Patches & Updates
Deploy and monitor updates to all of your systems through Sun from anywhere you have an Internet connection.
Start today with Knowledge-based software update services for Solaris and Linux. Please review changes to Patch Access
Status: RELEASED Patch Id: 118919-21 *********************************************************************** READ THE TERMS OF THE AGREEMENT ("AGREEMENT") IN THE LEGAL_LICENSE.TXT FILE CAREFULLY BEFORE USING THIS SOFTWARE. BY USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TERMS, PROMPTLY DESTROY THE UNUSED SOFTWARE. *********************************************************************** Keywords: security libpkcs11 metaslot mars aes ulmaxrwsessioncount crypto Summary: SunOS 5.10_x86: Solaris Crypto Framework patch Date: Feb/05/2007 Installation Requirements: Reboot immediately after patch is installed Install in Single User Mode Solaris Release: 10_x86 Sun OS Release: 5.10_x86 Unbundled Product: Unbundled Release: Xref: This patch available for SPARC as patch 118918 Topic: SunOS 5.10_x86: Solaris Crypto Framework patch Relevant Architecture: i386 BugId's fixed with this patch: 4691624 4721729 4920408 4926742 5039273 5059459 5059461 5067502 5072858 5100567 6181926 6192431 6195428 6195934 6197268 6197284 6198116 6199119 6200215 6204887 6211857 6215509 6215816 6216772 6217866 6220814 6222467 6223863 6223866 6223869 6228384 6231739 6231978 6250168 6250963 6252894 6253484 6262344 6264344 6264379 6271754 6274680 6276483 6276609 6278459 6280574 6286372 6287425 6288840 6296920 6314217 6331488 6332420 6332630 6336131 6338653 6342066 6342468 6345493 6347073 6352877 6355571 6355597 6357426 6359179 6360218 6363872 6368332 6372169 6372587 6376993 6399680 6401115 6405871 6408419 6439285 6474874 6480958 6484163 Changes incorporated in this version:
Patches accumulated and obsoleted by this patch: 118917-03 119013-03 121283-02 121285-02 121293-01 121787-01 Patches which conflict with this patch: Required Patches: Obsoleted by: Files Included in this Patch: /etc/crypto/kcf.conf /etc/crypto/pkcs11.conf /etc/inet/ipsecalgs /kernel/crypto/aes /kernel/crypto/amd64/aes /kernel/crypto/amd64/arcfour /kernel/crypto/amd64/blowfish /kernel/crypto/amd64/des /kernel/crypto/amd64/md5 /kernel/crypto/amd64/rsa /kernel/crypto/amd64/sha1 /kernel/crypto/amd64/sha2 /kernel/crypto/amd64/swrand /kernel/crypto/arcfour /kernel/crypto/blowfish /kernel/crypto/des /kernel/crypto/md5 /kernel/crypto/rsa /kernel/crypto/sha1 /kernel/crypto/sha2 /kernel/crypto/swrand /kernel/drv/amd64/crypto /kernel/drv/crypto /kernel/misc/amd64/des /kernel/misc/amd64/kcf /kernel/misc/amd64/md5 /kernel/misc/amd64/sha1 /kernel/misc/amd64/sha2 /kernel/misc/des /kernel/misc/kcf /kernel/misc/md5 /kernel/misc/sha1 /kernel/misc/sha2 /lib/amd64/libmd5.so.1 /lib/libmd5.so.1 /usr/bin/digest /usr/bin/mac /usr/bin/pktool /usr/include/security/pkcs11t.h /usr/lib/amd64/libcryptoutil.so.1 /usr/lib/amd64/libpkcs11.so.1 /usr/lib/libcryptoutil.so.1 /usr/lib/libpkcs11.so.1 /usr/lib/security/amd64/pkcs11_kernel.so.1 /usr/lib/security/amd64/pkcs11_softtoken.so.1 /usr/lib/security/pkcs11_kernel.so.1 /usr/lib/security/pkcs11_softtoken.so.1 /usr/sbin/cryptoadm Problem Description: 6474874 cryptoadm(1M) silently re-enables random number operations 6484163 memory leak in get_dsa_public_key (from 118919-20) 6480958 "Keystore version failure" warning message should be moved to LOG_DEBUG (from 118919-19) 6271754 pkcs11_softtoken too aggressive in looking for token data files (from 118919-18) 6192431 C_GetAttribute value with CKA_KEY_TYPE attribute returns 8 bytes in 32-bit mode 6439285 kernel des3 fails to return corrected key when all 3 parts of the key are identical (from 118919-17) 6399680 logical provider selects busy member 6363872 AES counter mode increments wrong counter bits on i386 (from 118919-16) 6401115 118919-13 missing i.kcfconfbase CAS 6408419 i.ipsecalgsbase CAS