# CLUSTER_README NAME: Solaris 2.5 Recommended Patch Cluster DATE: Jan/09/02 ######################################################################## This patch cluster is intended to provide a selected set of patches for the designated Solaris release level. This is a bundled set of patches conveniently wrapped for one-step installation. Only install this cluster on the appropriate Solaris system. Carefully read all important notes and install instructions provided in this README file before installing the cluster. A cluster grouping does not necessarily imply that additional compatibility testing has occured since the individual patches were released. ######################################################################## CLUSTER DESCRIPTION ------------------- These Solaris Recommended patches are considered the most important and highly recommended patches that avoid the most critical system, user, or security related bugs which have been reported and fixed to date. In most cases a Solaris security patch will be included in the recommended patch set. It is possible, however, that a security patch may not be included in the recommended set if it is determined to be a more obscure application specific issue and not generally applicable. During initial installation of the Solaris product other patches or patch sets may be provided with the product and required with product installation. Refer to the Solaris product installation documentation to be sure that all the patches required at product installation are already installed. This patch cluster can then be used to update or augment the system with the recommended patches included. PATCHES INCLUDED: ----------------- 103670-08 CDE 1.0.2: dtcm sdtcm_convert rpc.cmsd patch 103671-08 CDE 1.0.1: dtcm sdtcm_convert rpc.cmsd patch 103291-03 SunOS 5.5: syslogd patch 103667-12 SunOS 5.5: libresolv, in.named, named-xfer, nslookup & nstest patch 102964-16 SunOS 5.5: lp patch 102971-01 SunOS 5.5: vipw fix 102980-18 SunOS 5.5: /usr/lib/sendmail fixes 102982-04 SunOS 5.5: usr/bin/csh Patch 102984-01 SunOS 5.5: sd driver fix 103024-03 SunOS 5.5: libvolmgt patch 103093-28 SunOS 5.5: kernel update 103169-15 SunOS 5.5: arp,ip,udp,icmp driver and ifconfig fixes 104410-05 SunOS 5.5: /sbin/su, /usr/bin/su and /sbin/sulogin patch 103178-09 SunOS 5.5: pam security patch 103187-49 SunOS 5.5: libc, libnsl, libucb, nis_cachemgr and rpc.nisd patch 103241-05 SunOS 5.5: BCP (binary compatibility) patch 103242-07 SunOS 5.5: linker patch 103247-16 SunOS 5.5: admintool/launcher fixes + swmtool fixes & y2000 103256-03 SunOS 5.5: /kernel/fs/cachefs patch 103261-08 SunOS 5.5: ufsdump & ufsrestore patch 103266-01 SunOS 5.5: nissetup default permissions for password table not secure 103279-04 SunOS 5.5: nscd/nscd_nischeck/nss_files.so.1 patch 103285-07 SunOS 5.5: Patch for make, sccs 103293-03 SunOS 5.5: aspppd patch 103328-04 SunOS 5.5: /kernel/fs/procfs fix 103399-02 SunOS 5.5: /kernel/strmod/sockmod patch 103447-10 SunOS 5.5: tcp patch 103468-05 SunOS 5.5: /usr/lib/nfs/statd patch 103492-03 SunOS 5.5: /kernel/fs/autofs patch 103577-13 SunOS 5.5: ftp, in.ftpd, in.rexecd and in.rshd patch 103708-03 SunOS 5.5: /usr/sbin/rpc.nisd_resolv patch 103712-02 SunOS 5.5: /usr/kernel/fs/namefs patch 103723-13 SunOS 5.5: /usr/bin/at and /usr/sbin/cron patch 103746-01 SunOS 5.5: XFN source modifications for BIND 4.9.3 103815-03 SunOS 5.5: /usr/bin/rdist patch 103936-03 SunOS 5.5: kernel/drv/isp patch 104015-01 SunOS 5.5: vold filemgr fixes 104223-03 SunOS 5.5: /usr/lib/nfs/mountd patch 104269-02 SunOS 5.5: inetd patch 104357-07 SunOS 5.5: /usr/sbin/rpcbind patch 104629-01 SunOS 5.5: syslogd patch 104669-02 SunOS 5.5: rlogin patch 104690-01 SunOS 5.5: usr/sbin/in.talkd patch 104704-01 SunOS 5.5: in.tftpd patch 104744-02 SunOS 5.5: platform/sun4m/kernel/drv/sx patch 104796-01 SunOS 5.5: eeprom patch 104793-04 SunOS 5.5: ssd, pln, soc, ssacli, ssaadm and ssafirmware patch 104933-01 SunOS 5.5: usr/sbin/in.rlogind patch 104971-01 SunOS 5.5: chkey and newkey patch 105052-01 SunOS 5.5: /usr/bin/ps /usr/ucb/ps 105101-01 SunOS 5.5: usr/sbin/sysdef patch 105312-01 SunOS 5.5: /kernel/exec/elfexec patch 105316-01 SunOS 5.5: /usr/bin/gcore patch 105533-01 SunOS 5.5: sendmail security problem with vacation program 106007-03 SunOS 5.5: usr/sbin/vold patch 106384-01 SunOS 5.5: /usr/sbin/rmmount fix 106446-01 SunOS 5.5: /usr/sbin/ping patch 102832-07 OpenWindows 3.5: Xview Patch 102850-06 