2    Summary of Base Operating System Patches

This chapter summarizes the base operating system patches included in Patch Kit-0008.

Table 2-1 provides a summary of patches.

Table 2-1:  Summary of Base Operating System Patches

Patch IDs Abstract

Patch 3.00

OSF440CDE-003

Patch: Security (SSRT0585U)

State: Existing

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 7.00

OSF440DX-001

Patch: dxcalendar Reminder Displays Through dxpause Screen

State: Existing

This patch fixes the problem where the dxcalendar reminder displays through the pause screen (dxpause) and remains on the top of the pause window.

Patch 8.00

OSF440-010

Patch: Fix For POP Mail Handler

State: Existing

This patch corrects the following:

  • Netscape Mail clients are unable to access their mailboxes after an initial session. The /usr/spool/pop/username.lock file is left over and must be removed manually.

  • The POP mail handler fails to properly rename its temp file after receiving a quit command.

Patch 11.00

OSF440-013

Patch: Security (SSRT0596U)

State: Existing

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 19.00

OSF440-020

Patch: Fix for yacc

State: Existing

This patch fixes a problem in yacc that causes it to generate parse tables that result in the parser not executing a user-specified error recovery action. If a yacc specification worked in Version 3.2 and no longer works in Version 4.0, this may be the problem.

Patch 36.00

OSF440-041

Patch: volrootmir -a Cmd Fails

State: Existing

This patch fixes a problem where the LSM command volrootmir -a fails if the source and target disks are not the same type.

Patch 37.00

OSF440-042

Patch: volrecover Not Returning Failed Status Code

State: Existing

This patch corrects a problem in which a failure of the volrecover utility will not return a failed status code.

Patch 38.00

OSF440-043

Patch: quotaon Returns Incorrect Error Status

State: Existing

This patch fixes a problem in which the quotaon command returned an incorrect error status if the file system did not exist.

Patch 60.00

OSF440-008

Patch: Fix for spo_misc_errors errlog Entries

State: Existing

This patch fixes the cause of the spurious spo_misc_errors errlog entry on 4100 class systems.

Patch 61.00

OSF440X11-001

Patch: Enhancement for makedepend Utility

State: Existing

This patch increases the maximum number of files that one file can depend on in the makedepend utility from 1024 to 4096.

Patch 68.00

OSF440-047B

Patch: nroff Incorrectly Translates Years After 1999

State: Existing

This patch fixes a Y2K problem with the nroff text formatter in which the years after 1999 are translated to be 19xxx with xxx being the number of years that have passed since 1900. In this case, the year 2010 displays as 19110.

Patch 75.00

OSF440-060B

Patch: chvol Read and Write Transfer Size Increased

State: Existing

This patch corrects the following:

  • AdvFS volumes were not setting the default I/O byte transfer size to the preferred size reported by the disk drives.

  • AdvFS chvol read and write transfer size range was increased.

  • The read-ahead algorithm was modified to improve performance under certain conditions.

Patch 76.00

OSF440-001

Patch: Fix for simple lock panic

State: Existing

This patch fixes a system panic with the following panic string:

simple_lock: time limit exceeded

Patch 82.00

OSF440-106

Patch: Fix for system crash

State: Existing

This patch fixes a problem in which the system was consistently crashing when the user pressed keys during the transition from firmware callback to OS console handling.

Patch 101.00

OSF440-126

Patch: Fix for prof -pixie -asm command

State: Supersedes patch OSF440-122B (202.00)

This patch corrects the following:

  • Fixes the name demangling for the tools that print symbol table names generated by the C++ V6.2 compiler. This problem will only occur for most C++ objects compiled with the ANSI options.

  • Fixes a problem where prof -pixie -asm would dump core if the executable being profiled contained extremely long symbol names.

Patch 127.00

OSF440-153

Patch: Security (SSRT0583Z)

State: Existing

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 148.00

OSF440-069

Patch: Fix for rsh hang

State: Existing

This patch fixes rsh(1) hanging forever in select().

Patch 153.00

OSF440-074

Patch: Fixes a problem within the SCSI and tape subsystems

State: Existing

This patch fixes a problem within the SCSI and tape subsystems, in which an expression was not being evaluated properly.

Patch 162.00

OSF440-083

Patch: Fix for unresolved symbol:scc_configure message

State: Existing

This patch fixes a problem in which systems that use Compaq Tru64 UNIX and install DECnet/OSI and WDD would get the following error message when attempting to build a kernel:

unresolved symbol:scc_configure

Patch 170.00

OSF440-091

Patch: Fixes a problem with the stdhosts command

State: Existing

This patch fixes a problem with the stdhosts command when the file processed has lines longer than 256 characters. The error message "stdhost:malformed line ignored" is displayed.

Patch 179.00

OSF440-192

Patch: Fix for panics on AlphaServer GS140/GS60 systems

State: Supersedes patch OSF440-002 (18.00)

This patch corrects the following:

  • Resolves corrupt EV6 binary error log entries for IOP detected UDE (Uncorrectable Data Error) packets on AlphaServer 8200/8400 platforms.

  • Fixes a problem on some AlphaServer GS140/GS60 configurations where a simple lock timeout or TB shoot ack timeout panic may occur.

Patch 182.00

OSF440CDE-010

Patch: Fix for X server color map problem

State: Existing

This patch fixes a problem where there were no available colors in the X server's color map after the CDE screen lock was displayed.

Patch 183.00

OSF440CDE-011

Patch: Security (SSRT0614U)

State: Existing

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 188.00

OSF440DX-003

Patch: Compaq SCSI SNMP sub-agent returns incorrect info

State: Existing

This patch fixes a problem that causes the Compaq SCSI SNMP subagent (cpq_mibs) to often return incorrect SCSI CD-ROM and tape devices model information, which results in invalid information displaying on the Insight Management web pages.

Patch 194.00

OSF440DX-009

Patch: Security (SSRT0612U)

State: Existing

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 196.00

OSF440X11-006

Patch: XDMCP Indirect queries do not work

State: Existing

This patch fixes a problem in the X Display Manager (xdm) where XDMCP Indirect queries do not work.

Patch 198.00

OSF440X11-008

Patch: X server crashes when viewing TIFF images

State: Existing

This patch fixes a problem where viewing certain TIFF images with an image viewer crashed the X server.

Patch 205.00

OSF440CDE-009B

Patch: Fix for dxaccounts BadPixmap error

State: Existing

This patch fixes a problem where the Account Manager application, dxaccounts, gets a "BadPixmap" error when selecting an account after the "View Preferences" "Display Icons By Name" option has been selected.

Patch 209.00

OSF440-131B

Patch: Static library fix for libclass.a

State: Existing

This patch fixes a class_admin/class_daemon problem. When a PID is added to a class it cannot be removed from the class scheduler until the process terminates or the class_scheduler has been stopped.

Patch 211.00

OSF440CDE-012

Patch: Security (SSRT0615U)

State: Existing

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 215.00

OSF440DX-012

Patch: checklist utility does not provide scroll bar

State: Existing

This patch fixes a problem where the checklist utility did not provide a scroll bar on higher resolution displays (1600x1200).

Patch 216.00

OSF440DX-013

Patch: diskconfig may display incorrectly

State: Existing

This patch fixes a problem where the Disk Configuration Manager application, diskconfig, displayed incorrectly on some non-Compaq X servers. The font used for menu items was incorrect so that the menus contained random symbols instead of text.

Patch 221.00

OSF440X11-017

Patch: Fixes problem on systems with a Powerstorm 4D10T

State: Existing

This patch fixes a problem where, on systems with a Powerstorm 4D10T (ELSA GLoria Synergy) graphics board, sometimes the X server did not draw lines correctly.

Patch 232.00

OSF440-172

Patch: Fix for lex command

State: Existing

This patch fixes a problem in lex that causes it to generate incorrect tables. This results in the lexical analyzer failing to recognize some kinds of regular expressions involving exclusive start states.

Patch 233.00

OSF440-173

Patch: Fix for ris script

State: Existing

This patch corrects the following problems with the /usr/sbin/ris script:

  • It incorrectly queried the user for a gateway to be used to serve a specific client when no gateway was required.

  • It could fail if no default route had been established.

Patch 237.00

OSF440-179

Patch: defragment incorrectly reports large free space holes

State: Supersedes patch OSF440-029 (26.00)

This patch corrects the following:

  • Fixes a problem with the defragment command, where the -V option is not being parsed properly.

  • Fixes the defragment program to properly report on extremely large (>4.3GB) free space holes. Previously it would report free space percentages larger than 100% and would add these large holes to the smallest range (<100K) instead of the largest range (>10M) where they belong.

Patch 242.00

OSF440-185

Patch: Fix for news command

State: Existing

This patch fixes a problem in which the news command fails due to the appending of additional characters to file names in the /usr/news directory.

Patch 243.00

OSF440-186

Patch: Fix for rpc.statd hang

State: Existing

This patch fixes a problem where rpc.statd hangs as it tries to notify dead remote systems.

Patch 256.00

OSF440-205

Patch: mkfdmn command does not report errors

State: Existing

This patch corrects a problem that resulted in the mkfdmn command not reporting errors if the user attempted to create a volume with a name that is more than 31 characters long.

Patch 262.00

OSF440-217

Patch: lprsetup command sets up printers incorrectly

State: Existing

This patch fixes a problem where the lprsetup command would incorrectly set up certain types of printers, such as the HP1120c, HP4000tn, or HP61.

Patch 281.00

OSF440-245

Patch: Fix for tmv2_notify_cbf problem

State: Supersedes patches OSF440-006 (53.00), OSF440-165 (226.00), OSF440-234 (273.00)

This patch corrects the following:

  • Fixes a panic that occurs when KZPSA resources are not available to re-enable a channel or a device after a bus reset. The panic string is:

    panic("(spo_process_rsp) ran out of memory!")

