It is in MOS:

Reference Index of CVE IDs and Solaris Patches (Doc ID 1448883.1)
--
Ben Couldrey | Principal Solutions Engineer
Infrastructure Technologies
ORACLE Australia | Sales Engineering 

Office: +613 8616 3289 | Mobile: +61 417 386 077        
Level 5, 417 St Kilda Road, Melbourne VIC 3004 

↪ See SuperCluster <https://www.oracle.com/supercluster>, MiniCluster 
<https://www.oracle.com/minicluster>, SPARC Cloud 
<https://www.oracle.com/servers/sparc/sparc-model-300>, SPARC Servers 
<https://www.oracle.com/servers/sparc> at Oracle.com 
<https://www.oracle.com/>ORACLE Elite Engineering Exchange | Go EEE 
<https://my.oracle.com/go/eee>   

> On 16 Jan 2019, at 11:14 am, Chris Wells <[email protected]> wrote:
> 
> Anyone know how to look up the Solaris patch # for a particular CVE?
>  
> Oracle have just released the JAN 2019 Critical Security Advisory, of which 
> there are 4 CVEs for Solaris 10.
> https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html#AppendixSUNS
>  
> <https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html#AppendixSUNS>
>  
>  
> Eg one of the CVEs :
>  
> CVE-2019-2541 – DHCP Client.
>  
> However, there doesn’t seem to be a hyperlink anywhere in that document which 
> refers to a patch#.
> Looking up the CVE on Mitre gives nothing - 
> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2541 
> <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2541> (Placeholder 
> only)
> And searching for “CVE-2019-2541” on MOS doesn’t give any hits.
>  
> Regards-Chris
>  
> Chris Wells
> Midrange Storage Systems
> Jemena
> Level 13, 567 Collins Street, Melbourne VIC 3000
> T: (03) 9173 8369 <tel:(03)%209173%208369> | M: 0428 367 412 
> <tel:0428%20367%20412> | F: (03) 9670 0439 <tel:(03)%209670%200439>
> [email protected] <mailto:[email protected]> | 
> www.jemena.com.au 
> <https://urldefense.proofpoint.com/v2/url?u=http-3A__www.jemena.com.au_&d=DwMGaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=fgPSHuZXK315EaA-0TLW5FZPCtxRltY6YrhgJWfXDD0&m=y6r51cz-Q2YKGx9fLliLoCnkxT9h_AzXah2GdvqGrPg&s=2VZxyS8xF-fjzONRA_vsUvMYaEkudt0B89RdIm8CfQc&e=>
>  
> <image001.png><image003.jpg>
>  
> *************************************************************** 
> This is a confidential message intended for the named recipient(s) only. The 
> contents herein are privileged to the sender and the use thereof is 
> restricted to the intended purpose. If you have received this e-mail in 
> error, please do not use, disclose, distribute, copy, print or relay on this 
> email. If receipt is in error, please advise the sender by reply email. Thank 
> you. 
> *************************************************************** 
> _______________________________________________
> msosug mailing list
> [email protected] <mailto:[email protected]>
> https://urldefense.proofpoint.com/v2/url?u=http-3A__mexico.purplecow.org_m_listinfo_msosug&d=DwICAg&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=fgPSHuZXK315EaA-0TLW5FZPCtxRltY6YrhgJWfXDD0&m=y6r51cz-Q2YKGx9fLliLoCnkxT9h_AzXah2GdvqGrPg&s=ejTzOyqlg9UKZV1wjBOgiZsbTCEi7Irj6lFJFIQjyw4&e=
>  
> <https://urldefense.proofpoint.com/v2/url?u=http-3A__mexico.purplecow.org_m_listinfo_msosug&d=DwICAg&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=fgPSHuZXK315EaA-0TLW5FZPCtxRltY6YrhgJWfXDD0&m=y6r51cz-Q2YKGx9fLliLoCnkxT9h_AzXah2GdvqGrPg&s=ejTzOyqlg9UKZV1wjBOgiZsbTCEi7Irj6lFJFIQjyw4&e=>

_______________________________________________
msosug mailing list
[email protected]
http://mexico.purplecow.org/m/listinfo/msosug

Reply via email to