OBSOLETE Patch-ID# 114356-19


Download this patch from My Oracle Support

Your use of the firmware, software and any other materials contained in this update is subject to My Oracle Support Terms of Use, which may be viewed at My Oracle Support.
For further information on patching best practices and resources, please see the following links:
Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved.

Keywords: security tcp ip session terminates openssh ssh client pat
Synopsis: Obsoleted by: 122300-47 SunOS 5.9: /usr/bin/ssh patch
Date: Sep/16/2009


Install Requirements: Reboot after installing this patch to activate the changes delivered. An alternative may be specified in the Special Install Instructions.

Solaris Release: 9

SunOS Release: 5.9

Unbundled Product:

Unbundled Release:

Xref: This patch available for x86 as patch 114357

Topic: SunOS 5.9: /usr/bin/ssh patch

Relevant Architectures: sparc

Bugs fixed with this patch:

Sun CR # Bug #
440691415050242
445233915062632
461497915091161
462121915092635
463554615096390
466598315103787
468023015106684
468565815107790
470778615113192
470778815113194
470884615113496
470947515113635
471010815113786
471011115113787
471133515114104
471309715114498
471359215114590
471459615114853
471965415116032
472059515116271
473353215119703
474096915121918
475098915124873
475975915127483
476386415128699
477743615133006
478487215135301
479912215139946
480416515141749
481157515144194
481659015145766
482846715149452
483714015152228
484156615153752
485717915158294
486244915159625
492455415177535
492597015177949
492639115178062
492662415178115
492896415178794
493905515181452
496483915188484
496652115188958
496767415189315
496930615189702
497163015190375
497181015190438
497505715191280
497615515191545
497674515191712
497757415191927
498299115193450
499012215195508
500210015198109
500587015198978
500669015199198
500669515199199
500676215199221
501276515201191
501364015201468
501418015201617
501460015201754
501494615201854
501495115201856
501496915201859
501904415202913
502032515203300
502134715203532
502290315203838
502307415203897
502529615204449
503624215207916
504859615211609
504966015211868
505424015213143
505483515213332
505829315214254
506042515214595
506061815214657
506250815215181
506337515215431
506676715216389
507680415219587
508228215221461
508304815221724
508319715221775
508867015223455
509032415223954
509414215225129
509452815225254
509965315226730
510922515229870
510940415229926
510948715229970
510949615229975
617625615231196
618168015232849
618269515233133
618572615234077
622104015245883
640270815320933
641076215324284
645049015340901
646637015348570
646721815348966
647237715351314
647627915353033
647677215353250
649043515359754
668400315470145
669767915478097
670482315481793
676189015516810
682245415551955


Changes incorporated in this version: 6221040

Patches accumulated and obsoleted by this patch:

Patches which conflict with this patch:

Patches required with this patch: 112908-27 (or greater)

Obsoleted by: 122300-47

Files included with this patch:

/usr/bin/scp
/usr/bin/sftp
/usr/bin/ssh
/usr/bin/ssh-add
/usr/bin/ssh-agent
/usr/bin/ssh-keygen

Problem Description:

6221040 ssh sets not only LANG but also LC_ALL
 
(from 114356-18)
 
6822454 ssh patches 114356-17, 114357-17 do not need system reboot
 
(from 114356-17)
 
6761890 ssh protocol security vulnerability may be used to reveal some plaintext
 
(from 114356-16)
 
6697679 sftp - 'ls -l' must print usernames/groupnames instead of uids/gids
 
(from 114356-15)
 
6704823 bugfix 6684003 prevents ssh from X forwarding on IPv4-only system
 
(from 114356-14)
 
6684003 fix CVE-2008-1483 in SunSSH
 
(from 114356-13)
 
6450490 ssh prints banner even when in quiet mode
 
(from 114356-12)
 
6472377 use of system() can cause execution of arbitrary code through malformed filenames (CVE-2006-0225)
 
(from 114356-11)
 
6466370 security vulnerabilities in OpenSSL may lead to DoS or code execution (CVE-2006-3738,CVE-2006-4343)
6467218 fix RSA signature forgery (CVE-2006-4339)
6476279 multiple vulnerabilities in OpenSSL (CVE-2006-2937, CVE-2006-2940)
6476772 update OpenSSL version string with information about security patches included
 
(from 114356-10)
 
6490435 114356-09 needs prepatch script renamed to prePatch
 
(from 114356-09)
 