  • Fixes a problem with the KZPSA driver. A timer is not being canceled causing a panic with the following error message:

    xpt_callback: callback on freed CC

  • Fixes a problem in which the system can panic with the following message:

    KZPSA PANIC SPO_RET_CARRIER:CARRIER NOT IN USE

  • Fixes a problem with tmv2_notify_cbf messages being logged from KPBSA adapters and creating very large binary.errlog files in a clustered environment.

Patch 296.00

OSF440-261

Patch: Fix for compress utility

State: Existing

This patch corrects a problem with the (un)compress utility that could result in either an incomplete compressed file and loss of the original uncompressed file, or an incomplete uncompressed file and loss of the original compressed file.

Patch 297.00

OSF440-262A

Patch: Fix for voldisksetup, voldiskadd, and newfs

State: Existing

This patch fixes problems with the voldisksetup, voldiskadd, or newfs commands. Each will report device errors while checking for overlapping partitions where there is no overlap on that particular device.

Patch 299.00

OSF440-264

Patch: Fix for update installation hang

State: Existing

This patch fixes a problem in which a hang can occur during update install.

Patch 306.00

OSF440-271

Patch: Fixes Standards namespace pollution problem

State: Existing

This patch corrects some Standards namespace pollution.

Patch 308.00

OSF440-273

Patch: Corrects an NIS client problem

State: Existing

This patch corrects a problem where an NIS client has a different shell listed for an NIS user than does the server. When the users tried to change their NIS passwords, the password change failed, but the shell was updated.

Patch 313.00

OSF440-279

Patch: showfdmn may core dump

State: Existing

This patch fixes a problem in which advfs showfdmn would sometimes core dump.

Patch 315.00

OSF440-282

Patch: Fixes performance problem on LSM mirrored volumes

State: Existing

This patch fixes a performance problem for round robin sequential reads on LSM mirrored volumes.

Patch 323.00

OSF440-291

Patch: Various fixes for ALPHAVME320 systems

State: Supersedes patch OSF440-108 (84.00)

This patch corrects the following:

  • Fixes two problems on the ALPHAVME320 platform:

    • Data corruption in the VB Backplane driver.

    • No floppy support in the platform code. Following is the error message received during the boot when the floppy is configured at irq6:

      EBV16, invalid isa0 irq6

  • Fixes three problems in the existing VB VME Backplane Driver running on AlphaVMExx platforms:

    • VB VME Backplane Driver does not configure when the sysconfigtab parameter, VB_MAXNODES, is less than 10.

    • VB VME Backplane Driver hangs and the nodes lose liveness when the sysconfigtab parameter, VB_MAXNODES, is equal to 2.

    • VB VME Backplane Driver Performance is unacceptable for customer applications.

Patch 337.00

OSF440-168B

Patch: Fix for AdvFS property list handling

State: Existing

This patch corrects two problems in AdvFS property list handling:

  • Creation of property lists entries in AdvFS filesets with no available mcells will result in kernel memory fault (kmf).

  • The get_proplist_entry function (used to disassemble the property list buffer returned by the getproplist system call) returned the incorrect name length on property list names longer than 127 characters.

Patch 339.00

OSF440-262B

Patch: voldisksetup incorrectly reports device errors

State: Existing

This patch fixes problems with voldisksetup, voldiskadd, or newfs commands. Each will report device errors while checking for overlapping partitions where there is no overlap on that particular device.

Patch 341.00

OSF440CDE-018

Patch: Fixes file permission problem for trashinfo file

State: Supersedes patches OSF440CDE-005 (5.00), OSF440CDE-007 (184.00)

This patch corrects the following:

  • Fixes a problem where the CDE File Manager (dtfile) sometimes left defunct processes.

  • Fixes a problem where the Common Desktop Environment (CDE) File Manager (dtfile) did not work correctly in restricted mode.

  • Fixes a problem in which file permissions allow any user to write to the /.dt/Trash/.trashinfo file.

Patch 344.00

OSF440CDE-021

Patch: Security (SSRT0580U)

State: Supersedes patch OSF440CDE-004 (4.00)

This patch corrects the following:

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • Fixes a problem where the Common Desktop Environment (CDE) Application Manager did not recreate the list of application groups at login. After customizing the application groups, users would see the old groups instead of the new groups.

Patch 351.00

OSF440X11-021

Patch: Provides missing compose definitions

State: Supersedes patches OSF440CDE-014 (212.00), OSF440CDE-017 (340.00), OSF440X11-019 (223.00)

This patch corrects the following:

  • Adds the ISO8859-15 functionality to the main Xresource file on the system and to the specific dtlogin resource file. With these changes, X applications have ISO8859-15 locale support integrated directly into the application.

  • Adds Catalan (ISO8859-15) to the list of languages from which users can choose when logging in. The additional item identifies the Catalan Latin-9 locale, which supports the Euro currency sign.

  • Implements Xlocales definitions that allow X applications to run under the ISO8859-15 locales. Using ISO8859-15 locales allows users to enter and use newly defined ISO8859-based characters such as the Euro monetary symbol.

  • Provides missing compose definitions when in ISO8859-15 based locales for the scaron, Scaron, zcaron, and Zcaron characters.

Patch 353.00

OSF440X11-023

Patch: Fix for Turkish F keyboard problem

State: Existing

This patch fixes the Turkish F keyboard problem, where the characters Ccedilla and ccedilla cannot be entered from the keyboard directly.

Patch 358.00

OSF440X11-028

Patch: X server incorrectly includes DPSExtension

State: Existing

This patch fixes a problem where the X server would include the Adobe Display PostScript extension (Adobe-DPS-Extension, DPSExtension) in its response to a ListExtensions request even though Display PostScript is not supported in Tru64 UNIX V4.0F.

Patch 381.00

OSF440-327

Patch: Security (SSRT0624U)

State: Existing

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 390.00

OSF440-339

Patch: Prevents vold from core dumping

State: Existing

This patch prevents /sbin/vold from dumping core during an execution of a volprint or other query command.

Patch 395.00

OSF440-344

Patch: mdir command displays year 2000 date incorrectly

State: Existing

This patch fixes a problem in which the mdir command displays the date incorrectly for the year 2000.

Patch 402.00

OSF440-351

Patch: Fixes hang in shutdown process

State: Existing

This patch fixes a hang in the shutdown process ("shutdown now") of a system when a device has flow control switched off.

Patch 405.00

OSF440-354

Patch: Fixes a tftpd problem

State: Existing

This patch fxes a tftpd problem when responding to a broadcast read request, and adds the -b option to control whether to respond to any broadcasts.

Patch 406.00

OSF440-355

Patch: Fixes a kernel memory fault when using ATM

State: Supersedes patch OSF440-316 (374.00)

This patch corrects the following:

  • Fixes a problem in the ATM atm_cmm_connect API routine when trying to create a VC.

  • Fixes a kernel memory fault when using ATM.

Patch 409.00

OSF440-358

Patch: Fixes a problem with NCR810 script

State: Existing

This patch fixes a problem with the NCR810 script that can cause the KZPAA/NCR810 to hang.

Patch 420.00

OSF440-369

Patch: quotactl prototype is now POSIX compliant

State: Supersedes patch OSF440-137 (111.00)

This patch corrects the following:

  • Fixes a problem where the system can panic with a "kernel memory fault" in dqget.

  • Changes the quotactl prototype in /usr/include/ufs/quota.h to meet POSIX standards.

Patch 435.00

OSF440-385A

Patch: Adds missing prototype for stime function

State: Existing

This patch adds the missing prototype for the stime() function to <sys/time.h>, allowing C++ programs and other software to properly resolve it.

Patch 443.00

OSF440-395

Patch: Danish locale now uses all lowercase month names

State: Existing

This patch updates the Danish (da_DK.ISO8859-1) locale to use all lowercase month names.

Patch 447.00

OSF440-399

Patch: Fixes a problem with the psiop driver

State: Supersedes patch OSF440-163 (225.00)

This patch corrects the following:

  • Fixes a panic when using the scu command. When formatting a floppy using the scu command the system panics with the following error message:

    System Uncorrectable Machine Check 660 (retry set)

  • Fixes a problem with the psiop driver that causes it to fail when vdump is used. The following error is displayed:

    vdump : unable to write to device

Patch 450.00

OSF440-402

Patch: Fixes several DEC C compiler problems

State: Supersedes patches OSF440-134 (108.00), OSF440-293 (325.00)

This patch corrects the following:

  • A compiler problem that allowed the generation of EV67 (CIX) instructions to be generated when using the -arch ev6 switch.

  • A compile time performance problem with a very large (1.6 MB) array initialization.

  • An optimization problem that caused incorrect output when using a signed char in a strcpy-like routine, if compiled using -O4 or higher.

  • A compile-time error for a source line such as a = strcpy(b,c) + 7.

  • An optimizer problem that caused an unintended sign-extension in the Perl program. This caused an "op/pack" failure in test 9.

  • A compiler crash when compiling Xemacs 21.1.4 with -O4.

  • An optimizer problem in loop unrolling that suppressed intermediate updates to induction variables under certain conditions.

  • A particular short parameter assignment caused incorrect run-time result.

  • An assignment of type k = (char)(l >> 8) was not sign-extended.

  • An optimizer problem that produced incorrect code when certain bounds checking within a loop was moved outside the loop.

  • An optimizer problem that caused the wrong result when compiled at -O2, under certain conditions.

  • A virtual memory exhausted error when compiling the Open Source encryption library OpenSSL.

  • A compiler crash under certain conditions that produces an "Assertion failure: Non-Arithmetic Data Type" error.

Patch 461.00

OSF440-416

Patch: Cursor is displayed incorrectly

State: Existing

This patch fixes a problem where the cursor is displayed incorrectly when the image plane is set to 1 and the mask plane is set to 0.

