PROBLEM: (SSRT0296U) (Patch ID: OSF410-400189C) ******** A potential security vulnerability has been discovered in BIND (Domain Name Service), where under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. DIGITAL has corrected this potential vulnerability. PROBLEM: (Patch ID: OSF410-400331B) ******** This patch allows the uusend, uustat, uucpd, and uudecode commands to work correctly when the customer builds a hashed passwd database using a non-default page file block size. PROBLEM: (QAR 56298) (Patch ID: OSF410-400408) ******** There is a problem in the Bind (Domain Name Service) patch which may cause incorrect messages to be reported from certain networking related applications and from certain networking related functions in the C runtime library. It may also cause segmentation violations in existing statically linked applications using the US english message catalog, and in dynamically linked applications using non-english message catalogs. In all cases the problem will only occur if the LANG environment variable is set. PROBLEM: (SSRT0556U, CLD HPAQ706Z3, QAR 62645, QAR 51705, QAR 67922) (Patch ID: OSF410-405552) ******** A potential security vulnerability has been discovered, where under certain circumstances users may gain unauthorized access. Compaq has corrected this potential vulnerability.