OpenWindows 3.5: OLIT Patch 103210-31 OpenWindows 3.5: Server (Xsun, libX11, xterm) Patch 103251-11 OpenWindows 3.5: calendar manager patch 103300-03 OpenWindows 3.5: filemgr (ff.core) fixes 103878-05 OpenWindows 3.5: KCMS tools have security vulnerability 103899-01 OpenWindows 3.5: XView Binary Compatibility Patch 104337-02 OpenWindows 3.5: libXt patch 105245-01 OpenWindows 3.5: libXt Binary Compatibility Patch 103186-30 Motif 1.2.3: Runtime library patch 103318-04 SunOS 5.5: kernel/fs/fifofs and kernel/sys/pipe fixes 104889-08 SunOS 5.5: /usr/bin/uustat and other uucp fixes 105680-03 SunOS 5.5: /usr/sbin/auditreduce patch 106567-01 SunOS 5.5: Two buffer overflows exist in libauth 106691-01 SunOS 5.5: /usr/sbin/in.uucpd patch 106907-01 SunOS 5.5: catman/whatis/man/apropros patch 102959-20 XGL 3.2: XGL Patch (stripped version) 107754-01 SunOS 5.5: Pax incorrectly change mode of symlink target file 106666-01 OpenWindows 3.5: libce suid/sgid security fix 106667-01 OpenWindows 3.5: libdeskset patch 103076-13 Creator 2.5_HW:1/96: FFB Graphics Patch 102839-07 OpenWindows 3.5: Mailtool patch 108501-01 SunOS 5.5: /usr/sbin/snoop patch 108656-02 SunOS 5.5: Patch for sadmind 104428-12 OpenWindows 3.5: ToolTalk patch 108729-01 SunOS 5.5: /usr/bin/login patch 108530-01 SunOS 5.5: ASET patch 103276-03 SunOS 5.5: /bin/mail patch 109390-01 SunOS 5.5: /usr/vmsys/bin/chkperm patch 108910-02 SunOS 5.5: /usr/bin/tip patch 110108-02 SunOS 5.5: jserver buffer overflow 110339-01 SunOS 5.5: libcurses:setupterm has buffer overflow 105169-04 SunOS 5.5: /usr/lib/netsvc/yp/ypbind patch 104000-02 SunOS 5.5: /usr/sbin/rpc.nispasswdd patch 108647-01 SunOS 5.5: /usr/sbin/keyserv patch 108649-01 SunOS 5.5: /usr/sbin/rpc.bootparamd patch 111251-01 SunOS 5.5: in.fingerd can store a NULL after end of an array 103253-10 SunOS 5.5: ksh fixes 111284-01 SunOS 5.5_x86: finger doesn't always correctly match NULL usernames 111283-01 SunOS 5.5: finger doesn't always correctly match NULL usernames 111545-01 SunOS 5.5: catman makes dangerous use of tmpfiles. 111838-01 SunOS 5.5: Buffer overflow in whodo via $TZ 105965-03 SunOS 5.5: vi/ex/edit/view/vedit patch 112070-01 SunOS 5.5: bdiff and sdiff Patches 112061-02 SunOS 5.5: mailx Patch 108363-02 CDE 1.0.2: libDtSvc Patch IMPORTANT NOTES AND WARNINGS: ----------------------------- SYSTEMS WITH LIMITED DISK SPACE SHOULD *NOT* INSTALL PATCHES: With or without using the save option, the patch installation process will still require some amount of disk space for installation and administrative tasks in the /, /usr, /var, or /opt partitions where patches are typically installed. The exact amount of space will depend on the machine's architecture, software packages already installed, and the difference in the patched objects size. To be safe, it is not recommended that a patch cluster be installed on a system with less than 4 MBytes of available space in each of these partitions. Running out of disk space during installation may result in only partially loaded patches. Be sure a recent full system backup is available in case a problem occurs, and check to be sure adequate disk space is available before installing the patch cluster. SAVE AND BACKOUT OPTIONS: By default, the cluster installation procedure uses the installpatch save feature to save the base objects being patched. Prior to installing the patches the cluster installation script will first determine if enough system disk space is available in /var/sadm/patch to save the base objects and will terminate if not. Patches can only be individually backed out with the original object restored if the save option was used when installing this cluster. Please later refer to the backoutpatch instructions provided in the individual patch README file which will be located in the specific patch directory under /var/sadm/patch after the patch has been installed. It is possible to override the save feature by using the [-nosave] option when executing the cluster installation script. Using the nosave option, however, means that you will not be able to backout individual patches if the need arises. SPECIAL INSTALL INSTRUCTIONS: As with any patch individually applied, there may be additional special installation instructions which are documented in the individual patch readme file. It is recommended that each individual patch readme is reviewed after installing this cluster to determine if any additional installation steps are necessary for