Patch-ID# 107375-02 Keywords: security xview core cmdtool buffer overflow Synopsis: Openwindows 3.6.1_x86: Xview Patch Date: Jul/23/2001 Solaris Release: 7_x86 SunOS Release: 5.7_x86 Unbundled Product: OpenWindows Unbundled Release: 3.6.1_x86 Xref: This patch is available for sparc as patch 107374 Topic: Relevant Architectures: BugId's fixed with this patch: 4141064 4458476 Changes incorporated in this version: 4458476 Patches accumulated and obsoleted by this patch: Patches which conflict with this patch: Patches required with this patch: Obsoleted by: Files included with this patch: /usr/openwin/lib/libp/libxview.a /usr/openwin/lib/libxview.a /usr/openwin/lib/libxview.so.3 /usr/openwin/share/include/xview/xv_version.h Problem Description: 4458476 buffer overflow in server package (from 107375-01) 4141064 cmdtool went into an infinite loop under Solaris 2.x Patch Installation Instructions: -------------------------------- For Solaris 2.0-2.6 releases, refer to the Install.info file and/or the README within the patch for instructions on using the generic 'installpatch' and 'backoutpatch' scripts provided with each patch. For Solaris 7 release, refer to the man pages for instructions on using 'patchadd' and 'patchrm' scripts provided with Solaris. Any other special or non-generic installation instructions should be described below as special instructions. The following example installs a patch to a standalone machine: example# patchadd /var/spool/patch/104945-02 The following example removes a patch from a standalone system: example# patchrm 104945-02 For additional examples please see the appropriate man pages. Special Install Instructions: ----------------------------- None. README -- Last modified date: Monday, July 23, 2001