Patch-ID# 108799-02 Keywords: security tip buffer overrun Synopsis: SunOS 5.7_x86: /usr/bin/tip patch Date: Jun/27/2001 Solaris Release: 7_x86 SunOS Release: 5.7_x86 Unbundled Product: Unbundled Release: Xref: This patch available for SPARC as patch 108798 Topic: SunOS 5.7_x86: /usr/bin/tip patch Relevant Architectures: i386 BugId's fixed with this patch: 4206007 4330475 4430971 Changes incorporated in this version: 4330475 4430971 Patches accumulated and obsoleted by this patch: Patches which conflict with this patch: Patches required with this patch: Obsoleted by: Files included with this patch: /usr/bin/tip Problem Description: 4330475 Various security problems in tip 4430971 *tip*, getent()/tgetent() can ignore supplied buffersize. (from 108799-01) 4206007 tip has buffer overrun with security implications Patch Installation Instructions: -------------------------------- For Solaris 2.0-2.6 releases, refer to the Install.info file and/or the README within the patch for instructions on using the generic 'installpatch' and 'backoutpatch' scripts provided with each patch. For Solaris 7-8 releases, refer to the man pages for instructions on using 'patchadd' and 'patchrm' scripts provided with Solaris. Any other special or non-generic installation instructions should be described below as special instructions. The following example installs a patch to a standalone machine: example# patchadd /var/spool/patch/104945-02 The following example removes a patch from a standalone system: example# patchrm 104945-02 For additional examples please see the appropriate man pages. Special Install Instructions: ----------------------------- None. README -- Last modified date: Wednesday, June 27, 2001