README

NAME: Recommended OS Patchset Solaris 10 x86
DATE: 2024.01.11


NOTE:
-----
Java 5 is no longer supported and therefore no longer updated with the latest
security fixes. Java 5 is NOT recommended for use in production. All Java 5
patches for Solaris have been removed from this patchset (March 25th, 2017).
It is recommended that customers remove old Java package versions from their
systems.


INTENT:
-------

Please see "Critical Patch Updates, Security Alerts and Third Party Bulletin",
http://www.oracle.com/technetwork/topics/security/alerts-086861.html for
information on security vulnerabilities. For information on Solaris, click on
the relevant CPU link, and select the "Oracle Sun Product" link.

Please note, the Solaris Critical Patch Updates (CPUs) are re-named, archived
copies of the Recommended patchset. Subsequent versions of the Recommended
patchset will be a superset of the CPU. See:
https://blogs.oracle.com/patch/entry/a_solaris_recommended_patchset_to

NOTE: From 2011.06.28 some core changes have been made to the Recommended OS
Patchset :

- The patch inclusion criteria have been extended to include patches for
selected issues identified by Oracle Proactive Services and the Oracle Technical
Support Center.

- The term 'Patch Cluster' has been replaced by 'Patchset', and the associated
rebranding has been effected. The patchset install script is now named
'installpatchset'. A symlink to 'installpatchset' is provided in place of the
legacy 'installcluster' script for now, but this symlink is purely transitional
and will be removed at some future point in time. Where applicable, please
update infrastructure to use the 'installpatchset' script directly.

- The patchset 'README' file has been renamed '10_x86_Recommended.README'.

For further information about these changes, please see:

http://blogs.oracle.com/patch/entry/a_solaris_recommended_patchset_to


The Recommended OS Patchset Solaris 10 x86 provides the minimum set of patches
needed to address security and Sun Alert issues, and selected issues identified
by Oracle Proactive Services and the Oracle Technical Support Center, for the
Solaris 10 Operating System for x86. The patches contained in this patchset are
considered the most important and highly recommended patches for Solaris 10.
They provide the least amount of change required to address known security, data
corruption and availability issues, as well as other functional issues that have
been identified to be commonly encountered in the field.

The Recommended OS Patchset comprises:

1. The latest revision of the patch and package utility patches that ensure
correct patching operations.

2. The minimum revision of Solaris Operating System patches which address
security and Sun Alert (data corruption and availability) issues, and selected
issues identified by Oracle Proactive Services and the Oracle Technical Support
Center.

3. Any patch that is required to correctly install the above patches.

When new patches are released that meet the above criteria, the patchset is
updated. If a patch is withdrawn from release due to problems, the patchset is
also updated. The withdrawn patches are removed from the patchset.

As the patchset contains the minimum revision (as opposed to the latest
available revision) of patches meeting criteria two and three above, the
patchset is likely to contain some obsoleted patches. This is deliberate and
not a cause for concern.

The patchset can be installed to a system running Solaris 10 3/05 ("FCS") or a
later Solaris 10 Update.

Depending on the current patch level of the target system, installation of this
patchset can involve applying a number of complex Solaris 10 patches. These
complex patches may require the user to follow specific install instructions
listed in the Special Install Instructions section of the patches' README files,
particularly if the patches are applied to the active boot environment of a
system. The key issues are also described below in this README file.

The matter of applying complex patches is primarily a concern for systems which
are running an early Solaris 10 Update and have not recently been patched. To
avoid applying complex patches, and to get full new feature functionality, it is
recommended to install or upgrade these systems using the latest Solaris 10
Update install media. Following an install or upgrade operation, it is
recommended to install this patchset to ensure the system has all current
patches which address security and Sun Alert issues applied, including those
patches released after the latest Solaris 10 Update content was finalised.

This README contains important information. Please read this README before
installing this patchset.


PATCHSET DESCRIPTION:
---------------------

This patchset is provided as a single zip file. The zip file is named:

10_x86_Recommended.zip

Once the zip file has been downloaded, it may be extracted. For example, to
extract this patchset in the current working directory, run:

# unzip -q 10_x86_Recommended.zip

If you experience problems unzipping this patchset please refer to MOS article
1020109.1 'Unzip of Solaris 10 Recommended Patchsets fails', available from:

https://support.oracle.com/CSP/main/article?cmd=show&type=NOT&doctype=PROBLEM&id=1020109.1


************** ATTENTION **************

If this patchset is installed to the active boot environment, then depending on
the starting patch level of the system, complete installation of the patchset
may require up to three installation phases with intervening reboots. For
further information, refer to section 'III. Installing this Patchset to the
Active Boot Environment' below.

If this patchset is installed to an inactive boot environment, then the need for
multiple reboots and some special instructions can be avoided.


*************** PASSCODE **************

The install script will only execute when the passcode specified in this README
file is provided as a command line flag. This is a safety mechanism to ensure
you have read this README. You must follow the Special Install Instructions for
key patches such as those highlighted in this README. It is also strongly
recommended to read the Special Install Instructions section of the README of
patches included in this patchset to check for any special install instructions
which may apply to your specific system configuration.

PASSCODE: s10patchset


PATCHES INCLUDED:
-----------------

Note that the patch list order below reflects the patch install order.

