5060618 ssh-keysign needs to utilize privileges
5062508 GSS option names should match OpenSSH's (PSARC/2004/461)
5063375 sshd(1M) PAM svc change after pam_start() ineffective
5066767 sshd dumps core in finish_userauth_do_pam()
5076804 sshd(1M) logs successful login messages to auth.notice (and thence the console)
5082282 sshd core dumps printing usage message
5083048 accepted yes/no strings itself should be displayed
5083197 another coredump in finish_userauth_do_pam()
5088670 RFE 5062528 breaks ssh-agent (missing privileges)
5090324 session id confusion with ssh & su
5094142 sshd calls pam_chauthtok() as root, skips pw quality checks
5094528 ssh(1) core dumps in gssapi userauth
5109225 version string missing from sshd's usage message
5109404 missing whitespace in some ssh messages
5109487 language negotiation is not useful after initial key exchange
5109496 packet_set_connection() should be more careful
6181680 sshd doesn't log logouts in utmpx
6182695 sshd debug mode deadlock potential
6185726 MaxStartups now counts all concurrent sessions
5014946 add support to libgss for gss_store_cred() (PSARC 2003/779) (phase 1)
5014951 mech_krb5 needs a krb5_gss_store_cred() (PSARC 2003/779)
(from 114356-06)
5099653 scp connection that fails reports incorrect return code of 0
(from 114356-05)
4804165 scp host:/file host2:/file fails
(from 114356-04)
4665983 long command silently truncated without error over ssh
4763864 non-interactive ssh can hang after remote command has exited
(from 114356-03)
4939055 ssh does not return standard errors
(from 114356-02)
4707786 ssh client does not fail requests for unknown channels
(from 114356-01)
4685658 /usr/bin/ssh always returns 255
Patch Installation Instructions:
--------------------------------
Please refer to the man pages for instructions on using 'patchadd'
and 'patchrm' commands provided with Solaris.
The following example installs a patch to a standalone machine:
example# patchadd /var/spool/patch/123456-07
The following example removes a patch from a standalone system:
example# patchrm 123456-07
For additional examples please see the appropriate man pages. Any
other special or non-generic installation instructions should be
described below as special instructions.
Special Install Instructions:
-----------------------------
NOTE 1: To get the complete fix for BugId 4939055 (ssh does not return
standard errors), please also install the following patch:
113273-06 (or greater) sshd patch
NOTE 2: To get the complete fix for ALL the BugId's in the -07 revision
of the patch, please also install the following patches:
117177-02 (or greater) gssapi module patch
113273-11 (or greater) sshd patch
NOTE 3: To get the complete fix for multiple vulnerabilities in OpenSSL,
please also install the following patches:
113273-14 (or greater) sshd patch
113713-24 (or greater) pkg utilities patch
117123-08 (or greater) wanboot patch
123376-01 (or greater) bootconfchk patch
NOTE 4: To get the complete fix for BugId 6684003 (fix CVE-2008-1483 in
SunSSH), please also install the following patch:
122300-28 (or greater) Kernel Patch
NOTE 5: To get the complete fix for BugId 6761890 (ssh protocol security
vulnerability may be used to reveal some plaintext), please also
install the following patch:
122300-38 (or greater) Kernel Patch
NOTE 6: To get the complete fix for BugId 6221040 (ssh sets not only LANG but
also LC_ALL), please also install the following patch:
122300-44 (or greater) Kernel Patch
NOTE: The list of 'patches required with this patch' (above) has been
modified from the list specified at patch creation time. The reason for
the modification is that one or more of the required patches was
either never released or withdrawn after its release. The following
substitutions (which are guaranteed to satisfy the original requirements)
were therefore made:
112908-27 replaces 112908-24
README -- Last modified date: Saturday, November 10, 2012