Patch 469.00

OSF440X11-025B

Patch: Fix for X server interaction with X font server

State: Existing

This patch fixes various problems with the X font server and with the X server's interaction with X font servers.

Patch 470.00

OSF440X11-025C

Patch: Problem with X server interaction

State: Supersedes patch OSF440X11-003 (63.00)

This patch corrects the following:

  • Fixes a problem where the X font server (xfs) sometimes failed with a segmentation fault when it received an invalid request.

  • Fixes various problems with the X font server and with the X server's interaction with X font servers.

Patch 474.00

OSF440-385B

Patch: stime function does not compile under C++

State: Existing

This patch adds the missing prototype for the stime() function to <sys/time.h>, allowing C++ programs and other software to properly resolve it.

Patch 475.00

OSF440-425

Patch: Fixes kernel panic occuring in lockmode 4

State: Existing

This patch fixes a kernel panic seen when running Classical IP over the lfa ATM driver. This panic would only occur in lockmode 4. If not in lockmode 4, the symptom would be a CPU hang.

Patch 476.00

OSF440-411B

Patch: Performance issues on EV6 SMP machines

State: Supersedes patch OSF440-054B (71.00)

This patch corrects the following:

  • Fixes problems in the DECthreads library for Tru64 UNIX. Included in this patch are changes to support Ladebug enhancements and a bug fix for applications which employ SCS threads of different priorities.

  • Addresses performance and scalibility issues for highly contended threaded applications running on EV6 SMP machines.

Patch 478.00

OSF440-437

Patch: Fix for LAT driver

State: Existing

This patch corrects a problem in the LAT driver which caused improper processing of the ioctl TCSBRK as well as the generation of spurious <BREAK> characters when the libc routine tcdrain() was used.

Patch 480.00

OSF440-488

Patch: Extends max length of identifier for assembler

State: Supersedes patch OSF440-365 (416.00)

This patch corrects the following:

  • Resolves a problem that caused the assembler to flag any identifiers whose length exceeded 1024 characters with an assembly-time error. With this patch, such identifiers are now accepted.

  • Corrects a problem where the assembler would generate incorrect error messages for source programs that produce a mix of hand-coded and assembler-generated relocation operands.

Patch 482.00

OSF440-459

Patch: Fix for mailx problem

State: Existing

This patch corrects the problem so mailx(1) will work correctly if the -r and -s flags are used together.

Patch 507.00

OSF440-436B

Patch: NFS writes cause protocol violations

State: Existing

This patch fixes reply values for NFS writes which were causing protocol violations.

Patch 526.00

OSF440-461

Patch: Fix for kernel memory fault

State: Existing

This patch fixes a kernel memory fault that affects linear machines such as ebm30, GS160 through GS320, DS10, DS20, ES40, and XP1000.

Patch 530.00

OSF440-441

Patch: Fix for Y2K lastlogin command problem

State: Existing

This patch resolves the Y2K problem of lastlogin command incorrectly calculating the last date each user logged in.

Patch 537.00

OSF440CDE-024

Patch: Security (SSRT0600U)

State: Supersedes patches OSF440CDE-006 (6.00), OSF440CDE-008 (185.00), OSF440CDE-025 (535.00)

This patch corrects the following:

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • Fixes a problem where dtlogin may incorrectly set the permissions of /var to 775. It also fixes a problem where dtlogin may incorrectly set the umask to 002 for csh users.

  • Fixes a problem with the Common Desktop Environment (CDE) login process where, if you selected the Command Line Login option and logged in, sometimes the CDE login screen would be redisplayed before you had logged out.

  • Fixes a problem where the Common Desktop Environment (CDE) login daemon, dtlogin, core dumps occasionally when servicing requests from XDMCP clients such as X terminals or PCs running X servers.

Patch 548.00

OSF440-438

Patch: Fix for advscan

State: Existing

This patch fixes a problem where advscan -a -g does not display bootable partitions properly.

Patch 561.00

OSF440-428

Patch: Fix for system panic

State: Existing

This patch fixes a problem where encoding for the SysV Open call audit parameter was incorrect. This could cause a system panic.

Patch 567.00

OSF440-439B

Patch: Security (SSRT0642U)

State: Supersedes patches OSF440-149B (203.00), OSF440-251B (338.00), OSF440-301B (472.00), OSF440-370B (473.00), OSF440-462B (565.00)

This patch corrects the following:

  • Fixes a problem of libsecurity producing a core file when handling error conditions.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • Corrects a problem of the rsh command displaying a warning message instead of the rsh command output when C2 security is configured.

  • Fixes a problem for Enhanced Security configurations where the Maximum Login Interval (u_max_login_intvl) field was being ignored for account templates.

  • Fixes a problem when a system is configured with DECnet, C2, and NIS. When invoking edauth(8) <user_name>, the error "Must be on NIS master server to update entry for <user_name>" is returned.

Patch 592.00

OSF440-507

Patch: Fixes a problem with floppy driver

State: Supersedes patch OSF440-366 (417.00)

HP has determined in laboratory testing that there is a theoretical possibility that during read and write operations to the floppy disk on DS10, DS10L and ES40 AlphaServers and VS10 and XP900 AlphaStations, a single byte of data may be inaccurately read or written without notice to the user or system. The potential for this anomaly exists only if floppy data read and write operations are attempted while there is extremely heavy traffic on these Alpha systems' internal input/output busses. Although HP has observed the anomaly only in laboratory tests designed to create atypical system stresses, including almost constant use of the floppy disk drive, we are supplying this patch to address this potential issue.

Patch 598.00

OSF440-430

Patch: Fix for tapex utility

State: Existing

This patch fixes several problems in the tapex utility;

  • Accuracy of performance tests has been improved.

  • The tapex exit status has been corrected.

  • The tapex utility was fixed to determine eom status in Command Timeout Test and exit with non-0 status to indicate failure.

Patch 642.00

OSF440-544B

Patch: Support for activating temporary data logging

State: Supersedes patch OSF440-296 (361.00)

This patch fixes a problem in which the chfile utility returns an incorrect error code. This patch provides support for activating temporary data logging on a mount point.

Patch 646.00

OSF440DX-023

Patch: Updates Netscape Communicator to Version 4.76

State: Existing

This patch updates Netscape Communicator to Version 4.76 to fix missing default MIME types in Netscape Communicator Version 4.75.

Patch 668.00

OSF440-513

Patch: ATM setup script fails when configuring ELAN

State: Existing

This patch fixes a problem of the ATM setup script failing when configuring an elan if the lane subsystem is not loaded.

Patch 670.00

OSF440-572

Patch: Incorrect heartbeat timer in memory channel driver

State: Supersedes patches OSF440-118 (94.00), OSF440-403 (451.00)

This patch corrects the following:

  • Fixes an incorrect heartbeat timer within the memory channel driver which caused rail failures to be incorrectly reported on memory channel Version 2 cards. With the heartbeat timer set too short, the system can be erroneously led to believe a hardware failure has occurred. Messages of the form "rmerror_int: ..." are output to the messages file containing an error_type which has bit 29 set in error_type (heartbeat timeout). The binary error log will also have this data. Typically, the error_type data will be 0xe00000000. The messages are followed by the system hanging or panicing. When panicking, the following message is produced:

    panic (cpu 0): rm_failover_if_necessary, both rails bad

    A real hardware failure produces the same symptoms and stack trace. For example, having an error_type of 0xe00000002 indicates a write transmit hardware fatal failure.

  • Fixes a problem where an MC1 or 1.5 will not configure with an EV6 8x00. It also improves error handling with MC 2 in a Virtual Hub.

  • Fixes a problem in the memory channel driver which could result in panics with rm - inconsistent local spinlock structures being logged.

Patch 672.00

OSF440X11-041A

Patch: Fix for pixel problem for CDE

State: Existing

This patch fixes the problem of erroneous pixels left behind when dragging CDE application manager icons on the desktop.

Patch 676.00

OSF440-516

Patch: Fix for newgrp command

State: Existing

This patch corrects the problem where newgrp(1) fails if the file /etc/group contains multiple lines for one group.

Patch 684.00

OSF440-537

Patch: Fixes automount handling of nogrpid option

State: Supersedes patch OSF440-024 (22.00), OSF440-377 (427.00)

This patch corrects the following:

  • Fixes a problem in which the automount daemon hangs when invoked by the rsh command.

  • Prevents the message "nfscast: select: Invalid argument" message from appearing in the daemon.log when the server is not available. It also changes the "trymany: servers not responding: RPC: Unable to receive " message to an informational vs. error message.

  • Fixes the automount handling of the nogrpid option.

Patch 690.00

OSF440CDE-028A

Patch: Fix for dtpad

State: Supersedes patch OSF440CDE-009A (186.00)

This patch corrects the following:

  • Fixes a problem where the Account Manager application, dxaccounts, gets a "BadPixmap" error when selecting an account after the "View Preferences" "Display Icons By Name" option has been selected.

  • Fixes a problem where, if dtpad cannot allocate enough memory, it will exit and leave a zero-length file in place of the file being edited.

Patch 705.00

OSF440-506

Patch: fixso command may cause segmentation fault

State: Existing

This patch fixes a problem with the /usr/ucb/fixso command that can cause a segmentation fault.

Patch 707.00

OSF440-511

Patch: Fix for bindsetup problems

State: Existing

This patch fixes several problems when bindsetup is used to change hostnames.

Patch 718.00

OSF440DX-022

Patch: dop cannot find application names containing period

State: Existing

This patch fixes a problem in which dop (division of privileges) cannot find application names which contain a "." (dot) in them. For example, a name such as sysmon.csh.