120901-03  SunOS 5.10_x86: libzonecfg patch
121334-04  SunOS 5.10_x86: zoneadmd, zlogin and zoneadm patch
119255-93  SunOS 5.10_x86: Install and Patch Utilities Patch
119318-01  Obsoleted by: 153101-01 SunOS 5.10_x86: SVr4 Packaging Commands (usr) Patch
121297-01  SunOS 5.10_x86: fgrep patch
138216-03  SunOS 5.10_x86: sort patch
147062-02  SunOS 5.10_x86: awk patch
148337-02  SunOS 5.10_x86: awk patch
146055-07  Obsoleted by: 146697-04 SunOS 5.10_x86: ksh patch
142252-02  SunOS 5.10_x86: sh patch
125556-15  SunOS 5.10_x86: patch behavior patch
140797-01  SunOS 5.10_x86: umountall patch
113000-07  SunOS 5.10_x86: SUNWgrub patch
117435-02  SunOS 5.10_x86: biosdev patch
118344-14  SunOS 5.10_x86: Fault Manager Patch
118368-04  Obsoleted by: 118368-05 SunOS 5.10_x86: csh Patch
118778-14  Obsoleted by: 118778-15 SunOS 5.10_x86: Sun GigaSwift Ethernet 1.0 driver patch
121182-05  Obsoleted by: 121182-06 Sun Trunking Utility 1.3_x86: maintenance patch
121264-01  SunOS 5.10_x86: cadp160 driver patch
123840-04  SunOS 5.10_x86: Fault Manager Patch
138218-01  SunOS 5.10_x86: svccfg & svcprop patch
140861-02  SunOS 5.10_x86: su patch
121454-02  SunOS 5.10_x86: Sun Update Connection Client Foundation
121119-22  SunOS 5.10_x86: Update Connection System Client 1.0.20
118844-20  Obsoleted by: 118844-27 SunOS 5.10_x86: kernel Patch
118855-36  SunOS 5.10_x86: kernel patch
118919-21  SunOS 5.10_x86: Solaris Crypto Framework patch
119060-73  X11 6.6.2_x86: Xsun patch
119064-02  SunOS 5.10_x86: libXpm patch
119082-25  SunOS 5.10_x86: CD-ROM Install Boot Image Patch
119116-35  Mozilla 1.7_x86: patch
119118-52  Obsoleted by: 119118-53 Evolution 1.4.6_x86 patch
119131-33  SunOS 5.10_x86: Sun Fibre Channel Device Drivers
119214-41  NSS_NSPR_JSS 3.35_x86: NSPR 4.18 / NSS 3.35 / JSS 4.3.2
119247-36  Obsoleted by: 119247-37 SunOS 5.10_x86: Manual Page updates for Solaris 10
124629-12  Obsoleted by: 124629-13 SunOS 5.10_x86: CD-ROM Install Boot Image Patch
119253-32  Obsoleted by: 119253-33 SunOS 5.10_x86: System Administration Applications Patch
123612-06  X11 6.6.2_x86: Trusted Extensions patch
125280-10  CDE 1.6_x86: dtsession patch
119279-39  Obsoleted by: 119279-43 CDE 1.6_x86: dtlogin patch
119283-01  CDE 1.6_x86: GNOME/CDE Menu for Solaris 10_x86
140900-01  SunOS 5.10_x86: [ir].manifest patch
119314-43  SunOS 5.10_x86: WBEM Patch
124189-03  SunOS 5.10_x86: Trusted Solaris Attributes Patch
119316-19  Obsoleted by: 119316-20 SunOS 5.10_x86: Solaris Management Applications Patch
122213-46  GNOME 2.6.0_x86: GNOME Desktop Patch
119411-10  GNOME 2.6.0_x86: GNOME Applets Patch
120200-15  Obsoleted by: 120200-16 SunOS 5.10_x86: sysidtool Patch
119535-29  Obsoleted by: 119535-30 SunOS 5.10_x86: Flash Archive Patch
119539-19  GNOME 2.6.0_x86: Window Manager Patch
120100-08  APOC 1.2_x86: Sun Java(tm) Desktop System Configuration Shared Libraries
119547-08  APOC 1.2_x86: APOC Configuration Agent Patch
119549-14  GNOME 2.6.0_x86: Gnome Multi-protocol instant messaging client Patch
119649-03  SunOS 5.10_x86: vlan driver patch
120273-42  Obsoleted by: 120273-43 SunOS 5.10_x86: SMA patch
122641-06  SunOS 5.10_x86: zfs genesis patch
127756-01  SunOS 5.10_x86: Fault Manager patch
125504-02  SunOS 5.10_x86: package-move-of-IP-objects patch
124205-05  Obsoleted by: 120037-15 SunOS 5.10_x86: zfs patch
122661-08  Obsoleted by: 120012-14 SunOS 5.10_x86: zones patch
125548-02  SunOS 5.10_x86: zoneadm indirect dependency patch
126424-03  SunOS 5.10_x86: bootadm patch
120012-14  SunOS 5.10_x86: kernel patch
139521-02  SunOS 5.10_x86: package specific [ir].manifest removal patch
127128-11  SunOS 5.10_x86: kernel patch
138867-02  SunOS 5.10_x86: sharetab patch
138884-01  SunOS 5.10_x86: GRUB patch
137138-09  SunOS 5.10_x86: kernel patch
141017-01  SunOS 5.10_x86: Dummy Patch
139556-08  SunOS 5.10_x86: Kernel Patch
142293-01  SunOS 5.10_x86: Place Holder patch
141445-09  SunOS 5.10_x86: kernel patch
142912-01  SunOS 5.10_x86: KU Place Holder patch
142934-05  SunOS 5.10_x86: failsafe patch
142910-17  SunOS 5.10_x86: kernel patch
144527-02  Obsoleted by: 144527-03 SunOS 5.10_x86: place holder patch
144501-19  SunOS 5.10_x86: Solaris kernel patch
147443-01  Obsoleted by: 147443-02 SunOS 5.10_x86: place holder patch
147148-26  SunOS 5.10_x86: kernel patch
150511-03  SunOS 5.10_x86: /var/svc/manifest/system/sysidtool.xml patch
150552-03  SunOS 5.10_x86: local-fs.xml patch
148072-19  SunOS 5.10_x86: openssl patch
151913-23  SunOS 5.10_x86: OpenSSL 1.0.2 patch
119758-45  SunOS 5.10_x86: Samba patch
119765-07  Obsoleted by: 119765-08 SunOS 5.10_x86: ipmitool patch
119784-51  SunOS 5.10_x86: BIND patch
119811-08  SunOS 5.10_x86: International Components for Unicode Patch
119813-25  X11 6.6.2_x86: FreeType patch
119901-17  GNOME 2.6.0_x86: GNOME libtiff - library for reading and writing TIFF Patch
119904-02  Openwindows 3.7.3_x86: Xview Patch
119907-22  GNOME 2.6.0_x86: Virtual File System Framework patch
119956-04  Obsoleted by: 143734-03 CDE 1.6_x86: Tooltalk Runtime patch for Solaris 10
119964-24  Obsoleted by: 119964-25 SunOS 5.10_x86: Shared library patch for C++_x86
119967-01  Obsoleted by: 119967-02 SunOS 5.10_x86: Math Libraries (libm+libmvec) patch
119987-03  SunOS 5.10_x86: clri patch
120095-36  X11 6.6.2_x86: xscreensaver patch
120102-01  SunOS 5.10_x86: patch usr/lib/libsmedia.so.1
120202-09  X11 6.8.0_x86: Xorg client libraries patch
120236-01  SunOS 5.10_x86: Live Upgrade Zones Support Patch
120285-07  GNOME 2.6.0_x86: GNOME CORBA ORB and component framework
120461-17  Obsoleted by: 120461-19 GNOME 2.6.0_x86: Gnome libs Patch
119369-04  Obsoleted by: 119369-05 GNOME 2.6.0_x86: Printing Technology Patch
120287-03  Obsoleted by: 120287-04 GNOME 2.6.0_x86: Gnome text editor Patch
120293-02  Obsoleted by: 120293-03 SunOS 5.10_x86: mysql patch
120349-03  Obsoleted by: 146235-01 SunOS 5.10_x86: Fibre Channel HBA Port utility
121976-01  CDE 1.6_x86: Xsession patch
120411-33  Obsoleted by: 120411-34 SunOS 5.10_x86: Internet/Intranet Input Method Framework patch
120413-11  Obsoleted by: 120413-12 SunOS 5.10_x86: Simplified Chinese locale patch
120415-27  Obsoleted by: 120415-28 SunOS 5.10_x86: Asian CCK locales patch
120536-17  SunOS 5.10_x86: Updated video drivers and fixes
120544-36  Obsoleted by: 120544-37 SunOS 5.10_x86: Apache 2 Patch
120720-07  SunOS 5.10_x86: SunFreeware gzip patch
120733-01  SunOS 5.10_x86: libusb patch
120740-08  GNOME 2.6.0_x86: GNOME PDF Viewer based on Xpdf
120754-09  Obsoleted by: 120754-10 SunOS 5.10_x86: Microtasking libraries (libmtsk) patch
120831-06  SunOS 5.10_x86: vi and ex patch
121096-05  GNOME 2.6.0_x86: GNOME EXIF tag parsing library for digital cameras
121212-02  SunOS 5.10_x86: Sun Java Web Console (Lockhart) Patch
121300-03  SunOS 5.10_x86: caplib patch
121309-20  Obsoleted by: 121309-21 SunOS 5.10_x86: Solaris Management Console Patch
121429-15  SunOS 5.10_x86: Live Upgrade Zones Support Patch
121607-04  GNOME 2.6.0_x86: Python patch
122260-10  SunOS 5.10_x86: SunFreeware GNU ESP Ghostscript Patch
122471-03  Obsoleted by: 122471-04 GNOME 2.6.0_x86: GNOME Java Help Patch
122655-05  SunOS 5.10_x86: jumpstart and live upgrade compliance patch
122755-01  SunOS 5.10_x86: libexacct.so.1 fma patch
122912-37  SunOS 5.10_x86: Apache 1.3 Patch
123004-04  SunOS 5.10_x86: SAM module patch
124187-07  Obsoleted by: 124187-08 SunOS 5.10_x86: SCN Base cacao module patch
