Re: [pca] patch flood
Patch 147147-26 has the Recommended flag set. I see this in the output of the pca -l missing and also pca -l missingr However, the patchdiag.xref for the same patch does NOT have the Recommended flag set. As a result, pca -l --minimal missingr does not list 147147-26. I first noticed this on Friday, and I was expecting patchdiag.xref would have been updated over the weekend. But it's the same today. Am I correct that the patchdiag.xref should have this flag set? Maybe I just need to wait until tomorrow? Neil G. Brookins Identity and Authentication Solutions - IT Global Solutions Towers Watson 1500 Market Street | Philadelphia, PA 19102 Phone: +1 215 246 6046 neil.brook...@towerswatson.commailto:neil.brook...@towerswatson.com From: pca-boun...@lists.univie.ac.at [mailto:pca-boun...@lists.univie.ac.at] On Behalf Of Don O'Malley Sent: Friday, February 08, 2013 5:09 AM To: PCA (Patch Check Advanced) Discussion Subject: Re: [pca] patch flood Hi Martin/All, Yes, the imminent release of s10u11 is what's triggering the release of these patches! The key patches are the s10u11 KU patches - 147147-26 on SPARC and 147148-26 on x86. Please take the time to read the Special Install Instructions for these patches prior to applying them to your systems to avoid any surprises. If anyone finds any issues with any of the new patches, please do post to this alias (in addition to filing a Service Request of course!) and I will follow up. I'll send on details of the s10u11 announcements to the PCA alias too in due course. Best, -Don On 02/ 8/13 09:54 AM, Martin Paul wrote: Judging from today's patch flood, it's pretty sure that Solaris 10U11 is right around the corner :) As usual, I installed all the new patches with PCA on both sparc and x86 - works fine. Users of PCA's --safe option might want to get the current development release, where I added some whitelist entries. Martin. -- [cid:image001.gif@01CE0847.3E28E210]http://www.oracle.com/ Don O'Malley Manager, Software Maintenance Engineering Revenue Product Engineering | Solaris | Hardware East Point Business Park, Dublin 3, Ireland Notice of Confidentiality This transmission contains information that may be confidential. It has been prepared for the sole and exclusive use of the intended recipient and on the basis agreed with that person. If you are not the intended recipient of the message (or authorized to receive it for the intended recipient), you should notify us immediately; you should delete it from your system and may not disclose its contents to anyone else. This e-mail has come to you from Towers Watson Delaware Inc. inline: image001.gif
[pca] patch flood
Judging from today's patch flood, it's pretty sure that Solaris 10U11 is right around the corner :) As usual, I installed all the new patches with PCA on both sparc and x86 - works fine. Users of PCA's --safe option might want to get the current development release, where I added some whitelist entries. Martin.
Re: [pca] patch flood
Hi, Am 08.02.13 10:54, schrieb Martin Paul: Judging from today's patch flood, it's pretty sure that Solaris 10U11 is right around the corner :) To see whats new in the Kernel check: https://updates.oracle.com/Orion/Services/download?type=readmearu=15949457 even though you won't find any detailed infos on the BUG ids :) (7101142 allow datasets with crypto present to be imported in Solaris 10 ) happy guessing if they backported crypto :)
Re: [pca] patch flood
Hi Martin/All, Yes, the imminent release of s10u11 is what's triggering the release of these patches! The key patches are the s10u11 KU patches - 147147-26 on SPARC and 147148-26 on x86. Please take the time to read the Special Install Instructions for these patches prior to applying them to your systems to avoid any surprises. If anyone finds any issues with any of the new patches, please do post to this alias (in addition to filing a Service Request of course!) and I will follow up. I'll send on details of the s10u11 announcements to the PCA alias too in due course. Best, -Don On 02/ 8/13 09:54 AM, Martin Paul wrote: Judging from today's patch flood, it's pretty sure that Solaris 10U11 is right around the corner :) As usual, I installed all the new patches with PCA on both sparc and x86 - works fine. Users of PCA's "--safe" option might want to get the current development release, where I added some whitelist entries. Martin. -- Don O'Malley Manager, Software Maintenance Engineering Revenue Product Engineering | Solaris | Hardware East Point Business Park, Dublin 3, Ireland
Re: [pca] patch flood
On Fri, Feb 8, 2013 at 3:54 AM, Martin Paul martin.p...@univie.ac.atwrote: Judging from today's patch flood, it's pretty sure that Solaris 10U11 is right around the corner :) As usual, I installed all the new patches with PCA on both sparc and x86 - works fine. Users of PCA's --safe option might want to get the current development release, where I added some whitelist entries. Martin. As a fyi :) 1/13 is out. http://docs.oracle.com/cd/E26505_01/html/E27003/index.html -- Gaƫl Martinez
Re: [pca] patch flood
Don Too many of the previous GA kernels were alas defective and it is not inspiring to use the initial release to be honest... Does that patch include a lot of new features ? Or is it just a big maintenance patch ? Regards Gael On Feb 8, 2013, at 4:09, Don O'Malley don.omal...@oracle.com wrote: Hi Martin/All, Yes, the imminent release of s10u11 is what's triggering the release of these patches! The key patches are the s10u11 KU patches - 147147-26 on SPARC and 147148-26 on x86. Please take the time to read the Special Install Instructions for these patches prior to applying them to your systems to avoid any surprises. If anyone finds any issues with any of the new patches, please do post to this alias (in addition to filing a Service Request of course!) and I will follow up. I'll send on details of the s10u11 announcements to the PCA alias too in due course. Best, -Don On 02/ 8/13 09:54 AM, Martin Paul wrote: Judging from today's patch flood, it's pretty sure that Solaris 10U11 is right around the corner :) As usual, I installed all the new patches with PCA on both sparc and x86 - works fine. Users of PCA's --safe option might want to get the current development release, where I added some whitelist entries. Martin. -- logo Don O'Malley Manager, Software Maintenance Engineering Revenue Product Engineering | Solaris | Hardware East Point Business Park, Dublin 3, Ireland