Patch-ID# 120463-07
Download this patch from My Oracle Support
Your use of the firmware, software and any other materials contained
in this update is subject to My Oracle Support Terms of Use, which
may be viewed at My Oracle Support.
|
For further information on patching best practices and resources, please
see the following links:
|
Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved.
|
Keywords: security core dump sshd port number forwarding x11 bind
Synopsis: SunOS 5.9_x86: sockfs patch
Date: Jul/03/2014
Install Requirements: After installing this patch on an active boot environment, the system will be in a potentially inconsistent state until a reboot is performed. Unless
otherwise specified in the Special Install Instructions below, it is normally safe to apply further patches prior to initiating the reboot due to the relatively small footprint of the patch utilities. Normal operations must not be resumed until after the reboot is performed.
Use Single User Mode (run level S) when installing this patch on an active boot environment. An alternative may be specified in the Special Install Instructions.
Solaris Release: 9_x86
SunOS Release: 5.9_x86
Unbundled Product:
Unbundled Release:
Xref: This patch available for SPARC as patch 118335
Topic: SunOS 5.9_x86: sockfs patch
Relevant Architectures: i386
Bugs fixed with this patch:
Changes incorporated in this version: 17839385
Patches accumulated and obsoleted by this patch:
Patches which conflict with this patch:
Patches required with this patch: 117172-17 (or greater)
Obsoleted by:
Files included with this patch:
/kernel/fs/sockfs
Problem Description:
17839385 problem with sockfs
(from 120463-06)
6620575 problem with sockfs
(from 120463-05)
6554738 pollsys isn't woken up even after connection indication delivered to stream head on AF_UNIX socket
(from 120463-04)
4920939 sendfilev64 (snf_cache) goes in infinite loop with zero byte reads
(from 120463-03)
6440263 M_PROTO msg associated with OOB byte eats up one byte of TCP receive window
(from 120463-02)
6292950 getsockname consumes pending ECONNREFUSED errors
(from 120463-01)
6231203 sotpi_bindlisten() should use T_BIND_REQ instead of O_T_BIND_REQ for AF_INET/AF_INET6
Patch Installation Instructions:
--------------------------------
Please refer to the man pages for instructions on using 'patchadd'
and 'patchrm' commands provided with Solaris.
The following example installs a patch to a standalone machine:
example# patchadd /var/spool/patch/123456-07
The following example removes a patch from a standalone system:
example# patchrm 123456-07
For additional examples please see the appropriate man pages. Any
other special or non-generic installation instructions should be
described below as special instructions.
Special Install Instructions:
-----------------------------
Reboot the system immediately after patch installation.
README -- Last modified date: Thursday, July 3, 2014