123631-03  Obsoleted by: 123631-04 SunOS 5.10_x86: HTTP proxy settings patch
123006-07  Obsoleted by: 123006-08 SunOS 5.10_x86: Basic Registration Update
123527-01  Obsoleted by: 148874-02 SunOS 5.10_x86: libcurses patch
123591-12  SunOS 5.10_x86: PostgresSQL patch
123614-02  X11 6.6.2_x86: OpenGL patch
123896-79  Obsoleted by: 123896-80 SunOS 5.9_x86 5.10_x86: Common Agent Container (cacao) runtime 2.4.7.0 upgrade patch 79
123939-05  GNOME 2.6.0_x86: GNU Transport Layer Security Library Patch
124326-01  SunOS 5.10_x86: rcm modules patch
124394-14  CDE 1.6_x86: CDE environment patch
124398-02  CDE 1.6_x86: libDtWidget patch
124458-02  Obsoleted by: 124458-03 X11 6.6.2_x86: xdm patch
124631-42  Obsoleted by: 124631-43 SunOS 5.10_x86: System Administration Applications, Network, and Core Libraries Patch
124939-05  SunOS 5.10 5.10_x86: JDMK 5.1 patch
124998-01  SunOS 5.10_x86: /usr/bin/tip patch
125076-01  SunOS 5.10_x86: svc-volfs patch
125216-08  SunOS 5.10_x86: wget patch
125333-23  JDS 3_x86: Macromedia Flash Player Plugin Patch
125534-17  Obsoleted by: 125534-18 GNOME 2.6.0_x86: Trusted Extension Runtime Patch
125671-04  SunOS 5.10_x86: Sun x8 10G/1G Ethernet Adapter 1.0 driver patch
125720-71  X11 6.8.0_x86: Xorg server patch
125726-03  X11 6.6.2_x86: xinerama patch
125732-15  SunOS 5.10_x86: XML and XSLT libraries patch
125907-02  SunOS 5.10_x86: pcn driver patch
126120-02  CDE 1.6_x86: sys-suspend patch
126207-13  SunOS 5.10_x86: zebra ripd quagga patch
126364-10  SunOS 5.10_x86: X Window System changes - Solaris Trusted Extensions
126426-01  SunOS 5.10_x86: fsckall patch
126441-01  Obsoleted by: 126441-02 SunOS 5.10_x86: rm patch
126547-10  SunOS 5.10_x86: bash patch
126631-06  Obsoleted by: 126631-07 SunOS 5.10_x86: tcsh patch
126869-06  SunOS 5.10_x86: SunFreeware bzip2 patch
127764-01  Obsoleted by: 148109-01 SunOS 5.10_x86: libtsol patch
127873-02  SunOS 5.10_x86: mailx patch
128293-01  SunOS 5.10_x86: rsm patch
128311-01  SunOS 5.10_x86: hsfs patch
128333-01  SunOS 5.10_x86: conskbd patch
128339-02  SunOS 5.10_x86: biosint patch
128412-01  SunOS 5.10_x86: vuidm patch
136715-01  SunOS 5.10_x86: sysevent_conf_mod.so patch
136883-10  SunOS 5.10_x86: ImageMagick patch
136894-02  SunOS 5.10_x86: runacct patch
136999-10  SunOS 5.10_x86: PostgreSQL 8.2 core patch
137001-08  SunOS 5.10_x86: PostgreSQL 8.2 documentation patch
137005-09  SunOS 5.10_x86: PostgreSQL 8.2 source code patch
137033-01  SunOS 5.10_x86: namefs patch
137081-11  Obsoleted by: 137081-12 SunOS 5.10_x86: libpng Patch
137094-01  SunOS 5.10_x86: logindevperm patch
137098-02  SunOS 5.10_x86: inetd-upgrade patch
137103-01  SunOS 5.10_x86: flowacct patch
137116-01  SunOS 5.10_x86: SUNWcsr/postinstall patch
137148-08  SunOS 5.10_x86: libexpat patch
137283-01  SunOS 5.10_x86: intpexec patch
137322-04  SunOS 5.10_x86: p7zip patch
137872-02  SunOS 5.10_x86: tk patch
138088-01  SunOS 5.10_x86: audit_binfile.so.1 patch
138097-02  SunOS 5.10_x86: syslogd patch
138182-01  SunOS 5.10_x86: ike.preshared patch
138194-04  Service Tags 1.0: patch for Solaris 10_x86
138246-01  SunOS 5.10_x86: nss_compat patch
138248-01  Obsoleted by: 148382-02 SunOS 5.10_x86: cdrw patch
138266-01  Obsoleted by: 147011-01 SunOS 5.10_x86: picld patch
138353-06  X11 6.6.2_x86: fontconfig patch
138362-01  Obsoleted by: 138362-02 SunOS 5.10_x86: snmpXdmid patch
138633-01  SunOS 5.10_x86: SUNW_md_link.so patch
138648-01  SunOS 5.10_x86: /usr/bin/dircmp patch
138650-01  SunOS 5.10_x86: i.renamenew r.renamenew patch
138767-01  SunOS 5.10_x86: ldap-client manifest patch
138823-12  SunOS 5.10_x86: PostgreSQL 8.3 documentation patch
138825-12  SunOS 5.10_x86: PostgreSQL 8.3 source code patch
138827-12  SunOS 5.10_x86: PostgreSQL 8.3 core patch
138853-01  SunOS 5.10_x86: postreverse patch
138855-01  Obsoleted by: 146293-01 SunOS 5.10_x86: sulogin patch
138883-01  SunOS 5.10_x86: boot-archive-update service manifest patch
139100-07  SunOS 5.10_x86: gtar patch
139290-02  SunOS 5.10_x86: pgadmin3 patch
139292-02  SunOS 5.10_x86: pgadmin3 sources patch
139616-01  SunOS 5.10_x86: Foomatic patch
139621-01  Obsoleted by: 119279-43 CDE 1.6_x86: DtHelp patch
139997-03  SunOS 5.10_x86: i.rbac and patch postinstall patch
140102-01  SunOS 5.10_x86: rpc.ypupdated patch
140456-01  Obsoleted by: 140456-02 X11 6.6.2_x86: VNC Viewer patch
140913-01  Obsoleted by: 140913-02 SunOS 5.10_x86: ufsrestore patch
141033-01  SunOS 5.10_x86: audit patch
141105-04  SunOS 5.10_x86: ZFS Administration Java Web Console Patch
141497-01  SunOS 5.10_x86: patchchk patch
141533-04  Obsoleted by: 146076-01 SunOS 5.10_x86: in.mpathd patch
141549-01  SunOS 5.10_x86: svccfg patch
141559-01  SunOS 5.10_x86: acctcom patch
141587-01  Obsoleted by: 148986-01 SunOS 5.10_x86: libgss.so.1 patch
141873-01  Obsoleted by: 142089-03 SunOS 5.10_x86: Sun Enterprise Network Array firmware and utilities Patch
141901-01  Obsoleted by: 148878-01 SunOS 5.10_x86: svc.configd patch
142050-01  Obsoleted by: 149058-01 SunOS 5.10_x86: llc2 patch
142059-01  SunOS 5.10_x86: dnet patch
142089-02  Obsoleted by: 142089-03 SunOS 5.10_x86: fp.so patch
142235-01  Obsoleted by: 148030-01 SunOS 5.10_x86: ntp.xml patch
142241-01  SunOS 5.10_x86: ntpq patch
142248-01  SunOS 5.10_x86: libpicld_pluginutil.so.1 patch
142341-02  SunOS 5.10_x86: libresolv.so.2 patch
142395-01  SunOS 5.10_x86: icmp patch
142398-02  SunOS 5.10_x86: libsasl.so.1 patch
142429-02  SunOS 5.10_x86: unshare patch
142431-01  SunOS 5.10_x86: libscf.so.1 patch
142530-02  SunOS 5.10_x86: uptime w utmp_update whodo patch
142544-01  Obsoleted by: 142544-02 SunOS 5.10_x86: svc-snmpdx libssagent.so.1 mibiisa snmpdx snmpdx.xm patch
143126-02  SunOS 5.10_x86: libsvm.so.1 patch
143318-03  GNOME 2.6.0_x86: Instant Messaging patch
143503-01  GNOME 2.6.0_x86: Trusted Extensions patch
143507-15  GNOME 2.6.0_x86: Python patch
143610-03  Obsoleted by: 143610-04 SunOS 5.10_x86: svc-iscsitgt patch
143644-08  Obsoleted by: 147439-06 SunOS 5.10_x86: libMPAPI.so libmpscsi_vhci.so libMPAPI.so.1 libmpscsi_vhci.so.1 patch
144665-01  SunOS 5.10_x86: ntptrace patch
143726-14  SunOS 5.10_x86: SunFreeware ntp patch
143732-01  SunOS 5.10_x86: libaudiofile patch
143734-01  Obsoleted by: 143734-03 CDE 1.6_x86: ToolTalk RPC patch
143740-01  SunOS 5.10_x86: Gedit patch
143913-01  SunOS 5.10_x86: ucode driver patch
143955-04  Obsoleted by: 149278-01 SunOS 5.10_x86: mpxio-upgrade patch
144048-01  SunOS 5.10_x86: traceroute patch
144107-01  Obsoleted by: 144181-02 SunOS 5.10_x86: usr/lib/nfs/nfslogd patch
144189-02  SunOS 5.10_x86: emlxs patch
144230-02  X11 6.6.2_x86: libpixman patch
144326-01  Obsoleted by: 144326-02 SunOS 5.10_x86: Resource Management User Interface Patch
144328-02  SunOS 5.10_x86: Solaris Product Registry Patch
144456-01  Obsoleted by: 143963-02 SunOS 5.10_x86: audit_syslog.so.1 patch
144461-02  Obsoleted by: 148872-01 SunOS 5.10_x86: scsi.so.1 patch
144493-01  Obsoleted by: 144743-02 SunOS 5.10_x86: JPool.jar patch
144570-01  Obsoleted by: 148224-02 SunOS 5.10_x86: zonecfg patch
144675-02  SunOS 5.10_x86: GNU patch patch
144751-01  SunOS 5.10_x86: iprb patch
147003-01  SunOS 5.10_x86: libxnet.so patch
144873-03  SunOS 5.10_x86: ifconfig patch
144910-03  Obsoleted by: 147802-02 SunOS 5.10_x86: yp method ldap patch
144912-02  Obsoleted by: 148238-01 SunOS 5.10_x86: vold patch
144995-02  Obsoleted by: 144995-03 SunOS 5.10_x86: Ant patch