missing in 118918-14 & 118919-12 6405871 (rework) patch 118918-15 delivers 'f' objects previously delivered in 119012-03 6342468 patchrm 118918-03 complains about failed to parse /etc/crypto/pkcs11.conf (from 118919-15) 6405871 patch 118918-15 delivers 'f' objects previously delivered in 119012-03 (from 118919-14) 6338653 integrate ZFS (from 118919-13) 6296920 IPsec 3DES can't be used in two-key mode (from 118919-12) This revision accumulates S10U2 feature point patches 121787-01, 121293-01, 121285-02 and 121283-02. (from 118919-11) 6276483 libpkcs11 pthread_atfork() code can cause child process to hang 6345493 fork(2) handling fixes from 6276483 needs further work in pkcs11_softtoken 6360218 uprev for patches that do not manually preserve the 'e' prototype file attribute 6359179 i.script (pkgproto cmd) - is not "e" file friendly (synopsis modified) (from 118919-10) 6376993 x86 patch T118844-29 is missing an object causing functional failure (from 118919-09) 5039273 failure in crypto_verify() when using a bignum with value 0 for CKM_RSA_X_509 6264344 remove gratuitous bzero() calls from SHA1Final() and MD5Final() 6286372 kernel SHA1Update uses global variable making it non-reentrant 6357426 increase rndmag_threshold and rndbuf_len default values (from 118919-08) 6274680 Metaslot on Niagara (UltraSPARC T1) suddenly becomes very slow at high load (from 118919-07) 6264379 Metaslot caused 20% performance degradation in crypto operations 6250963 Metaslot doesn't perform well when there are many slots 6276609 memory leak in meta_GetMechanismInfo 6280574 pk11keymgmt_test dumps core 6262344 Metaslot crashes in call to C_UnwrapKey during generation 6252894 BER routines in LDAP library don't work for 64 bit (from 118919-06) 6222467 system calls from C_Initialize() get interrupted (from 118919-05) 4926742 CKM_DH_PKCS_DERIVE fails if derived secret is shorter than prime 6215816 C_FindObjectsInit fails when token isn't present 6220814 C_DigestKey failure causes C_DestroyObject being hung (from 118919-04) 6217866 S1WS sometimes drops SSL connections 6223866 C_SignInit() sometimes doesn't work using a generated key 6223869 Metaslot trying to create key with bogus data 6223863 Metaslot needs to return CK_EFFECTIVELY_INFINITE in token info 6231978 Apache/mod_ssl fails SSL connections when Metaslot is present with SCA 1000 (from 118919-03) This revision accumulates S10U1 feature point patch 118917-03. (from 118919-02) 6228384 cryptoadm gettext for usage too simplistic 6231739 cryptoadm bugfix lost "metaslot" usage keywords (from 118919-01) 4691624 libpkcs11: uCF meta slot management 6199119 pk11object test program core dumps with metaslot+pkcs11_kernel+Deimos configured 6215509 fix for 4691624 introduced a lock violation (from 118917-03) Uprev due to the intersection between Feature and Generic gates. (from 118917-02) 6197284 implement C_UnwrapKey(<secret keys>) with decrypt/create_object when needed in pkcs11_kernel 6197268 pkcs11_kernel shouldn't reject C_GetAttributeValue() for a secret key's CKA_VALUE_LEN attr 6204887 SEGV in process_found_objects() 6195934 pkcs11_kernel C_DecryptInit() can return with the object_mutex still held (from 118917-01) 4691624 libpkcs11: uCF meta slot management 6199119 pk11object test program core dumps with metaslot+pkcs11_kernel+Deimos configured 6215509 fix for 4691624 introduced a lock violation (from 121283-02) 4721729 support AES Counter mode for encryption 6253484 support mechanisms with complex mech_param structures across the EF stack 6314217 hide underlying providers of logical providers (from 121283-01) 4920408 PKCS#11 v2.20 support for the Crypto Framework (from 121285-02) 6332630 chassis serial number support for Seattle/Boston 6342066 add Boston and Seattle support to Solaris 6372587 pkcs11_softtoken should use getpwuid_r(3C) to avoid overwriting thread-specific data 6372169 blowfish can read past mblk and