a patch. Otherwise it is possible that an individual patch may still not be completely installed in all respects after the cluster has been installed. DISKLESS OR DATALESS CLIENT SYSTEMS: On server machines that service diskless and/or dataless clients, a patch is NOT applied to existing clients or to the client root template space. Therefore, all client machines of the server that will need this cluster will have to individually apply this cluster. Install this cluster on the client machines first, then the server. A PATCH MAY NOT BE APPLIED: Under certain circumstances listed below, a particular patch provided in this cluster may not be installed if: - The patch applies to a package that has not originally been installed - The same or newer revision of the patch has already been installed - The patch was obsoleted by another patch that has already been installed - The package database is corrupt or missing Use the 'showrev -p' command to compare the list of patches already installed on the system with the patch list and revision levels provided in this cluster. During installation, the install process will indicate if a patch was not applied and more detailed installation messages will be logged to the installation log file. The README file with each patch also provides documentation regarding install and backout messages. OLDER VERSIONS OF PATCHES ALREADY INSTALLED: Backout of older versions of patches provided in the cluster is not required in order for the newer version to be installed. However not backing out an older rev before installing a newer rev will cause showrev -p to continue to show the older rev along with the newer rev. And, if the older rev was previously installed with the save option, the older rev will continue to occupy disk space in /var/sadm/patch even though it has been obsoleted by the new rev. The backoutpatch utility will only allow the most recently saved objects to be restored, thus there are no serious risks associated with leaving an older rev on the system. It just may, however, avoid confusion and be more economical to first backout an older patch rev before installing a newer rev. INSTALL INSTRUCTIONS: --------------------- First, be sure the patch cluster has been uncompressed and extracted if the cluster was received as a tar.Z file, then proceed as follows: 1) Decide on which method you wish to install the cluster: Recommended Method Using Save Feature: By default, the cluster installation procedure uses the installpatch save feature to save the original objects being patched. Prior to installing the patches the cluster installation script will first determine if enough system disk space is available in /var/sadm/patch to save the objects and will terminate if not. Using the default save feature is recommended. Method Using No Save Option: It is possible to override the save feature by using the [-nosave] option when executing the cluster installation script. Using the nosave option means that you will not be able to backout individual patches if the need arises. 2) Run the install_cluster script cd ./install_cluster By default, a message warning the user to check for minimum disk space allowance (separate from the save feature) will appear and allow the user to abort if inadequate space exists. To suppress this interactive message the "-q" (quiet) option can be used when invoking install_cluster. The progress of the script will be displayed on your terminal. It should look something like: # ./install_cluster Patch cluster install script for Determining if sufficient save space exists... Sufficient save space exists, continuing... Installing patches located in Installing Installing . . . Installing For more installation messages refer to the installation logfile: /var/sadm/install_data/_log Use '/usr/bin/showrev -p' to verify installed patch-ids. Refer to individual patch README files for more patch detail. Rebooting the system is usually necessary after installation. # 3) Check the logfile if more detail is needed. If errors are encountered during the installation of this cluster, error messages will be displayed during installation. More details about the causes of failure can be found in the detail logfile: more /var/sadm/install_data/_log If this log file previously existed the latest cluster installation data will be concatenated to the file, so check the end of the file. 4) THE MACHINE SHOULD BE REBOOTED FOR ALL PATCHES TO TAKE EFFECT!!