144997-02  Obsoleted by: 144995-03 SunOS 5.10_x86: Ant source patch
145007-09  SunOS 5.10_x86: Webmin patch
145070-02  X11 6.6.2_x86: xlock patch
147218-04  SunOS 5.10_x86: SUNWdbus-bindings-priv patch
145081-14  SunOS 5.10_x86: Firefox patch
145097-03  Obsoleted by: 149623-01 SunOS 5.10_x86: oce driver patch
145121-01  SunOS 5.10_x86: auditd.xml patch
145201-13  Obsoleted by: 145201-14 SunOS 5.10_x86: Thunderbird patch
145649-03  Obsoleted by: 145649-04 SunOS 5.10_x86: qlge driver Patch
145930-08  Obsoleted by: 145930-09 SunOS 5.10_x86: igb Patch
147144-17  SunOS 5.10_x86: iSCSI patch
146289-03  SunOS 5.10_x86: dcfs patch
146335-01  Obsoleted by: 146467-02 SunOS 5.10_x86: zlogin patch
146488-02  SunOS 5.10_x86: uuencode patch
146674-01  SunOS 5.10_x86: auth_attr prof_attr patch
146680-01  SunOS 5.10_x86: hxge patch
146682-02  Obsoleted by: 147800-03 SunOS 5.10_x86: arp patch
146695-02  Obsoleted by: 146695-03 SunOS 5.10_x86: cron patch
146955-03  Obsoleted by: 146955-04 SunOS 5.10_x86: routed patch
147160-01  SunOS 5.10_x86: ata patch
147220-01  SunOS 5.10_x86: libgphoto2.so.2.0.3 patch
147228-01  X11 6.6.2_x86: xrdb patch
147273-01  SunOS 5.10_x86: encrypt/decrypt patch
147274-01  Obsoleted by: 147274-02 SunOS 5.10_x86: ntxn patch
147379-01  Obsoleted by: 147379-02 SunOS 5.10_x86: zip patch
147674-11  SunOS 5.10_x86: Oracle Java Web Console 3.1 Patch
147794-23  SunOS 5.10_x86: Kerberos patch
147798-04  Obsoleted by: 147798-05 SunOS 5.10_x86: prstat patch
147806-01  Obsoleted by: 149062-02 SunOS 5.10_x86: tl patch
147993-10  SunOS 5.10_x86: Pidgin patch
148003-01  SunOS 5.10_x86: libdbus-1.so.3.4.2 patch
148005-01  SunOS 5.10_x86: libpixbufloader-gif.so patch
148007-01  SunOS 5.10_x86: libogg and libvorbis patch
148028-03  Obsoleted by: 148028-04 SunOS 5.10_x86: compress cp cpio ln mv pack pax tar patch
148032-05  SunOS 5.10_x86: klmmod patch
148050-04  Obsoleted by: 148050-05 SunOS 5.10_x86: pam_authtok_check patch
148076-18  Obsoleted by: 148076-19 SunOS 5.10_x86: md patch
148105-29  Obsoleted by: 148105-31 SunOS 5.10_x86: last, ssh/sshd patch
148113-02  SunOS 5.10_x86: root_archive patch
148136-01  Obsoleted by: 149396-01 SunVTS 7.0_x86: Patch Set 14 consolidation patch
148166-02  Obsoleted by: 148166-03 SunOS 5.10_x86: password policy migration patch
148242-08  SunOS 5.10_x86: statd patch
150313-06  Obsoleted by: 150313-07 SunOS 5.10_x86: iscsi patch
148310-10  Obsoleted by: 148310-11 SunOS 5.10_x86: dhcp patch
148323-13  Obsoleted by: 148323-14 SunOS 5.10_x86: ixgbe patch
148329-04  Obsoleted by: 148329-05 SunOS 5.10_x86: dladm patch
148380-15  Obsoleted by: 148380-16 SunOS 5.10_x86: ippool patch
148384-01  SunOS 5.10_x86: IPv6 patch
148386-02  SunOS 5.10_x86: zonecfg libraries patch
148404-01  SunOS 5.10_x86: strmod/spppcomp patch
148408-01  Obsoleted by: 149172-02 SunOS 5.10_x86: mount patch
148420-04  SunOS 5.10_x86: nss_dns patch
148424-01  SunOS 5.10_x86: /usr/ccs/bin/error patch
148552-05  SunOS 5.10_x86: autofs patch
148560-26  SunOS 5.10_x86: timezone patch
148562-12  SunOS 5.10_x86: Perl patch
148564-08  Obsoleted by: 148564-09 SunOS 5.10_x86: nxge patch
148566-01  SunOS 5.10_x86: fdformat patch
148626-01  SunOS 5.10_x86: in.tnamed patch
148628-02  SunOS 5.10_x86: rmformat patch
148658-01  SunOS 5.10_x86: telnet patch
148692-02  SunOS 5.10_x86: fcsm patch
148694-01  SunOS 5.10_x86: pam_unix_cred patch
148769-02  SunOS 5.10_x86: calendar diff3 spell uupick patch
148871-01  SunOS 5.10_x86: mailx.rc patch
148882-03  SunOS 5.10_x86: xntpd patch
150436-01  Obsoleted by: 150436-02 SunOS 5.10_x86: place holder Patch
148889-05  SunOS 5.10_x86: kernel patch
148949-01  SunOS 5.10_x86: bsmconv bsmunconv patch
148955-01  SunOS 5.10_x86: lx_init_zone patch
148976-01  SunOS 5.10_x86: in.rexecd patch
149068-01  SunOS 5.10_x86: SunFreeware GNU grep
149072-01  SunOS 5.10_x86: Texinfo patch
149076-01  SunOS 5.10_x86: pstools patch
149109-01  SunOS 5.10_x86: libgsf-1.so.1.8.2 patch
149113-01  Obsoleted by: 149113-02 SunOS 5.10_x86: libglib-2.0.so.0.1800.3 patch
149150-01  SunOS 5.10_x86: LP Alerts Patch
149164-01  SunOS 5.10_x86: rlmod patch
149166-01  SunOS 5.10_x86: timod patch
150120-06  Obsoleted by: 150120-07 SunOS 5.10_x86: kssl patch
150401-70  SunOS 5.10_x86: Kernel Patch
149174-08  Obsoleted by: 149174-09 SunOS 5.10_x86: emlxs/fp driver patch
149176-13  SunOS 5.10_x86: qlc patch
149218-03  SunOS 5.10_x86: zones resource controls patch
121082-08  SunOS 5.10_x86: Connected Customer Agents 1.1.0
149454-02  SunOS 5.10_x86: CCR Update
149484-01  SunOS 5.10_x86: Foomatic patch
149497-02  SunOS 5.10_x86: pppd patch
149639-02  Obsoleted by: 149639-03 SunOS 5.10_x86: USB patch
149647-02  Obsoleted by: 149647-03 SunOS 5.10_x86: nscd patch
150122-04  SunOS 5.10_x86: audit_event patch
150124-01  Obsoleted by: 150124-02 SunOS 5.10_x86: sharefs patch
150158-01  SunOS 5.10_x86: RPC patch
150174-01  Obsoleted by: 150174-02 SunOS 5.10_x86: printer patch
150378-07  SunOS 5.10_x86: LDAP Patch
150380-02  SunOS 5.10_x86: automountd Patch
150437-03  SunOS 5.10_x86: wanboot server patch
150533-02  Obsoleted by: 150533-03 SunOS 5.10_x86: grub patch
150540-01  SunOS 5.10_x86: ip-transport.so patch
150546-02  SunOS 5.10_x86: pam_ldap.so.1 patch
150617-03  SunOS 5.10_x86: Evince Patch
150619-02  Obsoleted by: 150619-03 SunOS 5.10_x86: OCM Patch
150833-12  Obsoleted by: 150833-13 SunOS 5.10_x86: ufs patch
150837-01  Obsoleted by: 150837-02 SunOS 5.10_x86: keyserv patch
150913-03  SunOS 5.10_x86: fabric-xlate.so PCIEX.dict patch
151075-06  SunOS 5.10_x86: sendmail patch
151562-01  SunOS 5.10_x86: libshare_nfs.so.1 patch
151616-05  Obsoleted by: 151616-06 SunOS 5.10_x86: fcp patch
151718-01  Obsoleted by: 151718-02 SunOS 5.10_x86: zsh patch
151720-01  SunOS 5.10_x86: zsh source patch
151722-01  GNOME 2.6.0_x86: GDK-PixBuf library Patch
151724-01  GNOME 2.6.0_x86: word-list-compress Patch
151915-07  SunOS 5.10_x86: OpenSSL 0.9.7 patch
152084-01  SunOS 5.10_x86: wscons patch
152249-02  SunOS 5.10_x86: rsync Patch
152253-05  SunOS 5.10_x86: sudo Patch
152261-04  SunOS 5.10_x86: libnsl patch
152265-02  SunOS 5.10_x86: rpcbind patch
152364-01  SunOS 5.10_x86: tem patch
152368-03  SunOS 5.10_x86: libpicltree patch
152507-01  SunOS 5.10_x86: elfexec patch
152511-11  SunOS 5.10_x86: Tomcat 8 patch
152515-02  Obsoleted by: 152515-04 SunOS 5.10_x86: Tomcat 6 Patch
152644-17  SunOS 5.10_x86: Apache 2.4 Patch
152648-01  SunOS 5.10_x86: nfsmapid patch
152650-02  CDE 1.6_x86: dtappgather patch
152652-01  GNOME 2.6.0_x86: libgdk-x11-2.0.so patch
152725-02  GNOME 2.6.0_x86: libgdk-pixbuf-2.0.so patch
152830-01  SunOS 5.10_x86: nfs_dlboot patch
152921-11  JavaSE 6_x86: update 211 patch (equivalent to JDK 6u211)
152922-11  JavaSE 6_x86: update 211 patch (equivalent to JDK 6u211), 64bit
152960-01  SunOS 5.10_x86: ndp patch
153057-01  SunOS 5.10_x86: mountall patch
153061-02  CDE 1.6_x86: patch dtprintinfo patch
153075-01  SunOS 5.10_x86: libpam.so patch
153092-01  SunOS 5.10_x86: a2ps patch
153101-03  SunOS 5.10_x86: Install and Patch Utilities Patch
153154-07  SunOS 5.10_x86: kernel patch
153173-01  SunOS 5.10_x86: Patch for the Japanese era update
153262-51  JavaSE 7_x86: update 351 patch (equivalent to JDK 7u351)
153263-51  JavaSE 7_x86: update 351 patch (equivalent to JDK 7u351), 64bit
153340-01  JavaSE 8_x86: update 401 patch (equivalent to JDK 8u401), 64bit