panic in cbc mode 6368332 libpkcs11 should report that it is v2.20 not v2.11 (from 121285-01) 4920408 PKCS#11 v2.20 support for the Crypto Framework 6181926 support SHA256, SHA384, SHA512 in kernel 6336131 CKM_TLS_PRF support 6287425 residual bzero's in hmac part of sha2 6331488 OID with NO parameter for RSA sigs using SHA-1 missing from softtoken 6347073 kcf missing some rsa mechs 6198116 dprov in amd64 mode fails when interfacing with 32bit pk11objectkernel test 5067502 dprov no longer generating correct key sizes for some mechanisms (from 121293-01) 5059459 provide utility to export-to-PKCS#12-file from softtoken 5059461 pktool(1) needs subcommands to list and delete objects in softtoken 6216772 update pktool(1) list/delete subcommands 6278459 add "tokens" subcommand to pktool(1) 6288840 pktool(1) alternate token support 6332420 change pktool CLI to use attr=value format (from 121787-01) 4721729 support AES Counter mode for encryption 6355571 fix for 6352877 broke the export source build 6355597 fix for 6352877 broke punchin 6352877 ckpi_004 - CKM_AES_ECB mechanism test failing with lots of Crypto error 29 messages (from 119013-03) 5072858 cryptoadm disable does not work as expected when logical provider slot is involved 6250168 assertion failure when second provider has function group flags in different class 5100567 add logical provider assertion from crypto_provider_notification() (from 119013-02) 6222467 system calls from C_Initialize() get interrupted 6195428 "Slot Info is NULL for vca0" error when running SUNvts vcatest on E15K 6211857 driver panics when kcf_free_context() is called (from 119013-01) 6200215 ulMaxRwSessionCount says CK_UNAVAILABLE_INFORMATION Revision History: 118919-12 118919-16 118919-05 118919-02 118919-20 118919-19 119013-03 118919-08 118919-10 118919-18 118919-03 118919-07 118919-11 118919-06 118919-17 Patch Installation Instructions: -------------------------------- For Solaris 2.0-2.6 releases, refer to the Install.info file and/or the README within the patch for instructions on using the generic 'installpatch' and 'backoutpatch' scripts provided with each patch. For Solaris 7-10 releases, refer to the man pages for instructions on using 'patchadd' and 'patchrm' scripts provided with Solaris. Any other special or non-generic installation instructions should be described below as special instructions. The following example installs a patch to a standalone machine: example# patchadd /var/spool/patch/104945-02 The following example removes a patch from a standalone system: example# patchrm 104945-02 For additional examples please see the appropriate man pages. Special Install Instructions: ----------------------------- NOTE 1: Reboot system after patch installation is complete. NOTE 2: If you're planning to set up Zones on this system, please make sure to install the following patch which fixes bugid 6216195 (zone installation confused by UPDATE=yes in pkginfo(4) file): 119016-01 (or greater) Install and Patch Utilities Patch (Note that 119255 has superseded 119016; installation of the current version is recommended to be preferred, due to its central role in the installation and removal of patches.) NOTE 3: If you have the SUNWcry package installed, you MUST also install the following patch: 118563-02 (or greater) Solaris Data Encryption Kit Patch NOTE 4: To get the complete fix for bug 6222467 (system calls from C_Initialize() get interrupted), please also install the following patch: 118563-03 (or greater) Solaris Data Encryption Kit Patch NOTE 5: To get the complete support for algorithm optimization for crypto and kernel modules for restricted and non-restricted key lengths versions, please also install the following patch: 118563-05 (or greater) Solaris Data Encryption Kit Patch README -- Last modified date: Monday, February 5, 2007
|
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() |
![]() |