6410762 S9 ssh patch 113273-11 does not check for SUNWfns dependencies
 
(from 114356-08)
 
6402708 new ssh in Solaris 9 exits if key fingerprint cannot be found in known_host files
 
(from 114356-07)
 
6176256 S9 ssh backporting project
4406914 support draft-ietf-secsh-dh-group-exchange-01.txt
4452339 key_fingerprint needs to support md5/sha/bubblebabble output
4614979 ssh connections break after the rekey interval elapses on
4621219 sftp prints incorrect error message if connection refused
4635546 superfluous IP options check in ssh should be removed
4680230 usr/src/cmd/ssh/ssh Makefile needs to have lib dependencies
4707788 implement ClientAlive on the server side
4708846 vis in libopenbsd-compat has I18N problem
4709475 ssh and ssh-keygen: not extracted messages for localization
4710108 sshd: locale environments are not passed to shells
4710111 ssh-agent: strings 'echo' should not be extracted for localization
4711335 sshd V1 authentication behaves poorly for invalid users
4713097 sftp: word 'abormally' should be 'abnormally'
4713592 ssh & friends print incorrect error message if server breaks connection at login
4714596 request for filename option in sftp command line
4719654 ssh: localized messages should be extracted per sentence
4720595 ssh-keygen does not finish with dsa key
4733532 scp leaves connection open
4740969 cli_write() in libssh.a has a memory leak
4750989 expired passwords not working with KbdInteractiveAuthentication yes
4759759 ssh(1) doesn't terminate proxy commands on exit
4777436 ssh client should ignore signals which are already ignored
4784872 locales !=  RFC-1766 language tags
4799122 ssh doesn't use getopt(3c) (concatenated options don't work)
4811575 ssh-keygen list fails on long public key entries (base64 encoding > 1024b)
4816590 ssh in Solaris 9 doesn't forward the X11 session from 3-party software
4828467 sftp client sends directory path that causes windows interop problems
4837140 sshd sets bogus fixed path and ignores /etc/default/login
4841566 ksh limits ssh/Xauth using -X option with uid's 99 or less
4857179 ssh and password expiry do not work
4862449 SUNWssh needs a resync
4924554 resync'ed ssh cores after connect from Solaris 9 client with mixed locale setting
4925970 sshd logging extra warning messages on console
4926391 fatal_remove_cleanup() should not fatal()
4926624 ssh exits with -1 if stdin is not a terminal
4928964 sshd breaks finger
4964839 SUNWsshdr needs to remove CheckMail from sshd_config
4966521 sshd core dumps/drops connection if server has many locales
4967674 sshd sets LC_ALL and LANG to strange values
4969306 sshd dumps core on root login
4971630 ssh attempts to do exit(-1) arbitrarily when not using ptys
4971810 fix for 4406914 is incomplete - /etc/ssh/moduli is missing
4975057 ssh got smarter about proxy commands, but not enough: always prepends "exec "
4976155 ssh crashes with SEGV when connecting to Sun_SSH_1.1 (in iso_8859_1)
4976745 sshd has a small malloc problem
4977574 sshd dumps core when some clients connect
4982991 Please enter user name: prompt doesn't go away quickly enough
4990122 sshd has a(nother) malloc problem
5002100 ssh displays wrong (useless) 'Last login' date and time
5005870 sshd setsockopt SO_KEEPALIVE Invalid argument error
5006690 sshd does not pass PAM environment variables to its children
5006695 SUNWssh should support GSS-API extensions to SSHv2 (PSARC 2003/778)
5006762 sshd(1M) does not support optimistic key exchange (SSHv2)
5012765 sshd(1M) should do something about privileges (PSARC 2004/677)
5013640 sshd core dumps while trying to log messages, take 2
5014180 ssh should keep /dev/random open
5014600 ssh-add cores if the agent socket could not be opened
5014969 default X11Forwarding to yes in sshd_config (PSARC 2004/011)
5019044 sshd(1M) lets libgss spew on stderr on startup about unconfigured mechs
5020325 sftp: 'get *' coredumps
5021347 ssh commands link with -ldl, shouldn't (-z ignore masked this)
5022903 ssh(1) should support send-break extension
5023074 SUNWsshdr: /etc/ssh is not a valid temp directory during install
5025296 sshd should use closefrom() instead of a 3-to-64 close() loop
5036242 sshd(1M) should workaround KEXGSS_HOSTKEY bug in MacOS ssh(1) with GSS
5048596 ssh(1) host-based authentication should try all client host keys, not just 1st
5049660 locale problems with ssh
5054240 ssh should be more descriptive when GSS key exchange fails
5054835 sshd GSS error logic needs a little work
5058293 ssh packages do not declare dependency on GSS-API
5060425 ssh backspace not working
5060618 ssh-keysign needs to utilize privileges
5062508 GSS option names should match OpenSSH's (PSARC/2004/461)
5063375 sshd(1M) PAM svc change after pam_start() ineffective
5066767 sshd dumps core in finish_userauth_do_pam()
5076804 sshd(1M) logs successful login messages to auth.notice (and thence the console)
5082282 sshd core dumps printing usage message
5083048 accepted yes/no strings itself should be displayed
5083197 another coredump in finish_userauth_do_pam()
5088670 RFE 5062528 breaks ssh-agent (missing privileges)
5090324 session id confusion with ssh & su
5094142 sshd calls pam_chauthtok() as root, skips pw quality checks
5094528 ssh(1) core dumps in gssapi userauth
5109225 version string missing from sshd's usage message
5109404 missing whitespace in some ssh messages
5109487 language negotiation is not useful after initial key exchange
5109496 packet_set_connection() should be more careful
6181680 sshd doesn't log logouts in utmpx
6182695 sshd debug mode deadlock potential
6185726 MaxStartups now counts all concurrent sessions
5014946 add support to libgss for gss_store_cred() (PSARC 2003/779) (phase 1)
5014951 mech_krb5 needs a krb5_gss_store_cred() (PSARC 2003/779)
 