Extra Patches:

The patchset contains the following patches which are themselves obsoleted by
other patches in the patchset. These patches are required to ensure correct
installation of the patchset on Solaris 10 11/06 (Update 3) and earlier Solaris
10 Updates. The obsolete patches will only be applied to those systems where
they are necessary, they will not be applied if the system is already at a
higher patch level.

Patch      Reason
118844-20: This kernel patch must be active to ensure compatibility with
           library changes provided in subsequent patches.
122661-08: Obsolete patch required by 125548-02. 125548-02 is the zoneadm
           indirect dependency patch, which is needed to resolve an issue
           applying kernel patch 120012-14 on a system with zones support. See
           CR 6471974.
124205-05: Obsolete patch required by 122661-08.


The patchset contains the following patches for Unbundled Software Products (ie.
add on products that are not part of a default Solaris 10 installation). Patches
for Unbundled Products are included in the patchset only if their use is
required to avoid critical OS problems. These patches will only be applied to
systems where the associated Unbundled Product is installed.

Patch      Reason
121182-05: Patch is required to avoid a kernel panic caused by an
           incompatibility between Sun Trunking Utility and GigaSwift Ethernet
           drivers (see MOS article 1000555.1).


Live Upgrade patch 121431-XX is included in the patches/ directory of the
patchset, but this patch will not be applied during patchset installation. The
decision to apply the Live Upgrade patch is left to the user, this is done to
accommodate users who wish to independently manage the version of the Live
Upgrade patch on their system. Where a user wishes to apply the Live Upgrade
patch, this needs to be done manually with the patchadd command.


Patches for removed products:

Certain products that are components of earlier Solaris 10 Updates were removed
from Solaris 10 as it evolved. Patches for removed products are not relevant to
later solaris 10 Updates, and therefore have been excluded from this patchset.
The excluded patches are listed below, to allow a user to determine if any are
applicable to products that may still be installed on their systems.

Patch      Product
120186     StarOffice 8
125542-06  Mozilla 1.7 Thunderbird email client
125540-06  Mozilla 1.7 Firefox Web browser
122959-06  RealPlayer media application


IMPORTANT NOTES AND WARNINGS:
-----------------------------

KNOWN ISSUES:

When installing the patchset to an inactive boot environment, the install script
may abort with the following message:

ERROR: Failed to determine zone configuration for target boot environment. 
Please verify configuration with zoneadm(1M).

This will occur when the /etc/zones/index file of the inactive boot environment
specifies an invalid state for the global zone. The correct state is
'installed', however the state may have been incorrectly changed to 'configured'
as a consequence of CR 6804076. To confirm whether the issue exists, mount the
inactive boot environment and run the following command:

# grep "^global:configured:" <inactive-BE-mount-point>/etc/zones/index
global:configured:/
# 

The issue exists if the grep command outputs a line as above.

To resolve the issue, first make a backup copy of /etc/zones/index in the
inactive boot environment, then manually edit /etc/zones/index in the inactive
boot environment and correct the entry for the global zone by replacing
'configured' with 'installed'.


PATCHSET SIZE:

This patchset is delivered as a single zip file. The size of this file is
approximately 2.1G. In uncompressed form, the size of the patchset is
approximately 5.7G.


FILESYSTEM FREE SPACE REQUIREMENTS:

It is difficult to give a precise estimate of how much free disk space is
required to install the patchset. The amount of free space required depends on
many factors. The following factors all increase the amount of space needed:

- The Solaris 10 Update onto which the patchset is being installed.
  A Solaris 10 3/05 ("FCS") system will require considerably more free space
  than a system running the latest Solaris 10 Update.

- Whether zones are installed or not.
  The nature of the zones is important. Each whole root non-global zone will
  require approximately the same amount of free space as the global zone, while
  each sparse root non-global zone will require much less space on the
  filesystems where the zone resides.

- Whether the patchset is installed with the "save" feature disabled.
  It is strongly recommended to use the default "save" feature when installing
  the patchset even though this requires more disk space. It allows the patches
  that are applied to be removed in case any issues are found post installation.
  Disabling the "save" feature with the "-d" flag (described below) will reduce
  the amount of disk space needed, however this is not the recommended way of
  installing the patchset.

As a guide, the free space required to install this patchset using the default
"save" feature to an unpatched Solaris 10 FCS system with the entire
distribution plus OEM support metacluster is approximately 2.2G. Each whole root
non-global zone would need approximately the same amount of space free in the
filesystem that contains the zone's root.

