Patch-ID# 107374-02 Keywords: security xview core cmdtool buffer overflow Synopsis: Openwindows 3.6.1: Xview Patch Date: Jul/23/2001 Solaris Release: 7 SunOS Release: 5.7 Unbundled Product: OpenWindows Unbundled Release: 3.6.1 Xref: This patch is available for x86 as patch 107375 Topic: Relevant Architectures: sparc BugId's fixed with this patch: 4141064 4458476 Changes incorporated in this version: 4458476 Patches accumulated and obsoleted by this patch: Patches which conflict with this patch: Patches required with this patch: Obsoleted by: Files included with this patch: /usr/openwin/lib/libp/libxview.a /usr/openwin/lib/libxview.a /usr/openwin/lib/libxview.so.3 /usr/openwin/share/include/xview/xv_version.h Problem Description: 4458476 buffer overflow in server package (from 107374-01) 4141064 cmdtool went into an infinite loop under Solaris 2.x Patch Installation Instructions: -------------------------------- For Solaris 2.0-2.6 releases, refer to the Install.info file and/or the README within the patch for instructions on using the generic 'installpatch' and 'backoutpatch' scripts provided with each patch. For Solaris 7 release, refer to the man pages for instructions on using 'patchadd' and 'patchrm' scripts provided with Solaris. Any other special or non-generic installation instructions should be described below as special instructions. The following example installs a patch to a standalone machine: example# patchadd /var/spool/patch/104945-02 The following example removes a patch from a standalone system: example# patchrm 104945-02 For additional examples please see the appropriate man pages. Special Install Instructions: ----------------------------- None. README -- Last modified date: Monday, July 23, 2001