IBM Support

SI68726 - SC1-UTL Update OpenSSL to 1.0.2q

PTF ( Program Temporary Fixes ) Cover letter


Order this fix

Abstract

SC1-UTL Update OpenSSL to 1.0.2q


Pre/Co-Requisite PTF / Fix List

REQ  LICENSED      PTF/FIX  LEVEL

TYPE PROGRAM  REL  NUMBER   MIN/MAX  OPTION
---- -------- ---  -------  -------  ------
DIST 5770SS1  710  SI57809   NONE     0033



NOTICE:
-------
Application of this PTF may disable or render ineffective programs that
use system memory addresses not generated by the IBM translator,
including programs that circumvent control technology designed to limit
interactive capacity to purchased levels.  This PTF may be a prerequisite
for future PTFs.  By applying this PTF you authorize and agree to the
foregoing.

This PTF is subject to the terms of the license agreement which
accompanied, or was contained in, the Program for which you are obtaining
the PTF.  You are not authorized to install or use the PTF except as part
of a Program for which you have a valid Proof of Entitlement.

SUBJECT TO ANY WARRANTIES WHICH CAN NOT BE EXCLUDED OR EXCEPT AS EXPLICITLY
AGREED TO IN THE APPLICABLE LICENSE AGREEMENT OR AN APPLICABLE SUPPORT
AGREEMENT, IBM MAKES NO WARRANTIES OR CONDITIONS EITHER EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OR CONDITIONS OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON INFRINGEMENT,
REGARDING THE PTF.

The applicable license agreement may have been provided to you in printed
form and/or may be viewed using the Work with Software Agreements (WRKSFWAGR)
CL command.





APAR Error Description / Circumvention

-----------------------------------------------
Update OpenSSL to 1.0.2q to address security vulnerabilities.

CORRECTION FOR APAR SE70242 :
-----------------------------
Update OpenSSL to 1.0.2q to address security vulnerabilities.
CVE-2018-0734
CVE-2018-5407

CIRCUMVENTION FOR APAR SE70242 :
--------------------------------
None.


DESCRIPTION OF PROBLEM FIXED FOR APAR SE70252 :
-----------------------------------------------
OpenSSH is vulnerable to CVE-2016-10708.

CORRECTION FOR APAR SE70252 :
-----------------------------
OpenSSH has been patched for CVE-2016-10708.

CIRCUMVENTION FOR APAR SE70252 :
--------------------------------
None.


Activation Instructions


None.




Special Instructions


If this PTF is applied in immediate mode, the following instructions
are suggested in order to ensure the updated code takes immediate
affect on your system.

Restart any running processes that use OpenSSL.

In the case of SSH, do the following:

1) End any active SSH connections in NETSTAT, Option 3.
2) Restart the *SSHD daemon job via. ENDTCPSVR SERVER(*SSHD) &
STRTCPSVR SERVER(*SSHD)

This PTF creates the /QOpenSys/usr/lib64 directory. If this path
exists, it will be renamed and message CPIB9C0 will be posted to the
job log. Objects in this paths will need to be manually moved or linked
over to the new path after the PTF has been applied.


Default Instructions

THIS PTF CAN BE APPLIED IMMEDIATE OR DELAYED.



