OBSOLETE Patch-ID# 139499-04
Download this patch from My Oracle Support
Your use of the firmware, software and any other materials contained
in this update is subject to My Oracle Support Terms of Use, which
may be viewed at My Oracle Support.
|
For further information on patching best practices and resources, please
see the following links:
|
Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved.
|
Keywords: security pkcs11 locking leak slow international encryption
Synopsis: Obsoleted by: 139556-08 SunOS 5.10_x86: libpkcs11.so patch
Date: Feb/26/2009
Install Requirements: After installing this patch on an active boot environment, the system will be in a potentially inconsistent state until a reboot is performed. Unless
otherwise specified in the Special Install Instructions below, it is normally safe to apply further patches prior to initiating the reboot due to the relatively small footprint of the patch utilities. Normal operations must not be resumed until after the reboot is performed.
Use Single User Mode (run level S) when installing this patch on an active boot environment. An alternative may be specified in the Special Install Instructions.
Solaris Release: 10_x86
SunOS Release: 5.10_x86
Unbundled Product:
Unbundled Release:
Xref: This patch available for SPARC as patch 139498
Topic: SunOS 5.10_x86: libpkcs11.so patch
EXPORT INFORMATION: This software contains encryption features
and requires export approval from the U.S. Department of State,
prior to exporting from the United States.
Relevant Architectures: i386
Bugs fixed with this patch:
Changes incorporated in this version: 6767649
Patches accumulated and obsoleted by this patch:
Patches which conflict with this patch:
Patches required with this patch: 118855-36 118919-21 120012-14 127128-11 137138-09 (or greater)
Obsoleted by: 139556-08
Files included with this patch:
/kernel/crypto/amd64/swrand
/kernel/crypto/swrand
/kernel/drv/amd64/crypto
/kernel/drv/amd64/random
/kernel/drv/crypto
/kernel/drv/random
/kernel/kmdb/amd64/crypto
/kernel/kmdb/crypto
/kernel/misc/amd64/kcf
/kernel/misc/kcf
/usr/include/sys/random.h
/usr/lib/amd64/libpkcs11.so.1
/usr/lib/libelfsign.so.1
/usr/lib/libpkcs11.so.1
/usr/lib/mdb/kvm/amd64/crypto.so
/usr/lib/mdb/kvm/crypto.so
/usr/lib/security/amd64/pkcs11_kernel.so.1
/usr/lib/security/amd64/pkcs11_softtoken.so.1
/usr/lib/security/amd64/pkcs11_softtoken_extra.so.1
/usr/lib/security/pkcs11_kernel.so.1
/usr/lib/security/pkcs11_softtoken.so.1
/usr/lib/security/pkcs11_softtoken_extra.so.1
Problem Description:
6767649 vmem_hash_delete: bad free issue
(from 139499-03)
6548905 ncp crypto registration during attach deadlocks in devfs during boot
(from 139499-02)
6638987 soft_delete_session() clears magic_marker too soon for soft_remove_object_from_session()
(from 139499-01)
6353342 pkcs11_kernel leaks RSA public key objects
6374503 C_SeedRandom is too slow causing poor performance with Apache/OpenSSL when using pkcs11
6720255 soft_digest_init() memory leaks caused by digest operations on system with HW crypto provider
6745244 inconsistent locking of soft_session_t mutex in soft_{get,set}_operationstate()
Patch Installation Instructions:
--------------------------------
Please refer to the man pages for instructions on using 'patchadd'
and 'patchrm' scripts provided with Solaris.
The following example installs a patch to a standalone machine:
example# patchadd /var/spool/patch/123456-07
The following example removes a patch from a standalone system:
example# patchrm 123456-07
For additional examples please see the appropriate man pages. Any
other special or non-generic installation instructions should be
described below as special instructions.
Special Install Instructions:
-----------------------------
NOTE 1: Before installing this patch, please be sure to install the latest
patch utilities patches for your OS. This list of patches is defined
at http://sunsolve.sun.com
Please use the pull down list which appears after the text:
"Latest Patch Update: To ensure the correct functioning of the
patching utilities on your system, stay up to date on the
following patches"
README -- Last modified date: Saturday, November 10, 2012