Patch-ID# 109593-02 Keywords: security tnchkdb libbsm libnsl NETPATH buffer overflow getenv audit record Synopsis: Trusted Solaris 7: Audit records, tnchkdb and NETPATH patch Date: Dec/15/2000 Solaris Release: Trusted_Solaris_7 SunOS Release: Unbundled Product: Unbundled Release: Xref: This patch available for x86 as patch 109594 Topic: Trusted Solaris 7: Audit records, tnchkdb and NETPATH patch Relevant Architectures: sparc BugId's fixed with this patch: 4285838 4289266 4329815 Changes incorporated in this version: 4329815 Patches accumulated and obsoleted by this patch: Patches which conflict with this patch: Patches required with this patch: Obsoleted by: Files included with this patch: /usr/lib/libbsm.a /usr/lib/libbsm.so.1 /usr/lib/libnsl.so.1 /usr/lib/sparcv9/libbsm.so.1 /usr/lib/sparcv9/libnsl.so.1 Problem Description: (for 109593-02) 4329815 NETPATH security problem in libnsl (from 109593-01) 4285838 audit records generated by x86 have incorrect values 4289266 tnchkdb seg faults when checking templates with syntax error on x86 Patch Installation Instructions: -------------------------------- Refer to the Install.info file for instructions on using the generic 'installpatch' and 'backoutpatch' scripts provided with each patch. Any other special or non-generic installation instructions should be described below as special instructions. Special Install Instructions: ----------------------------- Note: This patch contains both the 32 bit and 64 bit patch version which are contained in separate packages. If you only have the 32 bit version installed then a message will appear in the install log that the package with the 64 bit version was not installed. Conversely if you only have the 64 bit version installed then a message will appear in the install log that the package with the 32 bit version did not install. If you have both 32 bit and 64 bit versions then both versions will be installed. The steps below assume the patch tarfile has been placed into the ADMIN_LOW subdirectory of /tmp (/tmp is an MLD), owned by admin and the patch tarfile label is configured to ADMIN_LOW. Keep in mind, after rebooting, contents in /tmp directory are removed; if saving the patch tarfile is desired, select another MLD such as /var/tmp. 1) Login as a user authorized to assume the admin and root roles. Assume the admin role. 2) Create a subdirectory for the patch and move the patch tar file into it. # cd /tmp # mkdir # mv 123456-01.tar.Z ./ # cd is the directory containing the patch itself. 3) Uncompress the patch tarfile by typing: # uncompress 123456-01.tar.Z 4) Extract the patch by typing: # tar xvf 123456-01.tar 5) cd into the patch directory: # cd 123456-01 # pwd /tmp/patch-dir/123456-01 The tar file 123456-01.tar in this directory requires the "T" flag for tar file extraction in order to preserve its file security attributes. Failure to use this option will cause the patch installation to terminate. 6) Extract the patch by typing: # tar xvTf 123456-01.tar 7) Assume the root role, cd into the directory where the patch resides. # cd /tmp//123456-01 8) Install the patch by typing: installpatch where is the directory containing installpatch, and is the directory containing the patch itself. # pwd /tmp//123456-01 # ./installpatch . Special Backout Instructions: ---------------------------- 1) Login as a user authorized to assume the root role, assume root role. 2) Change directory to /var/sadm/patch # cd /var/sadm/patch 3) Backout patch by typing: /backoutpatch where is the patch number. # 123456-01/backoutpatch 123456-01 README -- Last modified date: Friday, December 15, 2000