Supersedes

PTF/FIX NO(S).  APAR TITLE LINE
--------------  ------------------------------------------------------------
   SI68325      SC1-UTL PATCH OPENSSH FOR CVE-2018-15473
   SI68252      SC1-UTL Update OpenSSL to 1.0.2p
   SI67749      SC1-SSH-UNPRED CUSTOMER GETTING "KILL: 50563: 0509-015 THE S
   SI67433      SC1-UTL Update OpenSSL to 1.0.2o
   SI67325      OSP-INCORROUT OPENSSL SHA1 FAILS TO GENERATE HASH ON FILES L
   SI66509      SC1-UTL Update OpenSSL to 1.0.2n
   SI66509      SC1-UTL-UNPRED SECURE SHELL DAEMON IS CLOSING CHANNELS THAT
   SI66253      SC1-UTL PATCH OPENSSH FOR CVE-2017-15906
   SI66057      OSP-PAR REBUILD SSH WITHOUT RUNTIME LINKING
   SI65720      SC1-SSH-UNPRED CHANGE OPENSSH TO USE AT&T-STYLE DEVICES
   SI65720      SC1-SSH SSHD_CONFIG - 'USEPRIVILEGESEPARATION SANDBOX' SPECI
   SI63657      SC1-SSH-UNPRED OPENSSH 7.4 VULNERABILITIES
   SI63657      SC1-UTL Update OpenSSL to 1.0.2k
   SI63212      SC1-SSH-UNPRED SSHD_CONFIG - 'USEPRIVILEGESEPARATION SANDBOX
   SI63212      SC1-UTL PATCH OPENSSH FOR CVE-2016-8858
   SI62643      SC1-UTL Update OpenSSL to 1.0.2j
   SI62623      SC1-UTL Update OpenSSL to 1.0.2i
   SI62420      OSP-UNPRED OPENSSH KEY IN R610 DIRECTORY ARE NOT BEING COPIE
   SI61391      SC1-UTL PATCH OPENSSL FOR CVE-2016-2177 AND CVE-2016-2178
   SI60540      ERROR ADDING PRIVATE KEY TO SSH-AGENT
   SI60540      SC1-SSH-INCORROUT OPENSSL COMMAND TO CONVERT CERTIFICATE FAI
   SI60540      SC1-UTL OPENSSL UPDATE TO 1.0.2H
   SI60302      SC1-UTL OPENSSH PATCH SECURITY VULNERABILITIES
   SI59895      SC1-UTL OPENSSL UPDATE TO 1.0.2G
   SI59213      SC1-UTL OPENSSL PATCH SECURITY VULNERABILITIES CVE-2015-3194
   SI59213      SC1-UTL OPENSSH PATCH SECURITY VULNERABILITIES CVE-2016-0777
   SI47871      OSP-MSGMISSINGFRENCHACCENTINQSHELLMESSAGELISTS-PAR-940XMISC
   SI39965      SC1-SSH-INCORROUT Update example chroot jail setup script
   SI58329      UNPRED-HLIC OPENSSH-SERVER VULNERABILITY
   SI57808      SC1-ZLIB Add 64-bit zlib
   SI57762      SC1-SSH-UNPRED UPGRADE OPENSSH 6.9p1
   SI57473      SC1-SSL-UNPRED OPENSSL SECURITY VULNERABILITIES
   SI56645      SC1-SSL-UNPRED OPENSSL SECURITY VULNERABILITIES
   SI55950      SC1-SSL-UNPRED OPENSSL SECURITY VULNERABILITIES
   SI55950      SC1-UTL-UNPRED SFTP CLIENTS WITH USER PROFILES GREATER THAN
   SI55755      SC1-UTL STRTCPSVR *SSHD OR ENDTCPSVR *SSHD FAILING WITH QLGO
   SI55602      SC1-SSH-UNPRED ENDTCPSVR *SSHD WILL NOT END SSHD DAEMON JOB
   SI55522      Upgrade OpenSSL to 1.0.1j
   SI55522      SC1-SSL-UNPRED OpenSSH 6.6p1
   SI54469      SC1-SSL-UNPRED OPENSSL SECURITY VULNERABILITIES
   SI53666      Integrity Problem
   SI53024      Integrity Problem
   SI49867      SC1-SSL-UNPRED OpenSSL 0.9.8y
   SI46993      Integrity Problem
   SI46855      Integrity Problem
   SI46519      Integrity Problem
   SI46031      Integrity Problem
   SI44319      Integrity Problem
   SI41724      SC1-SSL-UNPRED OpenSSL 0.9.8m
   SI36895      Integrity Problem
   SI53319      SC1-UTL-INCORROUT ENDTCPSVR *SSHD WILL NOT END JOB QP0ZSPWP
   SI53959      SC1-UTL-WAIT SCP IS HANG WHILE TRANSFER DATA
   SI52774      INCORROUT SFTP-SERVER DOES NOT RECOGNIZE IBMPASEFORILANGID O
   SI52286      SC1-UTL-INCORROUT SFTP GET
   SI51208      SC1-SSL-UNPRED OpenSSH 5.8p1
   SI51208      SC1-UTL-UNPRED UNABLE TO GET SSHD AUTOMATICALLY STARTED WITH
   SI47121      Integrity Problem
   SI45184      Resolve 'mixed-data' job CCSID SSHD Startup Issue
   SI44994      SC1-UNPRED THE STRTCPSVR *SSHD CL COMMAND DOES NOT START THE
   SI43709      SC1-SSH-UNPRED SPECIFY PASE_USRGRP_LIMITED FOR SSHD
   SI38685      SC1-SSH-UNPRED Specify shell for incoming ssh connections

Summary Information

System.............................. i
Models..............................
Release............................. V7R1M0
Licensed Program............... 5733SC1
APAR Fixed.......................... SE70242
SE70252
Superseded by:...................... View fix details for PTF SI71504
Recompile........................... N
Library............................. QUTL
MRI Feature ........................ NONE
Cum Level........................... NONE


IBM i Support

IBM disclaims all warranties, whether express or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. By furnishing this document, IBM grants no licenses to any related patents or copyrights. Copyright © 1996,1997,1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2017, 2018, 2019 IBM Corporation. Any trademarks and product or brand names referenced in this document are the property of their respective owners. Consult the Terms of use link for trademark information.

Document information

More support for: i family

Software version: V7R1M0

Operating system(s): OS/400

Reference #: SI68726

Modified date: 05 December 2018