Patch 725.00

OSF440-517

Patch: Security (SSRT0672U)

State: Existing

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 727.00

OSF440-575

Patch: Fix for Korn shell hang

State: Existing

This patch fixes a problem where the Korn shell (ksh) could hang if the user pasted a large number of commands to it when it was running in a terminal emulator window (such as an xterm).

Patch 729.00

OSF440X11-037

Patch: Fixes a memory leak in the X server

State: Supersedes patch OSF440X11-027 (357.00)

This patch corrects the following:

  • Fixes a problem where the X server could core dump or get unaligned access errors when clients used the Multi-Buffering extension.

  • Fixes a memory leak in the X server that could occur when a client repeatedly created and destroyed buffers for the X Window System Multibuffering Extension (XmbufCreateBuffers/XmbufDestroyBuffers).

Patch 735.00

OSF440-523

Patch: Prevents Turbolaser panic with DE600 in pci slot 0

State: Existing

This patch prevents a panic on TurboLaser systems with a DE600 in pci slot 0. Mis-identification of the DE600 in pci slot 0 causes data structure corruption.

TurboLaser systems include the following:

AlphaServer 8200
AlphaServer 8400
AlphaServer GS60
AlphaServer GS60E
AlphaServer GS140

A DE600 is a single-port 10/100 Mbps Fast Ethernet NIC.

Patch 737.00

OSF440CDE-028B

Patch: dtpad does not allocate enough memory

State: Existing

This patch fixes a problem where, if dtpad cannot allocate enough memory, it will exit and leave a zero-length file in place of the file being edited.

Patch 739.00

OSF440-564

Patch: Security (SSRT1-15, SSRT0713U)

State: Existing

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 741.00

OSF440-519

Patch: Security (SSRT0592U)

State: Supersedes patches OSF440-241 (279.00), OSF440-287 (319.00)

This patch corrects the following:

  • Fixes a problem with rdist(1) which consumes huge amounts of memory, and when there are a lot of symlinks in the fileset, it can simply fail to fully populate the remote site, or cause low-memory problems on the local machine.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • Corrects a problem in the rdist utility which was causing segmentation faults on files with more than one link.

Patch 783.00

OSF440-590B

Patch: Fix for incorrect available size for AdvFS domain

State: Supersedes patches OSF440-040 (35.00), OSF440-183 (240.00), OSF440-330 (384.00), OSF440-585B (644.00)

This patch corrects the following:

  • Allows the /sbin/advfs/verify utility to detect loops in the list of free frags kept in the frags file.

  • Avoids corruption of a file system when verify runs with -r and -f flags on an active domain. Verify returns usage message when -r flag is used with either -f or -d.

  • Fixes the following /sbin/advfs/verify command problems:

    • verify fails to complete on a large number of files.

    • verify will core dump when an offset into mountd[] array that is used to pull out the fileset name is corrupted.

    • verify incorrectly reports errors on BMTs that have multiple extent records for domains created with the mkfdmn -p switch.

    • verify fails when lseeking on very large domains.

  • Modifies AdvFS kernel code and several utilities.

  • AdvFS will no longer panic with the following error:

    ADVFS EXCEPTION : panic cpu(0) : bad frag free list

    The code is modified so that during frag allocation when AdvFS determines that the frag group header's free list has been corrupted, it stops using it and marks it BAD. It is then removed from the free list so no more allocations can take place and no deallocations are performed. The verify, shfragbf, and vfragpg programs are modified to report BAD frag groups.

  • Corrects an AdvFS problem where an on-disk variable wraps when more than 64K metadata entries are required to map the disk blocks of a file or metadata file. The side effects of this problem were data inconsistencies and an incorrect available size for the domain.

Patch 796.00

OSF440-639

Patch: Fixes a problem in latsetup

State: New

This patch fixes a problem in latsetup when the directory /dev/lat is not found.

Patch 801.00

OSF440-641B

Patch: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)

State: New

A potential security vulnerability has been discovered where, under certain circumstances, users can clobber temporary files created by shell commands and utilities (for example, under /sbin, /usr/sbin, /usr/bin, and /etc). HP has corrected this potential vulnerability.

Patch 817.00

OSF440-598

Patch: Fix for ccmn_rem_ccb3 panic

State: Supersedes patches OSF440-025 (136.00), OSF440-247 (283.00), OSF440-281 (314.00)

This patch corrects the following:

  • Fixes callback thread blocking forever in isp_enable_lun.

  • Fixes assert wait in xpt_ccb_alloc panic.

  • Fixes a problem on configurations having multiple Qlogic 1020/1040 based SCSI controllers (for example KZPBAs) and multiple CPUs. The problem could result in stalled I/O. This could be seen as a performance degradation, command timeouts, or, in the worse cases, a system hang condition.

  • Fixes callback on freed CCB panics.

  • Fixes a bug that causes a "ccmn_rem_ccb3: ccb not on any list" cluster node panic.

Patch 823.00

OSF440X11-042A

Patch: Security (SSRT0638U)

State: Supersedes patch OSF440X11-020A (350.00)

This patch corrects the following:

  • Fixes a problem in which the svn widget of libDXm.so creates identical backgrounds and foregrounds.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of root directory compromise via lpr using X11.

Patch 827.00

OSF440-614

Patch: Security (SSRT1-85U)

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. xntpd contains a potential buffer overflow that may allow unauthorized access to bin privileges. HP has corrected this potential vulnerability.

Patch 829.00

OSF440-594

Patch: Fix for i2c lock hierarchy violation

State: Supersedes patches OSF440-145 (119.00), OSF440-555 (697.00)

This patch corrects the following:

  • Fixes a intermittent hang occurring in the i2c code. This hang is most commonly seen on the DS10 workstation.

  • Fixes DS10/DS20 performance problems introduced with the i2c driver by using thread blocking, rather than event_meout() and DELAY().

  • Fixes a lock hierarchy violation that could be seen with the generic kernel attribute lockmode turned on.

Patch 845.00

OSF440-643

Patch: Fix for dropped ATM lane connections

State: Supersedes patches OSF440-068 (147.00), OSF440-356 (407.00), OSF440-429 (584.00)

This patch corrects the following:

  • Fixes a problem with the creation of multiple ATM ELANS.

  • Fixes a problem in which the system may panic with the error message "Unaligned kernel space access from kernel mode" when running ATM ELANs.

  • When running ATM LAN Emulation, using more than four ATM NetRAIN interfaces can result in recursive calls causing a "kernel stack not valid" halt.

  • Corrects a problem which could result in ATM/lane connection requests being dropped.

Patch 849.00

OSF440-610

Patch: Fix for telnet and ftp commands

State: New

This patch fixes a problem that occurs with the telnet and ftp commands. Telnet or ftp processes that are no longer in use are left on the system indefinitely. When a user tries to log in, the login process hangs after displaying the last login message.

Patch 851.00

OSF440-623

Patch: Miscellaneous joind fixes

State: Supersedes patches OSF440-079 (158.00), OSF440-201 (253.00), OSF440-246 (282.00), OSF440-249 (285.00), OSF440-538 (746.00)

This patch corrects the following:

  • Adds an error message to DHCP to inform a user that they may be using an outdated database. The message also points to the README for database conversion instructions.

  • Fixes a problem of the joind daemon not appending the hostname to the load file specified in the bf flag in the /etc/bootptab file.

  • Fixes a problem in which joind does not listen on interfaces configured with DECnet and returns "unaligned access" messages.

  • Fixes a problem in which bprelay does not work properly and displays the following error message:

     bprelay[658]: can't find interface which received packet

  • Corrects a problem with joind which caused it to respond to certain client dhcp requests via the wrong port.

  • Fixes a problem where joind may fail to clean up its lock files in /var/join.

Patch 855.00

OSF440X11-042B

Patch: Security (SSRT0638U)

State: Supersedes patches OSF440X11-020B (468.00)

This patch corrects the following:

  • Fixes a problem in which the svn widget of libDXm.so creates identical backgrounds and foregrounds.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of root directory compromise via lpr using X11.

Patch 1062.00

OSF440-839

Patch: Security (SSRT0556U, SSRT2275)

State: Supersedes patches OSF440-030 (28.00), OSF440-686 (1058.00), OSF440-984B (1059.00), OSF440-885 (1060.00)

This patch corrects the following:

  • A potential security vulnerability has been discovered where, under certain circumstances users may gain unauthorized access. HP has corrected this potential vulnerability.

  • Fixes a problem in uucp. uucp between two Tru64 UNIX boxes hangs when a uucp failure occurs.

  • Provides protection against a class of potential security vulnerabilities called buffer overflows. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. This patch allows a system administrator to enable memory management protections that limit potential buffer overflow vulnerabilities.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the uucp utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability.

Patch 1065.00

OSF440-766

Patch: Fix for kdbx

State: Supersedes patches OSF440-104B (201.00), OSF440-117 (93.00), OSF440-934B (1063.00)

This patch corrects the following:

  • Fixes a problem with kdbx. A core file created by kdbx was left in the root directory when recovering from a system crash.

  • Fixes a problem with kdbx. The trace command was showing all threads of a process when using the option that should show only selected threads.

  • Fixes a problem with audit data not being displayed by audit tool, problems with file object selection/deselection and directories, and NUMA performance issues associated with auditing.

  • Fixes a premature termination of the ofile kdbx extension, and token length warnings when kdbx is invoked.

Patch 1068.00

OSF440-984C

Patch: Security (SSRT2275)

State: Supersedes patch OSF440-984C (1066.00)

This patch corrects the following:

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • Provides protection against a class of potential security vulnerabilities called buffer overflows. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. This patch allows a system administrator to enable memory management protections that limit potential buffer overflow vulnerabilities.

Patch 1070.00

OSF440-984D

Patch: Security (SSRT2275)

State: New

This patch provides protection against a class of potential security vulnerabilities called buffer overflows. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. This patch allows a system administrator to enable memory management protections that limit potential buffer overflow vulnerabilities.