The install script will check that sufficient space is free before applying each
patch. The script will stop if it estimates there is not enough free space
available, and will provide instructions on how to override space checking
should the user wish to continue patchset installation anyway.

The backout data for patches applied using patchadd's default save mode is
stored under the /var/sadm/pkg directory in the target system. The amount of
backout data stored builds up as more patches are applied to the system. If the
filesystem on which the /var/sadm/pkg directory resides becomes low on free
space, MOS article 1005804.1 'Solaris[TM]: Recovering Space Used for Saved
Backout Data from Patches' describes a number of options for increasing the
amount of free space available. This article is available from:

https://support.oracle.com/CSP/main/article?cmd=show&type=NOT&doctype=HOWTO&id=1005804.1


SYSTEMS WITH LIMITED DISK SPACE SHOULD *NOT* INSTALL PATCHES:

Whether you use the default "save" feature to store backout data or not, the
patch application process still requires disk space for installation and
administrative tasks. The disk space is needed in filesystems where patches
deliver payload. The exact amount of space depends on the system's architecture,
the software packages already installed, and the difference in size of the
patched objects.

In case a problem occurs, ensure a recent full system backup is available.


SAVE AND BACKOUT OPTIONS:

By default, the install script uses the patchadd command's default save mode to
save a copy of the objects being patched. This is the recommended option.
Patches can only be removed and the original objects restored if the default
"save" feature is used when installing this patchset.

You can override the "save" feature by using the "-d" flag when executing the
install script. Using the "-d" flag means that you will not be able to backout
the patches. This would be problematic if ever there was a need to remove a
patch, therefore use of the "-d" flag is not the recommended option.


BOOTING OF NEWLY CREATED NON-GLOBAL ZONES:

Newly created non-global zones can fail to boot for a short period (~5 minutes)
immediately after having been installed. This problem will typically affect
systems running Solaris 10 11/06 (Update 3) and earlier Solaris 10 Updates,
where this patchset has been installed but patch 121429-13 (or higher), and
required patch 121431-16 (or higher) have not been applied - please refer to the
note on patch 121431 in the Extra Patches section above. Resolution is to either
manually apply these patches before creating a new non-global zone, or to wait
for a sufficient period before booting a newly created non-global zone.


SPECIAL INSTALL INSTRUCTIONS:

As with any patch individually applied, there might be additional Special
Install Instructions. These instructions are documented in the individual patch
README file. To determine if any additional installation steps are necessary,
it is recommended to read each patch README before installing this patchset.


A PATCH MAY NOT BE APPLIED:

Some of the patches in the patchset will not apply on particular systems. The
following are examples of when a patch might not apply. These situations are
nominal and are not a cause for concern.

The patch may be one of the obsolete or Unbundled Software Product patches
listed in the "PATCHES INCLUDED" section.

The patch might patch packages that:

- Are only installed on specific hardware.

- Were introduced in a later Solaris 10 Update than the Solaris 10 Update
  installed on the target system.

- Are not present in the installation Software Group (metacluster) that was
  installed on the target system.

- Have been deliberately removed from the target system during system hardening.

The patchadd command recognises packages that already have a patch applied and
will only apply a patch to those packages which aren't already patched.
Therefore, if a patch patches several packages and only some of them are present
on the target system, then those packages present are patched. If other packages
are installed on the system at a later date, then patches for those packages
need to be reapplied.


OLDER VERSIONS OF PATCHES ALREADY APPLIED:

Backing out older revisions of patches provided in the patchset is not required
for the newer revision to be applied. If the patchset is installed using the
default "save" feature, then the patchadd command will save off the preexisting
objects. If a patch is subsequently removed, the objects will be restored to the
prior patch level.


INSTALL INSTRUCTIONS:
---------------------

This patchset can be installed on the active boot environment, or to an inactive
boot environment using either the "-B" Live Upgrade flag, or the "-R" alternate
root flag. The "-R" alternate root flag can be used to patch alternate boot
environments that have been created manually and not necessarily via Live
Upgrade.

Patching an inactive boot environment is recommended, because the downtime
associated with patching is reduced and there's a simple fallback option if
needed: reboot back into the original boot environment. Patching an inactive
boot environment removes the need to follow a significant number of Special
Install Instructions that would be required if you patched the active boot
environment.

If the patchset is installed to an inactive boot environment then some patches
may need to be applied to the active boot environment initially. Further details
of this requirement are given in the appropriate sections below.

Specific details for the three install methods are given in the following
sections. General installation instructions applicable to all methods are given
in the "PATCHSET INSTALLATION INSTRUCTIONS" section.



I. Installing this Patchset to a Live Upgrade Boot Environment

Before installing this patchset to an inactive Live Upgrade boot environment, it
is important those patches necessary to ensure the correct functioning of Live
Upgrade are applied to the required boot environments.

If the intent is use of Live Upgrade on a system running Solaris 10 8/07 (Update
4) or an earlier Solaris 10 Update, then it is recommended to install the Live
Upgrade Starter Patchset for Solaris 10. Installing the LU Starter Patchset will
provide the system with a level of functionality sufficient to enable use of
Live Upgrade. The LU Starter Patchset can be located with the patch search
facility under the 'Patches & Updates' tab on MOS.

If the intent is use of Live Upgrade on a system running Solaris 10 5/08 (Update
5) or a later Solaris 10 Update, then the list of required patches can be found
in MOS article 1004881.1 'Solaris[TM] Live Upgrade Software: Patch
Requirements', available from:

https://support.oracle.com/CSP/main/article?cmd=show&type=NOT&doctype=HOWTO&id=1004881.1

It is generally recommended to review article 1004881.1 before installing this
patchset to an inactive Live Upgrade boot environment. The article provides the
most current information on those patches necessary to ensure the correct
functioning of Live Upgrade on various different system configurations.

When installing this patchset to an inactive Live Upgrade boot environment, the
install script may stop and notify the user of the need to invoke the script
with the "--apply-prereq" flag to ensure appropriate levels of various patches
(including the patch utility patches) are applied to the running system. The
patchset will not install to an inactive boot environment if the running system
does not have these patches applied.

There is no need to bring the running system to single-user mode when installing
this patchset to an inactive Live Upgrade boot environment.

A discussion of how to use Live Upgrade to create and manage boot environments
is outside the scope of this document. The install script accompanying this
patchset will not create Live Upgrade boot environments. For information on how
to use Live Upgrade please see document "Solaris 10 Installation Guide: Solaris
Live Upgrade and Upgrade Planning.", available from:

http://download.oracle.com/docs/cd/E18752_01/html/821-1910/index.html

The following command installs this patchset to an inactive boot environment
that was previously created with Live Upgrade:

	./installpatchset -B <inactive-BE-name>

For example, to install the patchset to an inactive boot environment named
'second_disk', the following command would be run:

# lustatus
Boot Environment           Is       Active Active    Can    Copy
Name                       Complete Now    On Reboot Delete Status
-------------------------- -------- ------ --------- ------ ----------
first_disk                 yes      yes    yes       no     -
second_disk                yes      no     no        yes    -

# ./installpatchset -B second_disk



II. Installing this Patchset to an Alternate Root

This patchset can be installed to an arbitrary alternate root. This method
of installation is not recommended for general users, it is provided for
advanced users who recognise situations where this method of installation is
beneficial, and have a thorough understanding of the additional complexities
involved in setting up the alternate root.

When installing this patchset to an alternate root, the install script may stop
and notify the user of the need to invoke the script with the "--apply-prereq"
flag to ensure appropriate levels of various patches (including the patch
utility patches) are applied to the running system. The patchset will not
install to an alternate root if the running system does not have these patches
applied.

There is no need to bring the running system to single-user mode when installing
this patchset to an alternate root.

The following command installs this patchset to an alternate root:

        ./installpatchset -R <alternate-root-path>

For example, if an alternate boot environment has its root and all subordinate
file systems mounted under /mnt/altroot, the following command would be run:

# ./installpatchset -R /mnt/altroot



III. Installing this Patchset to the Active Boot Environment

Patching an inactive boot environment using either the "-B" Live Upgrade flag,
or the "-R" alternate root flag is recommended over patching the active boot
environment.