(from 114356-06)
 
5099653 scp connection that fails reports incorrect return code of 0
 
(from 114356-05)
 
4804165 scp host:/file host2:/file fails
 
(from 114356-04)
 
4665983 long command silently truncated without error over ssh
4763864 non-interactive ssh can hang after remote command has exited
 
(from 114356-03)
 
4939055 ssh does not return standard errors
 
(from 114356-02)
 
4707786 ssh client does not fail requests for unknown channels
 
(from 114356-01)
 
4685658 /usr/bin/ssh always returns 255


Patch Installation Instructions:
--------------------------------
 
Please refer to the man pages for instructions on using 'patchadd'
and 'patchrm' commands provided with Solaris.
 
The following example installs a patch to a standalone machine:
 
       example# patchadd /var/spool/patch/123456-07
 
The following example removes a patch from a standalone system:
 
       example# patchrm 123456-07
 
For additional examples please see the appropriate man pages. Any
other special or non-generic installation instructions should be
described below as special instructions.


Special Install Instructions:
-----------------------------
 
NOTE 1:  To get the complete fix for BugId 4939055 (ssh does not return
         standard errors), please also install the following patch:
 
         113273-06 (or greater)  sshd patch
 
NOTE 2:  To get the complete fix for ALL the BugId's in the -07 revision
         of the patch, please also install the following patches:
 
         117177-02 (or greater)  gssapi module patch
         113273-11 (or greater)  sshd patch
 
NOTE 3:  To get the complete fix for multiple vulnerabilities in OpenSSL,
         please also install the following patches:
 
         113273-14 (or greater)  sshd patch
         113713-24 (or greater)  pkg utilities patch
         117123-08 (or greater)  wanboot patch
         123376-01 (or greater)  bootconfchk patch
 
NOTE 4:  To get the complete fix for BugId 6684003 (fix CVE-2008-1483 in
         SunSSH), please also install the following patch:
 
         122300-28 (or greater)  Kernel Patch
 
NOTE 5:  To get the complete fix for BugId 6761890 (ssh protocol security
         vulnerability may be used to reveal some plaintext), please also
         install the following patch:
 
         122300-38 (or greater)  Kernel Patch
 
NOTE 6:  To get the complete fix for BugId 6221040 (ssh sets not only LANG but
         also LC_ALL), please also install the following patch:
 
         122300-44 (or greater)  Kernel Patch


NOTE: The list of 'patches required with this patch' (above) has been
modified from the list specified at patch creation time. The reason for
the modification is that one or more of the required patches was
either never released or withdrawn after its release. The following
substitutions (which are guaranteed to satisfy the original requirements)
were therefore made:

112908-27 replaces 112908-24




README -- Last modified date: Saturday, November 10, 2012