Patch 1072.00

OSF440-992B

Patch: Scripts in /sbin/init.d now world-readable

State: New

This patch makes start-up scripts in /sbin/init.d world readable.

Patch 1074.00

OSF440-788B

Patch: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

Patch 1076.00

OSF440-850B

Patch: Corrects buffer overflow in dxterm utility

State: Supersedes patch OSF440-052B (69.00)

This patch corrects the following:

  • The keymap used with curses functionality was not in sync with the table contained in the term.h header file. This change corrects that and enables several non-functioning keys in curses-based applications.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the dxterm utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability.

Patch 1078.00

OSF440-984E

Patch: Security (SSRT2275)

State: New

This patch provides protection against a class of potential security vulnerabilities called buffer overflows. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. This patch allows a system administrator to enable memory management protections that limit potential buffer overflow vulnerabilities.

Patch 1080.00

OSF440-992C

Patch: Scripts in /sbin/init.d now world readable

State: New

Patch makes start-up scripts in /sbin/init.d world readable.

Patch 1082.00

OSF440-992D

Patch: Scripts in /sbin/init.d now world readable

State: New

Patch makes start-up scripts in /sbin/init.d world readable.

Patch 1084.00

OSF440-992E

Patch: Scripts in /sbin/init.d now world readable

State: New

Patch makes start-up scripts in /sbin/init.d world readable.

Patch 1086.00

OSF440-984F

Patch: Security (SSRT2275)

State: Supersedes patch OSF440-033B (67.00)

This patch corrects the following:

  • Fixes a problem with the mount command where it sometimes kills other processes.

  • Provides protection against a class of potential security vulnerabilities called buffer overflows. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. This patch allows a system administrator to enable memory management protections that limit potential buffer overflow vulnerabilities.

Patch 1088.00

OSF440-850C

Patch: Corrects buffer overflow in dxterm utility

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the dxterm utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability.

Patch 1090.00

OSF440-810B

Patch: Security (SSRT1-41U, SSRT1-42U, SSRT1-45U, SSRT1-48U)

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

Patch 1092.00

OSF440CDE-047

Patch: Corrects improper file access

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

Patch 1094.00

OSF440-891

Patch: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)

State: Supersedes patch OSF440-641C (803.00)

This patch corrects the following:

  • A potential security vulnerability has been discovered where, under certain circumstances, users can clobber temporary files created by shell commands and utilities (for example, under /sbin, /usr/sbin, /usr/bin, and /etc). HP has corrected this potential vulnerability.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege managment. HP has corrected this potential vulnerability.

Patch 1096.00

OSF440-853

Patch: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)

State: Supersedes patch OSF440-641D (805.00)

This patch corrects the following:

  • A potential security vulnerability has been discovered where, under certain circumstances, users can clobber temporary files created by shell commands and utilities (for example, under /sbin, /usr/sbin, /usr/bin, and /etc). HP has corrected this potential vulnerability.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1098.00

OSF440-975

Patch: Corrects improper file or privilege management

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1100.00

OSF440-958A

Patch: Threaded applications using XTI/TLI may hang

State: Supersedes patches OSF440-016A (14.00), OSF440-023A (21.00)

This patch corrects the following:

  • Fixes a problem in which an application using the X/Open Transport Interface (XTI) and the DECnet/OSI transport provider is unable to disconnect a rejected request.

  • Fixes a streams problem in libxti. The t_getprotaddr() function will cause a memory core dump if either of its second or third argument is NULL.

  • Fixes a problem in XTI caused by a blocked mutex lock. Any thread attempting to send an abortive disconnect would hang.

Patch 1102.00

OSF440-958B

Patch: Fix for XTI/TLI static library hang

State: Supersedes patches OSF440-016B (65.00), OSF440-023B (66.00)

This patch corrects the following:

  • Fixes a problem in which an application using the X/Open Transport Interface (XTI) and the DECnet/OSI transport provider is unable to disconnect a rejected request.

  • Fixes a streams problem in libxti. The t_getprotaddr() function will cause a memory core dump if either of its second or third argument is NULL.

  • Fixes a problem in XTI caused by a blocked mutex lock. Any thread attempting to send an abortive disconnect would hang.

Patch 1105.00

OSF440CDE-053A

Patch: Security (SSRT1-80U)

State: Supersedes patches OSF440CDE-029A (785.00), OSF440CDE-054A (1103.00)

This patch corrects the following:

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the CDE online help. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability.

Patch 1107.00

OSF440-677

Patch: Fixes a problem in sys/timeb.h

State: New

This patch fixes a problem in <sys/timeb.h> where the ftime() prototype was not available in the default compilation name space.

Patch 1118.00

OSF440-983

Patch: Fix for grep command hang problem

State: Supersedes patches OSF440-378 (428.00), OSF440-381 (431.00), OSF440-432 (517.00), OSF440-526 (653.00)

This patch corrects the following:

  • Corrects a problem with the fgrep command, when it is used with the -s flag all output is suppressed.

  • Fixes a limitation problem with the grep and fgrep commands. If the line length is too long, grep displays a "wordlist too large" error message and fgrep displays "input too long" error message.

  • Fixes the following two problems:

    • fgrep limits are too small.

    • fgrep displays data files verbatim if pattern_file has blank lines.

  • Fixes a problem in which the grep command with the -w switch does not work as documented.

  • The grep command will now allow blank lines in the pattern file, and does not hang when executed with the -w and -f options.

Patch 1120.00

OSF440-795

Patch: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)

State: New

This patch adds the mktemp(1) reference page for the mktemp command.

Patch 1122.00

OSF440X11-048A

Patch: Fixes a problem with PowerStorm 4D20 card

State: New

This patch fixes a problem with a Compaq Professional Workstation XP1000 667 MHz system with a PowerStorm 4D20 (PBXGB-CA) graphics card where fonts were sometimes drawn incorrectly.

Patch 1124.00

OSF440-798

Patch: Updates for mktemp(3) reference page

State: New

This patch updates the mktemp(3) reference page with changed information regarding the mktemp() and mkstemp() routines, and adds information about the mkdtemp() and mkstemps() libc routines.

Patch 1126.00

OSF440-927

Patch: Corrects improper file or privilege management

State: Supersedes patch OSF440-211 (260.00)

This patch corrects the following:

  • This patch fixes a problem of not completing mailsetup if the hostname ends with 0 (zero). The error message produced is:

    Error creating /var/adm/sendmail/.cf: exiting

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1128.00

OSF440X11-056

Patch: Various fixes for X font server

State: Supersedes patch OSF440X11-025A (355.00)

This patch corrects the following:

  • Fixes various problems with the X font server and with the X server's interaction with X font servers.

  • Fixes a problem where the X server can grow excessively when accessing certain fonts.

Patch 1130.00

OSF440DX-031

Patch: Corrects improper file access

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

Patch 1132.00

OSF440-864

Patch: Security (SSRT2208)

State: New

A potential security vulnerability has been identified in the HP Tru64 UNIX operating system which may allow non-privileged users to gain unauthorized (root) access. This may be in the form of local and remote security domain risks. This potential security vulnerability in routed has been corrected.

Patch 1134.00

OSF440-950

Patch: Fix for fwtmp command

State: New

Now fwtmp will not display the invalid (negative) pids when the number of decimal digits of pid value exceeds 5.

Patch 1137.00

OSF440-986

Patch: Corrects improper file or privilege management

State: Supersedes patch OSF440-955 (1135.00)

This patch corrects the following:

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • Addresses compiler warnings caused by calling function with too few arguments.

Patch 1141.00

OSF440-852

Patch: Security (SSRT2229)

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1145.00

OSF440CDE-055

Patch: Corrects improper file access

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

Patch 1147.00

OSF440-935

Patch: Security (SSRT2339, SSRT2339)

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

Patch 1149.00

OSF440-872

Patch: Fix prevents simple lock owned panics

State: New

This fix prevents "simple lock owned" panics.

Patch 1151.00

OSF440DX-035

Patch: Corrects improper file access

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

Patch 1153.00

OSF440-909

Patch: Corrects improper file or privilege management

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1159.00

OSF440X11-049A

Patch: Security (SSRT0753U, SSRT0752U)

State: Supersedes patches OSF440X11-002A (62.00), OSF440X11-011A (218.00), OSF440X11-034A (542.00), OSF440X11-060A (1154.00), OSF440X11-045A (1155.00), OSF440X11-052 (1156.00), OSF440X11-061 (1157.00)

This patch corrects the following:

  • Fixes a problem with Motif Drag-and-Drop where, if a parent drop site was unregistered before a child drop site, subsequently unregistering the child drop site would cause a segmentation fault.

  • Fixes a problem with the toggle button where, if a display is closed and reopened, then the X Server may generate an "Invalid Pixmap Error".

  • Fixes various memory leaks in the Motif library (libXm) that could occur when creating and destroying Motif List, Text, and TextField widgets.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of large values of ENVIRONMENT variables. HP has corrected this potential vulnerability.

  • Fixes a problem with Motif tear-off menus which may cause a core dump when the shell widget is destroyed.

  • Fixes a problem where XmGetPixmapByDepth may fail if a directory in the search path contains a large number of files.

  • This patch fixes a problem with the Motif ToggleButton Widget where, in some cases, it may not draw itself correctly.

Patch 1161.00

OSF440DX-040

Patch: Corrects buffer overflow in the dxsysinfo utility

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the dxsysinfo utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege.

