IBM Support

SI63656 - SC1-SSH-UNPRED OPENSSH 7.4 VULNERABILITIES

PTF Cover Letter


PTF ( Program Temporary Fixes ) Cover letter


Order this fix

Abstract

SC1-SSH-UNPRED OPENSSH 7.4 VULNERABILITIES


Pre/Co-Requisite PTF / Fix List

REQ  LICENSED           PTF/FIX  LEVEL

TYPE PROGRAM  RELEASE   NUMBER   MIN/MAX  OPTION
---- -------- --------- -------  -------  ------
DIST 5770SS1  V7R2M0    SI57783   NONE     0033



NOTICE:
-------
Application of this PTF may disable or render ineffective programs that
use system memory addresses not generated by the IBM translator,
including programs that circumvent control technology designed to limit
interactive capacity to purchased levels.  This PTF may be a prerequisite
for future PTFs.  By applying this PTF you authorize and agree to the
foregoing.

This PTF is subject to the terms of the license agreement which
accompanied, or was contained in, the Program for which you are obtaining
the PTF.  You are not authorized to install or use the PTF except as part
of a Program for which you have a valid Proof of Entitlement.

SUBJECT TO ANY WARRANTIES WHICH CAN NOT BE EXCLUDED OR EXCEPT AS EXPLICITLY
AGREED TO IN THE APPLICABLE LICENSE AGREEMENT OR AN APPLICABLE SUPPORT
AGREEMENT, IBM MAKES NO WARRANTIES OR CONDITIONS EITHER EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OR CONDITIONS OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON INFRINGEMENT,
REGARDING THE PTF.

The applicable license agreement may have been provided to you in printed
form and/or may be viewed using the Work with Software Agreements (WRKSFWAGR)
CL command.





APAR Error Description / Circumvention

-----------------------------------------------
OpenSSH 6.9 is vulnerable to the following vulnerabilities fixed
in OpenSSH 7.4:

CVE-2016-10009
CVE-2016-10010
CVE-2016-10011
CVE-2016-10012

CORRECTION FOR APAR SE66494 :
-----------------------------
OpenSSH 6.9 has been patched to to close the vulnerabilities

CIRCUMVENTION FOR APAR SE66494 :
--------------------------------
None.


DESCRIPTION OF PROBLEM FIXED FOR APAR SE66630 :
-----------------------------------------------
Update OpenSSL to 1.0.2k to address security vulnerabilities

CORRECTION FOR APAR SE66630 :
-----------------------------
Update OpenSSL to 1.0.2k to address security vulnerabilities

See https://www.openssl.org/news/secadv/20170126.txt for more
information.

CIRCUMVENTION FOR APAR SE66630 :
--------------------------------
None.


Activation Instructions


None.




Special Instructions


********************************************************************
THE FOLLOWING ARE SUPERSEDED SPECIAL INSTRUCTIONS. IF THE SUPERSEDED
PTF HAS ALREADY BEEN APPLIED AND ITS SPECIAL INSTRUCTION FOLLOWED,
IT IS NOT NECESSARY TO FOLLOW THAT SPECIAL INSTRUCTION AGAIN.
********************************************************************

SPECIAL INSTRUCTIONS FOR SUPERSEDED PTF SI59896 :
=================================================

If this PTF is applied in immediate mode, the following instructions
are suggested in order to ensure the updated code takes immediate
affect on your system.

Restart any running processes that use OpenSSL.

In the case of SSH, do the following:

1) End any active SSH connections in NETSTAT, Option 3.
2) Restart the *SSHD daemon job via. ENDTCPSVR SERVER(*SSHD) &
STRTCPSVR SERVER(*SSHD)

SPECIAL INSTRUCTIONS FOR SUPERSEDED PTF SI57594 :
=================================================

This PTF creates the /QOpenSys/usr/lib64 directory. If this path
already exists, it will be renamed and message CPIB9C0 will be posted
to the job log. Objects in this paths will need to be manually moved or
linked over to the new path after the PTF has been applied.


Default Instructions

THIS PTF CAN BE APPLIED IMMEDIATE OR DELAYED.



