Patch-ID# 142241-01
Download this patch from My Oracle Support
Your use of the firmware, software and any other materials contained
in this update is subject to My Oracle Support Terms of Use, which
may be viewed at My Oracle Support.
|
For further information on patching best practices and resources, please
see the following links:
|
Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved.
|
Keywords: ntpq cve-2009-0159 buffer overflow
Synopsis: SunOS 5.10_x86: ntpq patch
Date: Oct/21/2009
Install Requirements: NA
Solaris Release: 10_x86
SunOS Release: 5.10_x86
Unbundled Product:
Unbundled Release: This patch available for SPARC as patch 142240
Xref:
Topic: SunOS 5.10_x86: ntpq patch
Relevant Architectures: i386
Bugs fixed with this patch:
Changes incorporated in this version:
Patches accumulated and obsoleted by this patch: 141911-01
Patches which conflict with this patch:
Patches required with this patch: 120012-14 (or greater)
Obsoleted by:
Files included with this patch:
/usr/sbin/ntpq
Problem Description:
This revision accumulates generic Sustaining patch 141911-01
into Solaris S10U8 update.
(from 141911-01)
4804801 /usr/sbin/ntpq -c buffer overflow
6831824 ntpq vulnerable to CVE-2009-0159
Patch Installation Instructions:
--------------------------------
Please refer to the man pages for instructions on using 'patchadd'
and 'patchrm' commands provided with Solaris.
The following example installs a patch to a standalone machine:
example# patchadd /var/spool/patch/123456-07
The following example removes a patch from a standalone system:
example# patchrm 123456-07
For additional examples please see the appropriate man pages. Any
other special or non-generic installation instructions should be
described below as special instructions.
Special Install Instructions:
-----------------------------
NOTE 1: Before installing this patch, please be sure to install the latest
patch utilities patches for your OS. This list of patches is defined
at http://sunsolve.sun.com
Please use the pull down list which appears after the text:
"Latest Patch Update: To ensure the correct functioning of the
patching utilities on your system, stay up to date on the
following patches"
README -- Last modified date: Saturday, November 10, 2012