Patch 1163.00

OSF440-863

Patch: Corrects improper file or privilege management

State: New

A potential security vulnerability has been discovered, where under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1165.00

OSF440DX-029

Patch: Corrects improper file access

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

Patch 1167.00

OSF440-869

Patch: Corrects improper file or privilege management

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1169.00

OSF440-868

Patch: Corrects improper file or privilege management

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1172.00

OSF440-1002

Patch: Elminates compiler warnings in ln

State: Supersedes patch OSF440-969 (1170.00)

Corrected the behavior of ln -sf, to address the issue caused when a symbolic link points to a non-existing file. This patch eliminates compiler warnings in ln.

Patch 1174.00

OSF440-797

Patch: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)

State: New

This patch adds the safe_open(3) reference page for the safe_open() routine in libc.

Patch 1176.00

OSF440X11-054

Patch: Corrects improper file access

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Hp has corrected this potential vulnerability.

Patch 1178.00

OSF440-978

Patch: Fix for various vdump problems

State: Supersedes patches OSF440-048 (42.00), OSF440-237 (276.00), OSF440-404 (452.00), OSF440-089 (167.00), OSF440-338 (588.00), OSF440-547 (674.00)

This patch corrects the following:

  • The command was slow to complete when a partial restore operation was requested.

  • The command failed to ignore extended attribute records for the files which were not requested for a vrestore operation.

  • Fixes problem with vrestore where vrestore fails to restore certain files and directories having ACLs from a compressed vdump saveset, reporting:

    vrestore: error setting extended attributes 22

  • A previous patch caused incomplete restores.

  • A warning message is displayed when the path for the first file in a group of hardlinks is created without using original protection codes and property lists.

  • A warning message is displayed and vrestore aborts if it fails to malloc space for a property list.

  • A message which had been inserted at the end of the message file had the wrong message category (this could cause messaging confusion).

Patch 1178.00

continued

  • An uninitialized variable in the code that restores property lists could cause malloc failures, memory faults, "error setting extended attributes" messages, and infinite loops using the -l option.

  • Corrupted property list information could cause an infinite loop.

  • Fixes a problem where the vdump program would dump core with the following message:

    nnnn Resources lost(coredump)

  • Fixes the following problems with the vdump command:

    • Fixes a problem where the vdump command will sometimes store symbolic link files as directories in the vdump archive.

    • Failed to flag compressed extended attributes records that are split across a vdump BLOCK boundary.

    • Overrides the -D option when source path describes a root fileset. Note: If you want to backup quota files, you must not use the -D option.

    • Corrects "Rewinding" message to avoid a segfault with Internationalized messages.

    • Fixes the vdump to pickup correct messages in all locales.

    • Avoids some unnecessary function calls and thus allows faster vdumps.

  • Fixes the following problems with the vrestore command:

    • Fails to properly handle extended attributes records in compressed archives. This results in malloc failures, proplist inconsistencies, program abort, program crashes due to segfault or invalid memory access, and the display of the error message "error setting extended attributes".

    • Fails to set extended attributes due to confusion over selective restore of the file or directory associated. Also results in the display of the error message "error setting extended attributes".

    • Selective restore of hardlinked files is incomplete when they exist in different directories (fails to create a directory for the second occurrence of the file with the same inode number).

    • The -Q option is added to vrestore to allow the user to request that vrestore ignore the quota files (thus avoiding the time it takes to process them).

    • Fixes vrestore to pick up correct messages in all locales.

    • Fixes to display bit file attributes upon -l option.

Patch 1180.00

OSF440-862

Patch: Corrects improper file or privilege management

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1182.00

OSF440X11-047A

Patch: Static library fix (libXt)

State: Supersedes patches OSF440X11-005B (206.00), OSF440X11-018B (336.00), OSF440X11-033A (553.00)

This patch corrects the following:

  • Fixes various Minor System Faults (MSFs) in the X Toolkit library (libXt).

  • Fixes a memory leak in the X Toolkit library (libXt). This memory leak could be seen by applications that create and destroy many Motif ScrolledWindow widgets

  • Fixes a memory leak in the X Window System's X Toolkit library (Xt) that could occur when creating and destroying Motif List, Text, and TextField widgets.

  • Fixes a problem in the X Toolkit library (Xt) which could cause the TeMIP Iconic_map Presentation Module application (mcc_iconic_map) to crash.

Patch 1184.00

OSF440-890

Patch: Security (SSRT0792U)

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1186.00

OSF440-979

Patch: Compiler warnings addressing outside array bounds

State: New

This patch removes compiler warnings addressing outside of array bounds.

Patch 1189.00

OSF440-675

Patch: snmp getnext returns value of wrongOID

State: Supersedes patches OSF440-499 (678.00), OSF440-960 (1187.00)

This patch corrects the following:

  • Fixes a problem where os_mibs would core dump.

  • Fixes a problem in os_mibs which resulted in the swap size and swap used values for the host mib being reported as negative values on some systems.

  • Fixes the problem where snmp getnext returns back the value of the wrongOID on queries in the FDDI MIB of os_mibs.

Patch 1193.00

OSF440-848

Patch: Fix for restore command

State: Supersedes patches OSF440-387 (437.00), OSF440-970 (1190.00), OSF440-1013 (1191.00)

This patch corrects the following:

  • Fixes a problem in which the restore command can fail with the following error:

    Cannot malloc space for property list

  • Introduced dumprmt.msg for remote dump/restore messages. This new message catalog file is used in both rdump and rrestore programs.

  • Fixed dump to recognize LSM volumes correctly and not report random information when an error has occurred.

  • Eliminates the /sbin/restore program's ignoring of property lists.

Patch 1195.00

OSF440DX-034

Patch: Corrects improper file access

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

Patch 1197.00

OSF440-877A

Patch: Installs version V2.1-120

State: Supersedes patches OSF440-150A (124.00), OSF440-548A (680.00)

This patch corrects the following:

  • Fixes the following problem in the libots3 run-time library:

    • The failure to check the return status after certain system calls caused a problem in the libots3 run-time library. The libots3 run-time library supports OpenMP parallel applications.

  • Fixes the following problem in the parallel processing support library (libots3):

    • A problem in the parallel processing support library that caused incorrect run-time results for an OpenMP program.

  • Installs version V2.1-120 of /usr/lib/libots3.a and /usr/shlib/libots3.so. V2.1-120 fixes a problem where long running OpenMP applications might overflow an internal libots3 counter, resulting in a breakdown of thread synchronization.

Patch 1199.00

OSF440-877B

Patch: Installs version V2.1-120

State: Supersedes patches OSF440-150B (204.00), OSF440-548B (682.00)

This patch corrects the following:

  • Fixes the following problem in the libots3 run-time library:

    • The failure to check the return status after certain system calls caused a problem in the libots3 run-time library. The libots3 run-time library supports OpenMP parallel applications.

  • Fixes the following problem in the parallel processing support library (libots3):

    • A problem in the parallel processing support library that caused incorrect run-time results for an OpenMP program.

  • Installs version V2.1-120 of /usr/lib/libots3.a and /usr/shlib/libots3.so. V2.1-120 fixes a problem where long running OpenMP applications might overflow an internal libots3 counter, resulting in a breakdown of thread synchronization.

Patch 1202.00

OSF440CDE-040

Patch: Corrects improper file access

State: Supersedes patches OSF440CDE-026 (596.00), OSF440CDE-041 (1200.00)

This patch corrects the following:

  • Fixes a problem in which the Window Manager (dtwm) intermittently hangs on a system which uses multiple displays.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

  • Fixes a problem in the Window Manager (dtwm) where double-click actions are performed on the second button press instead of the second button release. This causes the second button release event to be sent to any underlying window.

Patch 1205.00

OSF440-710

Patch: NetRAIN does not failover to a backup interface

State: Supersedes patches OSF440-267 (302.00), OSF440-638 (813.00), OSF440-592 (1203.00)

This patch corrects the following:

  • Fixes a NetRAIN problem when using HE155 (FORE) ATM cards. NetRAIN will fail when configuring LANE to join Elans.

  • Fixes a problem in NetRAIN. NetRAIN interface creation now fails if any of the requested standby interfaces do not exist.

  • Fixes a problem with NetRAIN when switching to the standby interface. The error message is "ifconfig: ioctl (SIOCIFSWITCH): Invalid argument".

  • Fixes a problem with NetRAIN which prevents it from failing over to a backup interface if the primary interface is disconnected at boot time.

Patch 1208.00

OSF440DX-026

Patch: Security (SSRT0785U)

State: Supersedes patches OSF440DX-004 (189.00), OSF440DX-005 (190.00), OSF440DX-006 (191.00), OSF440DX-008 (193.00), OSF440DX-010 (214.00), OSF440DX-014 (345.00), OSF440DX-015 (346.00), OSF440DX-016 (347.00), OSF440DX-017 (348.00), OSF440DX-018 (349.00), OSF440DX-019 (559.00), OSF440DX-027 (1206.00)

This patch corrects the following:

  • Fixes two situations in which the GUI account management program (dxaccounts) will crash in a Enhanced Security client environment when attempting to copy an NIS user account.

  • Fixes the problem with the useradd, usermod, and userdel commands removing the last entry of the /etc/passwd file when the last line of the /etc/passwd file does not end with the new line character (\n).

  • Fixes a problem where usermod -D can coredump if an NIS group entry contains a large number of users.

  • Fixes a problem in which the command usermod was not allowing any commas in the comment field when the current GECOS fields are filled.

  • Fixes a problem in which a duplicate user identifier (UID) is accepted at a second attempt even if the no-duplicate-user-identifier policy is set.

  • Updates the error message displayed when Account Manager fails to start due to the detection of an Account Manager lock file (/etc/.AM_is_running) on the system.

  • Fixes the problem in which a command usermod -D does not display the Expire date when it is set.

  • Fixes a problem in which dxaccounts does not allow the system manager to add NIS users when the system is running enhanced security.

  • Fixes the problem of enabling the change root's login/uid through cli/dxaccounts utilities.

