Patch-ID# 111627-02 Keywords: security buffer overflow cmdtool cpu Synopsis: OpenWindows 3.6.2_x86: Xview Patch Date: Nov/11/2002 Install Requirements: None Solaris Release: 8_x86 SunOS Release: 5.8_x86 Unbundled Product: OpenWindows Unbundled Release: 3.6.2_x86 Xref: This patch is available for sparc as patch 111626 Topic: Relevant Architectures: i386 BugId's fixed with this patch: 4458476 4690979 4719994 Changes incorporated in this version: 4690979 4719994 Patches accumulated and obsoleted by this patch: Patches which conflict with this patch: Patches required with this patch: Obsoleted by: Files included with this patch: /usr/openwin/lib/libp/libxview.a /usr/openwin/lib/libxview.a /usr/openwin/lib/libxview.so.3 Problem Description: 4719994 cmdtool takes up 90 cpu or core dumps 4690979 xview app. dumps core at ml_panel_saved_caret() by using any Japanese (from 111627-01) 4458476 buffer overflow in server package Incorporated from previous patch revision: Patch Installation Instructions: -------------------------------- Refer to the man pages for instructions on using 'patchadd' and 'patchrm' scripts provided with Solaris. Any other special or non-generic installation instructions should be described below as special instructions. The following example installs a patch to a standalone machine: example# patchadd /var/spool/patch/104945-02 The following example removes a patch from a standalone system: example# patchrm 104945-02 For additional examples please see the appropriate man pages. Special Install Instructions: ----------------------------- None. README -- Last modified date: Monday, November 11, 2002