It is in MOS: Reference Index of CVE IDs and Solaris Patches (Doc ID 1448883.1) -- Ben Couldrey | Principal Solutions Engineer Infrastructure Technologies ORACLE Australia | Sales Engineering
Office: +613 8616 3289 | Mobile: +61 417 386 077 Level 5, 417 St Kilda Road, Melbourne VIC 3004 ↪ See SuperCluster <https://www.oracle.com/supercluster>, MiniCluster <https://www.oracle.com/minicluster>, SPARC Cloud <https://www.oracle.com/servers/sparc/sparc-model-300>, SPARC Servers <https://www.oracle.com/servers/sparc> at Oracle.com <https://www.oracle.com/>ORACLE Elite Engineering Exchange | Go EEE <https://my.oracle.com/go/eee> > On 16 Jan 2019, at 11:14 am, Chris Wells <[email protected]> wrote: > > Anyone know how to look up the Solaris patch # for a particular CVE? > > Oracle have just released the JAN 2019 Critical Security Advisory, of which > there are 4 CVEs for Solaris 10. > https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html#AppendixSUNS > > <https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html#AppendixSUNS> > > > Eg one of the CVEs : > > CVE-2019-2541 – DHCP Client. > > However, there doesn’t seem to be a hyperlink anywhere in that document which > refers to a patch#. > Looking up the CVE on Mitre gives nothing - > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2541 > <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2541> (Placeholder > only) > And searching for “CVE-2019-2541” on MOS doesn’t give any hits. > > Regards-Chris > > Chris Wells > Midrange Storage Systems > Jemena > Level 13, 567 Collins Street, Melbourne VIC 3000 > T: (03) 9173 8369 <tel:(03)%209173%208369> | M: 0428 367 412 > <tel:0428%20367%20412> | F: (03) 9670 0439 <tel:(03)%209670%200439> > [email protected] <mailto:[email protected]> | > www.jemena.com.au > <https://urldefense.proofpoint.com/v2/url?u=http-3A__www.jemena.com.au_&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=fgPSHuZXK315EaA-0TLW5FZPCtxRltY6YrhgJWfXDD0&m=y6r51cz-Q2YKGx9fLliLoCnkxT9h_AzXah2GdvqGrPg&s=2VZxyS8xF-fjzONRA_vsUvMYaEkudt0B89RdIm8CfQc&e=> > > <image001.png><image003.jpg> > > *************************************************************** > This is a confidential message intended for the named recipient(s) only. The > contents herein are privileged to the sender and the use thereof is > restricted to the intended purpose. If you have received this e-mail in > error, please do not use, disclose, distribute, copy, print or relay on this > email. If receipt is in error, please advise the sender by reply email. Thank > you. > *************************************************************** > _______________________________________________ > msosug mailing list > [email protected] <mailto:[email protected]> > https://urldefense.proofpoint.com/v2/url?u=http-3A__mexico.purplecow.org_m_listinfo_msosug&d=DwICAg&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=fgPSHuZXK315EaA-0TLW5FZPCtxRltY6YrhgJWfXDD0&m=y6r51cz-Q2YKGx9fLliLoCnkxT9h_AzXah2GdvqGrPg&s=ejTzOyqlg9UKZV1wjBOgiZsbTCEi7Irj6lFJFIQjyw4&e= > > <https://urldefense.proofpoint.com/v2/url?u=http-3A__mexico.purplecow.org_m_listinfo_msosug&d=DwICAg&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=fgPSHuZXK315EaA-0TLW5FZPCtxRltY6YrhgJWfXDD0&m=y6r51cz-Q2YKGx9fLliLoCnkxT9h_AzXah2GdvqGrPg&s=ejTzOyqlg9UKZV1wjBOgiZsbTCEi7Irj6lFJFIQjyw4&e=>
_______________________________________________ msosug mailing list [email protected] http://mexico.purplecow.org/m/listinfo/msosug