  • Fixes a problem in which the dxaccounts application does not allow users to be added to groups with Group ID lower than the default minimum specified in the General Options dialog.

Patch 1208.00

continued

  • Fixes a problem where the new home directory for a new user ID is created with the date and time stamp of the /usr/skel directory.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of passwords that have a length outside of the intended range. HP has corrected this potential vulnerability.

  • Fixes the problem that causes the dxaccounts application to core dump when /etc/shells is a directory instead of a file.

Patch 1211.00

OSF440-765A

Patch: Support for NEW_OPEN_MAX_SYSTEM in libaio

State: Supersedes patch OSF440-793A (1209.00)

This patch corrects the following:

  • Prevents thread blocking forever when both libaio and libaio_raw are linked into the same image.

  • Closes an aio_read()/aio_cancel() race condition.

  • Adds support for NEW_OPEN_MAX_SYSTEM (64K) file descriptors to libaio.

Patch 1214.00

OSF440-765B

Patch: Support for NEW_OPEN_MAX_SYSTEM in libaio

State: Supersedes patch OSF440-793B (1212.00)

This patch corrects the following:

  • Prevent thread blocking forever when both libaio and libaio_raw are linked into the same image.

  • Close an aio_read()/aio_cancel() race condition.

  • Adds support for NEW_OPEN_MAX_SYSTEM (64K) file descriptors to libaio.

Patch 1216.00

OSF440-910

Patch: Increase for ReadyTimeSeconds in ddr_config

State: Supersedes patch OSF440-103 (80.00)

This patch corrects the following:

  • Fixes a problem with the cdfs file system. The default a partitions are being made incorrectly by the disk driver for ISO-9660 CDs causing data corruption when reading beyond the end of a partition. Only new and non-HP CD-ROM drives are affected.

  • Fixes the problem where /sbin/ddr_config does not accept values for ReadyTimeSeconds larger than 255. The new limit is 86400 seconds (24 hours).

Patch 1218.00

OSF440-971

Patch: Corrected exit status of sed when disk is full

State: New

Corrects the exit status of sed when the disk is full.

Patch 1220.00

OSF440-930

Patch: Corrects improper file or privilege management

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1226.00

OSF440-736

Patch: Fix for od command hang

State: New

This patch fixes a problem in which an invalid character sequence causes the od command to hang or display a partial character.

Patch 1228.00

OSF440-918

Patch: Corrects improper file or privilege management

State: Supersedes patch OSF440-047A (41.00)

This patch corrects the following:

  • Fixes a Y2K problem with the nroff text formatter in which the years after 1999 are translated to be 19xxx with xxx being the number of years that have passed since 1900. In this case, the year 2010 displays as 19110.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1231.00

OSF440CDE-036

Patch: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)

State: Supersedes patch OSF440CDE-033 (1229.00)

This patch corrects the following:

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

Patch 1233.00

OSF440-998

Patch: Corrects mkdir -p functionality and eliminates mkdir compiler warnings

State: Supersedes patch OSF440-034 (32.00)

This patch corrects the following:

  • Fixes a problem with the mkdir -p command. The mkdir -p command did not return an error if the last component in the pathname already existed.

  • Eliminates compiler warnings in mkdir.

Patch 1235.00

OSF440-954

Patch: Corrects improper file or privilege management

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1237.00

OSF440-878

Patch: Corrects a problem in the sysconfig command

State: New

This patch fixes a problem in which the lines in the output stream from sysconfig -Q can be truncated.

Patch 1241.00

OSF440CDE-060

Patch: Corrects improper file or privilege management

State: Supersedes patches OSF440CDE-058 (1238.00), OSF440CDE-061 (1239.00)

This patch corrects the following:

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • Fixes the message catalog for the CDE application dtprintinfo.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper privilege management. HP has corrected this potential vulnerability.

Patch 1244.00

OSF440-993

Patch: Security (SSRT0743U, SSRT2256)

State: Supersedes patches OSF440-631 (819.00), OSF440-823 (1242.00)

This patch corrects the following:

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the ps utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability.

  • Allows whitespace in the header field with the ps -o command. Multiple headers with whitespace can be used with the ps -o command.

Patch 1246.00

OSF440-908

Patch: Corrects improper file or privilege management

State: Supersedes patches OSF440-051 (45.00), OSF440-283 (316.00), OSF440-396 (444.00), OSF440-622 (821.00)

This patch corrects the following:

  • Fixes a problem in which sort -i a_file >b_file aborts with the message "A line of the input file contains more than 20480 characters" when LANG = da_DK.ISO8859-1.

  • Fixes a problem in which the sort command aborts with the message "A line of the input file contains more than 20480 characters" when running in a Japanese locale.

  • Fixes a problem that sometimes occurs when sorting large data files in multibyte locales such as Japanese.

  • Corrects the behavior of the sort(1) command which now checks for duplicates with the -c, -u, and -k flags.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • Addresses the problem wherein performing a sort on a large database using numerous keys fails during the consolidation phase of the temporary files.

Patch 1248.00

OSF440-744

Patch: Corrects a problem with script program hang

State: New

This fix corrects a problem in which a script would hang upon exiting in a dfs configuration.

Patch 1250.00

OSF440-926

Patch: Corrects improper file or privilege management

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1253.00

OSF440X11-057A

Patch: Security (SSRT2280)

State: Supersedes patches OSF440X11-010A (217.00), OSF440X11-013 (219.00), OSF440X11-024 (354.00), OSF440X11-026A (356.00), OSF440X11-032A (579.00), OSF440X11-039 (711.00), OSF440X11-055A (1251.00)

This patch corrects the following:

  • Fixes a problem in which ^C fails to work in dtterm when logged in to a 4.0E or 4.0F system using XDMCP.

  • Fixes a character input problem for non-Latin-1 keyboards.

  • Fixes a problem in which some 8-bit characters cannot be entered directly from the keyboard when the Caps Lock setting is on.

  • Prevents a potential core dump from the X11 library when running an input method server for Japanese, Chinese, or Korean.

  • Fixes two memory leaks in the X Window System's X library (Xlib) that can occur when creating and destroying Motif List, Text, and TextField widgets.

  • This patch fixes a memory leak in the libVX11 library used by X applications where freeing a GC would not free all its memory. This problem is most likely to occur on systems with a Catetes graphics card (4D40T, 4D50T, 4D60T, or 4D51T).

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in X11 applications. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability.

Patch 1255.00

OSF440-828

Patch: Miscellaneous linker fixes

State: Supersedes patches OSF440-139 (113.00), OSF440-230 (207.00), OSF440-231 (208.00), OSF440-195 (249.00), OSF440-350 (401.00), OSF440-376 (580.00), OSF440-475 (582.00), OSF440-616 (691.00), OSF440-527 (692.00), OSF440-539 (693.00), OSF440-533 (695.00), OSF440-604 (825.00)

This patch corrects the following:

  • Fixes a problem where the linker (ld) would insert incorrect values for the symbols etext and _etext when building kernels larger than 4 MB.

  • This patch supports the NHD2 (New Hardware Delivery Two) release. The NHD2 installation process modifies the system's linker and the osf_boot file. This patch preserves the modifications that NHD2 makes to the linker and the osf_boot file.

Patch 1255.00

continued

  • Fixes a problem where the linker (ld) could not read arguments longer than 1024 characters in input files, and adds proper support for line continuation characters.

  • Addresses the failure of osf_boot to link in foreign kits with the following message:

    osf_boot: Not enough space to add '..........
      messages

  • Fixes a linker problem where including a shared library on a link line twice with another library in between caused unresolved symbols in some cases.

  • Fixes a problem in which the bootlink can fail on AlphaStations 600, 600A, and 500/400.

  • Fixes a potential optimization problem with the linker (/bin/ld).

  • Fixes two errors that occur when using the -f switch with the linker (ld):

    • Using the -f switch produces link errors.

    • Any unsupported switch beginning with -f gets interpreted to mean -f.

  • Fixes a problem where the linker-defined symbol _fpdata would end up being undefined if it was referenced by a program but was not used by the linker.

  • Fixes two problems in the linker where it would erronously report "multiply defined symbol" errors or "unresolved symbol" errors:

    • Modifies the linker's symbol resolution to enable it to recognize when a reference to a symbol defined in a shared library is replaced by a symbol defined in an object file or archive.

    • Modifies the linker to cause it to re-scan shared libraries before reporting unresolved symbols.

  • The .text symbol was being set incorrectly for -shared and -call_shared links.

  • Five linker-defined symbols were not getting the correct type set in the Dynamic Symbol Table.

  • This patch fixes a linker problem that may cause executables to fail with a segmentation violation when the address of an uninitialized data symbol in a shared library is used as the initial value of a global or static pointer variable.

Patch 1257.00

OSF440-845

Patch: Resolves KMF in DLI interrupt handler

State: Supersedes patch OSF440-260 (295.00)

This patch corrects the following:

  • Fixes an unaligned access panic in dli_input.

  • Resolves kernel memory faults in the DLI interrupt handler.

Patch 1259.00

OSF440X11-050

Patch: Fixes a problem in the mwm Window Manager

State: New

This patch fixes a problem in the mwm Window Manager where double-click actions are performed on the second button press instead of the second button release. This causes the second button release event to be sent to any underlying window.

Patch 1263.00

OSF440DX-033

Patch: Corrects buffer overflow occurs in the dxterm utility

State: Supersedes patches OSF440DX-038 (1260.00), OSF440DX-032 (1261.00)

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the dxterm utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability.

Patch 1265.00

OSF440-796

Patch: Provides dirclean(8) reference page

State: New

This patch adds the dirclean(8) reference page for the /usr/sbin/dirclean utility.

Patch 1267.00

OSF440-683

Patch: Fixes vmstat formatting problem

State: New

In some cases, the entries in the tabular output of vmstat are improperly formatted, causing adjacent text fields to run together.