The following special warnings apply if this patchset is applied to the active
boot environment:


1. SINGLE USER MODE
Ideally the installation should be performed in single-user mode (run level S),
although this in not a strict requirement.

Depending on system configuration, it may be necessary to mount local
filesystems before installing this patchset (for example, if a system
configuration has zone roots on a local filesystem that is not mounted in
single-user mode). In most cases, onlining the filesystem/local service will
be sufficient to ensure the required filesystems are mounted. This can be
accomplished by running the following command:

# svcadm enable svc:/system/filesystem/local:default

Note that the install script may abort during the setup phase with an indefinite
error message if the required filesystems are not mounted. The exact error 
messaging can vary from one system configuration to another - for illustrative
purposes one example of such messaging follows:

# ./installpatchset

Setup .zoneadm: /export/zones/z1s: No such file or directory
could not verify zonepath /export/zones/z1s because of the above errors.
zoneadm: zone z1s failed to verify


ERROR: Zone verification failed : unable to mount zone 'z1s'.
# 

Should this problem occur, ensure local filesystems are mounted then reinvoke
the install script.


2. REBOOTS
Some patches specify in their README file that an immediate reboot or
reconfiguration reboot ('reboot -- -r') is required when they are applied to
an active boot environment. Generally, it is possible to complete patching
operations before initiating the reboot, but normal production operations should
not be resumed until the reboot is performed. In the rare case where it is not
possible to continue patching operations, the specific patches involved will
contain logic that prevents further patching operations until a reboot is
performed. For further information, please see MOS article 1019921.1 'Definitive
interpretation of the "rebootimmediate" and "reconfigimmediate" patch flags',
available from:

https://support.oracle.com/CSP/main/article?cmd=show&type=NOT&doctype=REFERENCE&id=1019921.1

The install script will stop installation of the patchset when an interim reboot
is required, and notify the user that a reboot is needed. The install script
should be reinvoked after the reboot and patchset installation will resume.
See "PATCHSET INSTALLATION INSTRUCTIONS" for details of the messages that are
displayed. The factors that determine how many reboots are necessary are
described below.

Depending on the starting patch level of the target system, up to three reboots
are needed. If the active boot environment is running a kernel at a patch level
below 118844-19, the install script needs to be invoked THREE times, with a
reboot after each invocation.

First reboot:
The first reboot is necessary to ensure a kernel at patch level 118844-19 (or
higher) is running on the active boot environment. This is required to ensure
compatibility with library changes provided in subsequent patches.

Patch 118844-20 is provided in the patchset. The first reboot brings the patch
level of the running kernel to 118844-20, which satisfies the compatibility
requirements.

Second reboot:
If the active boot environment is running a kernel at a patch level of 118844-19
or above, but below a patch level of 118855-36, the install script needs to be
invoked TWICE with a reboot after each invocation.

A reboot is necessary after applying patch 118855-36 because the patchadd
command is disabled and no further patches can be applied until the system is
rebooted. This is a safety device which is necessary due to the complexity of
installing the code changes delivered in kernel patch 118855-36 to an active
boot environment.

Kernel patch 118855-36 is the kernel patch released shortly after Solaris 10
11/06 (Update 3). This patch delivers a significant amount of code change. Some
manual steps might be required in order to safely apply this patch. Please
carefully review the Special Install Instructions in the 118855-36 patch README.

Final reboot:
A reboot is required at the end of the patchset installation to ensure all
changes are activated.


3. GRUB
The patchset installs the GNU GRand Unified Bootloader (GRUB) architecture if
the active boot environment is running at a kernel patch level below 118844-21.

Caution - please follow the specific instructions relevant to the system in:

https://support.oracle.com/CSP/main/article?cmd=show&type=NOT&doctype=ALERT&id=1000670.1

Failure to follow these instructions may result in the system failing to boot.


4. ZONES MUST BE HALTED
If the active boot environment is running a kernel at a patch level of 118855-36
or above, all native non-global zones need to be halted before the patchset can
be installed (in the output of 'zoneadm list -cv,' halted zones are shown as
being in the 'installed' state).


5. PATCHES UTILISING DEFERRED ACTIVATION PATCHING
The deferred activation patches included in the patchset are listed below:

Patch      Details
120012-14: Solaris 10 8/07 (Update 4) kernel patch.
127128-11: Solaris 10 5/08 (Update 5) kernel patch.
137138-09: Solaris 10 10/08 (Update 6) kernel patch.
139556-08: Solaris 10 5/09 (Update 7) kernel patch.
141445-09: Solaris 10 10/09 (Update 8) kernel patch.
142910-17: Solaris 10 9/10 (Update 9) kernel patch
144501-19: Solaris 10 8/11 (Update 10) kernel patch.
147148-26: Solaris 10 1/13 (Update 11) kernel patch.
148889-05: Solaris 10 kernel patch.

Please carefully review the Special Install Instructions in the README files of
these patches.

Deferred activation patching was introduced in the patch utilities prior to the
release of Solaris 10 8/07 (Update 4) as a way of ensuring system consistency
while patching an active boot environment. Patches that need to be applied in
deferred activation patching mode will have the SUNW_PATCH_SAFE_MODE parameter
set to true in their pkginfo files. Deferred activation patching utilises
loopback mounts (lofs) to mask the patched objects until a reboot is performed.
Deferred activation patching is designed to enable subsequent patches to be
applied before the reboot is initiated. If any subsequent patch directly or
indirectly requires a patch applied in deferred activation patching mode, the
patch will also automatically be applied in deferred activation patching mode
by the patchadd command. Objects updated using deferred activation patching
will be activated upon reboot of the system.

After applying patches in deferred activation patch mode, a system will have a
large number of files mounted via loop back filesystem. The df and mount
commands will show these mounted files.

For more information on deferred activation patching see:

http://download.oracle.com/docs/cd/E19253-01/817-0547/gfick/

If the target system does not already have some of the above Kernel PatchIDs
applied, please refer to the Release Notes of the corresponding Update release
on http://docs.oracle.com for relevant 'Installation Issues'.


PATCHSET INSTALLATION INSTRUCTIONS:

1. Make sure the patchset has been extracted. See "PATCHSET DESCRIPTION" section
for more details.


2. Decide if you want to save backout data so that patches can be removed at a
later date.

By default, the install script uses the patchadd command's default save mode to
save a copy of the objects being patched. This is the recommended option.
Patches can only be removed and the original objects restored if the default
"save" feature is used when installing this patchset.

You can override the "save" feature by using the "-d" flag when executing the
install script. Using the "-d" flag means that you will not be able to backout
the patches. This would be problematic if ever there was a need to remove a
patch, therefore use of the "-d" flag is not the recommended option.


3. Run the installpatchset script.

# cd 10_x86_Recommended
# ./installpatchset -h
usage: installpatchset [-d] [-h] [-R alt-root-path|-B alt-boot-env]
                       [--apply-prereq] --<passcode>

       [-d]                  -  don't save undo packages
       [-h]                  -  display this usage message
       [-B alt-boot-env]     -  specify LU boot environment as target
       [-R alt-root-path]    -  specify alternate root as target
       [--apply-prereq]      -  apply prerequisite patches only
       --<passcode>          -  passcode required for script execution

#

- The "-d" flag is explained in step 2.

- The "-B" flag is explained in section "I. Installing this Patchset to a Live
  Upgrade Boot Environment".

- The "-R" flag is explained in section "II. Installing this Patchset to an
  Alternate Root".

- The "--apply-prereq" flag is for use on the active boot environment, prior to
  installing the patchset to an inactive boot environment. It ensures at least
  the same revision (or higher) of the patch utilities patches contained in this
  patchset are applied to the running system. This is a prerequisite for
  installing the patchset to an inactive boot environment.

- The "--<passcode>" flag is a safety mechanism to ensure the README file has
  been read. The passcode can be found at the end of the "PATCHSET DESCRIPTION"
  section.


4. The progress of the install script is displayed on your terminal. The output
should look similar to the following (this is from a system on which kernel
patch 118855-36 was already applied):

# ./installpatchset --s10patchset

Setup ..........


Recommended OS Patchset Solaris 10 x86 (2013.02.13)

The patch set will complete installation in this session. No intermediate
reboots are required.