Supersedes

PTF/FIX NO(S).  APAR TITLE LINE
--------------  ------------------------------------------------------------
   SI63211      SC1-SSH-UNPRED SSHD_CONFIG - 'USEPRIVILEGESEPARATION SANDBOX
   SI63211      SC1-UTL PATCH OPENSSH FOR CVE-2016-8858
   SI62642      SC1-UTL Update OpenSSL to 1.0.2j
   SI62622      SC1-UTL Update OpenSSL to 1.0.2i
   SI62419      OSP-UNPRED OPENSSH KEY IN R610 DIRECTORY ARE NOT BEING COPIE
   SI61390      SC1-UTL PATCH OPENSSL FOR CVE-2016-2177 AND CVE-2016-2178
   SI60539      ERROR ADDING PRIVATE KEY TO SSH-AGENT
   SI60539      SC1-SSH-INCORROUT OPENSSL COMMAND TO CONVERT CERTIFICATE FAI
   SI60539      SC1-UTL OPENSSL UPDATE TO 1.0.2H
   SI60301      SC1-UTL OPENSSH PATCH SECURITY VULNERABILITIES
   SI59896      SC1-UTL OPENSSL UPDATE TO 1.0.2G
   SI59204      SC1-UTL OPENSSL PATCH SECURITY VULNERABILITIES CVE-2015-3194
   SI59204      SC1-UTL OPENSSH PATCH SECURITY VULNERABILITIES CVE-2016-0777
   SI58330      UNPRED-HLIC OPENSSH-SERVER VULNERABILITY
   SI57594      SC1-ZLIB Add 64-bit zlib
   SI57771      SC1-SSH-UNPRED UPGRADE OPENSSH 6.9p1
   SI57468      SC1-SSL-UNPRED OPENSSL SECURITY VULNERABILITIES
   SI56636      SC1-SSL-UNPRED OPENSSL SECURITY VULNERABILITIES
   SI55951      SC1-SSL-UNPRED OPENSSL SECURITY VULNERABILITIES
   SI55951      SC1-UTL-UNPRED SFTP CLIENTS WITH USER PROFILES GREATER THAN
   SI55757      SC1-UTL STRTCPSVR *SSHD OR ENDTCPSVR *SSHD FAILING WITH QLGO
   SI55606      SC1-SSH-UNPRED ENDTCPSVR *SSHD WILL NOT END SSHD DAEMON JOB
   SI55341      Upgrade OpenSSL to 1.0.1j
   SI55341      SC1-SSL-UNPRED OpenSSH 6.6p1
   SI54468      SC1-SSL-UNPRED OPENSSL SECURITY VULNERABILITIES
   SI53327      SC1-UTL-INCORROUT ENDTCPSVR *SSHD WILL NOT END JOB QP0ZSPWP
   SI53960      SC1-UTL-WAIT SCP IS HANG WHILE TRANSFER DATA
   SI53663      Integrity Problem
   SI53540      Integrity Problem
   SI53171      Integrity Problem
   SI52784      INCORROUT SFTP-SERVER DOES NOT RECOGNIZE IBMPASEFORILANGID O
   SI52297      SC1-UTL-UNPRED UNABLE TO GET SSHD AUTOMATICALLY STARTED WITH
   SI52297      SC1-UTL-INCORROUT SFTP GET

Summary Information

System..............................  i
Models..............................  
Release.............................  V7R2M0
Licensed Program....................  5733SC1
APAR Fixed..........................  View details for APAR SE66494
View details for APAR SE66630

Superseded by:......................  View fix details for PTF SI86119
Recompile...........................  N
Library.............................  QUTL
MRI Feature ........................  NONE
Cum Level...........................  C7290720


IBM i Support

IBM disclaims all warranties, whether express or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. By furnishing this document, IBM grants no licenses to any related patents or copyrights. Copyright © 1996,1997,1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021, 2022, 2023, 2024 IBM Corporation. Any trademarks and product or brand names referenced in this document are the property of their respective owners. Consult the Terms of use link for trademark information.

[{"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Platform":[{"code":"PF012","label":"IBM i"}],"Version":"7.2.0","Product":{"code":"SWG60","label":"IBM i"},"Component":"5733SC1","Edition":"","Line of Business":{"code":"LOB57","label":"Power"}}]

Document Information

Modified date:
18 March 2024