Application of patches started : 2013.02.14 10:28:36

Applying 120901-03 (  1 of 325) ... skipped
Applying 121334-04 (  2 of 325) ... skipped
Applying 119255-88 (  3 of 325) ... success
.
. <similar output omitted>
.
Applying 121082-08 (323 of 325) ... success
Applying 149454-02 (324 of 325) ... success
Applying 149484-01 (325 of 325) ... success

Application of patches finished : 2013.02.14 12:36:32


Following patches were applied :
 119255-88     120293-02     136883-03	   141587-01	 145097-03
 138216-01     120349-03     136999-10	   141873-01	 145121-01
 147062-01     120411-33     137001-08	   141901-01	 145900-08
 146956-01     120413-11     137033-01	   142050-01	 145954-06
 146055-07     120415-27     137081-07	   142059-01	 146033-05
 142252-02     120536-17     137094-01	   142089-02	 147443-01
 125556-12     120544-30     137098-02	   142235-01	 147148-26
 140797-01     120720-03     137103-01	   142241-01	 146233-20
 118668-41     120740-08     137116-01	   142248-01	 146335-01
 118669-41     120754-09     138867-02	   142341-02	 146471-08
 118778-14     120831-06     138884-01	   142395-01	 146490-06
 138218-01     121096-03     137138-09	   142398-01	 146672-10
 140861-02     121309-20     137148-07	   142429-02	 146674-01
 121119-19     121429-15     137283-01	   142431-01	 146682-02
 119060-60     121607-04     137322-02	   142530-01	 146684-01
 119116-35     122213-46     137872-02	   142544-01	 146695-02
 119118-52     122260-06     138088-01	   142912-01	 146835-02
 119214-27     122471-03     138097-02	   142934-05	 146955-03
 119247-36     122912-30     138182-01	   142910-17	 147160-01
 124629-12     123004-04     138194-04	   143126-02	 147228-01
 119253-32     124187-07     138246-01	   143318-03	 147379-01
 123612-05     123631-03     138248-01	   143503-01	 147435-01
 119281-25     123006-07     138266-01	   143507-06	 147674-04
 119279-39     123591-12     138362-01	   143514-02	 147716-04
 140900-01     123614-02     138633-01	   143610-03	 147806-01
 119314-43     123896-22     138648-01	   144527-02	 148007-01
 124189-03     123939-02     138650-01	   144501-19	 148028-03
 119316-19     124394-11     138767-01	   143644-08	 148082-02
 120200-15     124458-02     138853-01	   143732-01	 148113-02
 119535-29     124631-42     138855-01	   143734-01	 148166-02
 119539-19     124939-04     138877-01	   143740-01	 148384-01
 119549-14     125216-04     138883-01	   143913-01	 148404-01
 120273-33     125280-05     139100-04	   143955-04	 148408-01
 127756-01     125333-23     141017-01	   144048-01	 148424-01
 126424-03     125720-52     139556-08	   144107-01	 148566-01
 139521-02     125732-08     139616-01	   144189-02	 148626-01
 119758-24     126120-02     139621-01	   144326-01	 148658-01
 119765-07     126207-10     139997-03	   144328-02	 148769-01
 119784-25     126547-04     140102-01	   144456-01	 148871-01
 119811-07     126869-05     140160-03	   144461-02	 148949-01
 120461-20     127128-11     140913-01	   144487-05	 148955-01
 119813-18     127725-02     141033-01	   144493-01	 148976-01
 119901-15     127764-01     141105-04	   144557-03	 149109-01
 119907-18     127873-02     142293-01	   144570-01	 149150-01
 119964-24     128293-01     141445-09	   144751-01	 149164-01
 119967-01     128311-01     141497-01	   144910-03	 149166-01
 120095-30     128333-01     141533-04	   144912-02	 121082-08
 120202-06     128339-01     141549-01	   145007-04	 149454-02
 120285-07     128412-01     141559-01	   145020-01	 149484-01
 120287-03     136715-01

Following patches were skipped :
 Patches already applied
 120901-03     123840-04     120100-08	   119987-03	 124326-01
 121334-04     121454-02     119547-08	   120102-01	 124398-02
 119318-01     123527-01     119649-03	   120236-01	 124998-01
 121297-01     118855-36     122641-06	   121976-01	 125076-01
 113000-07     118919-21     125504-02	   120733-01	 125726-02
 117435-02     119064-01     125548-02	   121300-03	 125907-01
 118344-14     119082-25     120012-14	   122655-05	 126426-01
 118368-04     119131-33     119904-02	   122755-01	 126441-01
 121264-01     119283-01     119956-04
 Patches obsoleted by one or more patches already applied
 118844-20     124205-05     122661-08	   119369-04
 Patches not applicable to packages on the system
 121182-05     126364-08     139290-02	   145081-11	 147695-13
 121212-02     126366-16     139292-02	   145201-12	 147993-04
 125138-42     137005-09     140456-01	   145930-08	 148003-01
 125139-42     138823-11     143726-01	   146680-01	 148005-01
 125534-17     138825-11     143728-01	   147274-01	 148136-01
 125671-04     138827-11     147218-02	   147694-13	 148170-02

Installation of patch set complete. PLEASE REBOOT THE SYSTEM.

Install log files written :
  /var/sadm/install_data/s10x_rec_patchset_short_2013.02.14_10.28.36.log
  /var/sadm/install_data/s10x_rec_patchset_verbose_2013.02.14_10.28.36.log
# 


If the patchset is installed on the active boot environment, the system may
require one or more interim reboots before completing installation. If a message
similar to the following is seen during installation, reboot the system and
reinvoke the install script.


"The installation of this patch set has halted after applying patch 118855-36.
The machine must now be rebooted before further patches can be applied. Please
reboot the machine and rerun this script. For further details, see patch set
README file."


Once the system is rebooted and the install script is reinvoked, installation
of the patchset will continue.


5. If an unexpected error is encountered during the installation of this
patchset, the install script will abort. Should this occur, the error must be
investigated and the issue resolved before proceeding further. More details
about the causes of failure can be found in the log files. The following log
files are created during installation of the patchset:

/var/sadm/install_data/s10x_rec_patchset_failed_<time-stamp>.log

This log file contains patchadd output from patches that failed to apply. Review
this log file to determine why a patch failed to apply. Note that this log file
will only be created if a patch fails to apply.


/var/sadm/install_data/s10x_rec_patchset_short_<time-stamp>.log

This log file contains the same output that the install script displays on the
terminal while the patchset is installing.


/var/sadm/install_data/s10x_rec_patchset_verbose_<time-stamp>.log

This log file contains all patchadd output generated during the installation of
the patchset.


The individual patch log files can also be inspected under
/var/sadm/patch/<PatchID>/log.


If the patchset is installed either with the "-B" Live Upgrade flag, or the "-R"
alternate root flag, log files will reside in the inactive boot environment.


6. Reboot the system.

If this patchset is installed to an inactive boot environment using either the
"-B" Live Upgrade flag or the "-R" alternate root flag, then a reboot will be
needed to activate the inactive boot environment.

If the "-B" Live Upgrade flag is used, then the luactivate command will need to
be run, and either an init(1M) or a shutdown(1M) will be needed to complete
activation of the boot environment. A reboot(1M) will not complete activation of
a boot environment following an luactivate.

If the "-R" alternate root flag is used, it may be necessary to rebuild the boot
archive in the alternate root before booting the alternate root. The "-R" flag
can be used to patch an alternate root in many different contexts however, and
whether the boot archive rebuild step is necessary, not necessary, or even
undesirable very much depends on user intent and the circumstances of each
individual case. For this reason, the install script does not rebuild the boot
archive. The decision and responsibility for rebuilding the boot archive is
left to the user. Rebuilding the boot archive in an alternate root can be
accomplished by running the following command:

<alternate-root-path>/boot/solaris/bin/create_ramdisk -R <alternate-root-path>

If this patchset is installed to the active boot environment, a reboot is needed
to activate certain objects which have been patched, and to resolve potentially
inconsistent states resulting from newly patched code interacting with old code
running in memory. Normal operations should not be resumed until the reboot is
performed. Depending on the starting patch level of the target system, interim
reboots may also be required. The install script will stop installation of the
patchset when a reboot is required, and notify the user that a reboot is needed.
The install script should be reinvoked following an interim reboot.