Patch 1269.00

OSF440-982

Patch: Fixes problems in accounting commands

State: New

This patch corrects the following problems found in accounting commands:

  • Resolves the differences in the CPU time and connect time, found during the conversion from ASCII format to binary format and binary format to ASCII format of accounting reports.

  • Resolves the differences in CPU time, found in the output of acctcom and acctmerg commands for the same input file.

Patch 1271.00

OSF440-996

Patch: Fix for which command

State: New

This patch fixes the which command to use the path information from the environment, rather than from the ~/.cshrc file, if it is invoked from other than the C shell.

Patch 1273.00

OSF440-994

Patch: Corrects improper file or privilege management

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1275.00

OSF440-822

Patch: Corrects buffer overflow in binmail utility

State: Supersedes patch OSF440-046 (40.00)

This patch corrects the following:

  • Fixes binmail to prevent partial delivery of mail messages when disk quota is reached.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the binmail (also called mail) utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability.

Patch 1277.00

OSF440CDE-044

Patch: Corrects improper file access

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

Patch 1281.00

OSF440-825

Patch: Corrects improper file or privilege management

State: Supersedes patches OSF440-932 (1278.00), OSF440-937 (1279.00)

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1284.00

OSF440-717

Patch: Security (SSRT0795U)

State: Supersedes patches OSF440-080 (159.00), OSF440-545 (699.00), OSF440-782 (1282.00)

This patch corrects the following:

  • Fixes a problem in which a system can hang when inetd tries to start a daemon listed in inetd.conf which is not installed on the system. This can occur when a user attempts to telnet to the port reserved for the nonexistent daemon.

  • Corrects a problem with inetd which could result in its termination without notice and without a core file.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form where inetd may block incoming connections when scanned by nmap or other port scanners. HP has corrected this potential vulnerability.

  • Allows the socket listen backlog in inetd(8) to be set by using the -l option on the command line.

Patch 1286.00

OSF440-961

Patch: Corrects improper file or privilege management

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1288.00

OSF440-977

Patch: make command now correctly checks dependencies

State: New

The make command now checks dependencies on archive libraries properly.

Patch 1290.00

OSF440CDE-031B

Patch: Security (SSRT0571U, SSRT0753U, SSRT0752U)

State: Supersedes patches OSF440CDE-001 (1.00), OSF440CDE-002 (2.00), OSF440CDE-023 (528.00)

This patch corrects the following:

  • A potential security vulnerability has been discovered where, under certain circumstances, users may gain unauthorized access. HP has corrected this potential vulnerability.

  • Fixes a problem where the CDE mail interface (dtmail) does not display the date and time of mail messages in the Message Header list when the time zone is set to certain time zones such as GB-Eire.

Patch 1290.00

continued

  • Fixes a dtmail problem in which a From line with quotes in it incorrectly finds the date of the mail message. This error is displayed on the main screen under the header Date and Time and shows up as Dec. 31 or as a blank field.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of large values of ENVIRONMENT variables and command line arguments. HP has corrected this potential vulnerability.

Patch 1294.00

OSF440-981

Patch: Correction for merging the .login file

State: New

In a rolling upgrade, the merge of the .login file failed and did not display a message warning that it failed. This has been corrected.

Patch 1296.00

OSF440DX-039

Patch: Corrects improper file access

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

Patch 1301.00

OSF440-706

Patch: Fixes binlogd core dump problem

State: OSF440-566 (703.00), OSF440-904 (1297.00), OSF440-807 (1298.00), OSF440-775 (1299.00)

This patch corrects the following:

  • Fixes a problem in binlogd which overwrites adjacent header fields in an error record if the system's hostname is longer than 12 characters.

  • Fixes a problem that may prevent a correct configuration table entry from being written to the binary error log on some systems.

  • Causes the binary error log daemon (binlogd) to synchronize its log files before closing them upon system shutdown.

  • Fixes a time formatting problem when Compaq Analyze is used to display events in time zones with a positive offset from GMT.

  • Fixes a problem in which the binlog daemon can coredump if it attempts to recover events from a panic dump file containing invalid event data.

Patch 1303.00

OSF440-959

Patch: Corrects improper file or privilege management

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1305.00

OSF440-953

Patch: Corrects improper file or privilege management

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1307.00

OSF440DX-024

Patch: Fixes a problem in dxproctuner

State: New

This patch fixes a problem in dxproctuner where the process information is not displayed when there is a double quote followed by any other character in the command column.

Patch 1309.00

OSF440-928

Patch: Corrects improper file or privilege management

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1312.00

OSF440-842

Patch: find -ls displays incorrect number of blocks

State: Supersedes patches OSF440-384 (434.00), OSF440-988 (1310.00)

This patch corrects the following:

  • Fixes a problem with the find command. The find command fails to show file names that start with a period.

  • Corrects the find -ctime, -atime, and -mtime behavior with respect to the + operations. Find + operations will match "Greater Than" rather than "Greater Than or Equal To".

  • Corrects find -ls, which displayed an incorrect number of blocks.

Patch 1314.00

OSF440-888

Patch: Corrects improper file access

State: Supersedes patch OSF440-277 (311.00)

This patch corrects the following:

  • Fixes a problem in which sysconfigdb would incorrectly add or delete blank lines to or from the target file.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

Patch 1316.00

OSF440-768

Patch: Fix for salvage utility

State: Supersedes patch OSF440-433 (555.00)

This patch corrects several known problems with salvage:

  • Fixes two infinite loops that could make salvage run forever.

  • Salvage could core dump when encountering a deleted property list.

  • Removes garbage characters from symlink recovery in salvage.

  • Fixes a problem with the salvage utility which could cause the utility to core dump.

Patch 1318.00

OSF440-739

Patch: Fix for startslip program

State: New

This patch fixes a problem where startslip was not able to extract all the information from the acucap file.

Patch 1320.00

OSF440-1044A

Patch: Security (SSRT2400)

State: New

This patch corrects the following:

  • A potential security vulnerability has been discovered, where under certain circumstanes, system integrity may be compromised. HP has corrected this potential vulnerability.

  • Updates BIND from V4.9.3 to V8.3.4.

Patch 1323.00

OSF440-1044B

Patch: Security (SSRT2408, SSRT2410, SSRT2411)

State: Supersedes patches OSF440-019 (17.00), OSF440-329 (383.00), OSF440-444 (534.00), OSF440-467 (661.00), OSF440-613 (794.00), OSF440-1000 (1321.00)

This patch corrects the following:

  • Fixes a problem in which a BIND server may find that named will place a warning message in the daemon.log that was not previously seen.

  • Fixes a problem in which a BIND server writes files to the /etc/namedb directory instead of the /var/tmp directory.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • This patch fixes a problem where named could possibly core dump when printing an informational message to syslog.

  • Fixes a problem of named producing a core file when named is started and the named.boot file has more than 32767 zones specified.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • Potential BIND (Berkeley Internet Name Domain) security vulnerabilities have been reported to HP that may result in buffer overflows, unauthorized access, or denial of service (DoS) on HP Tru64 UNIX systems. These potential security vulnerabilities may be in the form of local and remote security domain risks. The following potential security vulnerabilities have been corrected:

                 SSRT2408 BIND - (Severity - High) 
                 SSRT2410 BIND - (Severity - High) 
                 SSRT2411 BIND - (Severity - High)

  • A potential security vulnerability has been discovered where, under certain circumstanes, system integrity may be compromised. HP has corrected this potential vulnerability.

  • Updates BIND from V4.9.3 to V8.3.4.

Patch 1326.00

OSF440X11-046

Patch: Fix for ELSA GLoria Comet card

State: Supersedes patches OSF440X11-004 (64.00), OSF440X11-007 (74.00), OSF440X11-009 (199.00), OSF440X11-015 (200.00), OSF440X11-016 (220.00), OSF440X11-022 (352.00), OSF440X11-029 (359.00), OSF440X11-038 (709.00), OSF440X11-059 (1324.00)

This patch corrects the following:

  • Fixes a problem where, on systems with a Powerstorm 4D10T (ELSA GLoria Synergy) graphics board, sometimes the graphics board was not initialized properly and failed to work on power-up or when the X server was restarted.

  • Fixes a problem where, on systems with a Powerstorm 4D10T (ELSA GLoria Synergy) graphics board, sometimes the X server does not draw lines correctly.

Patch 1326.00

continued

  • Provides the X server support for the PCI To Ethernet/Graphics Combo Adapter (3X-DEPVD-AA), also known as the ITI6021E Fast Ethernet NIC 3D Video Combination Adapter, InterServer Combo, or JIB.

  • Fixes a problem where, on systems with a Powerstorm 4D10T (ELSA GLoria Synergy) graphics board, sometimes the X server did not draw text correctly.

  • Fixes a problem where, on systems with a PowerStorm 4D10T (ELSA GLoria Synergy, SN-PBXGK-BB) graphics card or a PCI To Ethernet/Graphics Combo Adapter (3X-DEPVD-AA), sometimes lines and images are not drawn correctly in scrolled windows.

  • Fixes synchronization and drawing problems in the X server for the PowerStorm 4D10T (ELSA GLoria Synergy, SN-PBXGK-BB) graphics card.

  • Fixes a memory leak in the X server on systems with a PowerStorm 4D10T (ELSA GLoria Synergy, SN-PBXGK-BB) graphics card that could occur when a client repeatedly created and destroyed buffers for the X Window System Multibuffering Extension (XmbufCreateBuffers/XmbufDestroyBuffers).

  • Fixes a problem where, on systems with an ELSA GLoria Synergy graphics card, sometimes the X server would not draw stipple patterns correctly.

  • The ELSA GLoria Comet card does not correctly draw nested shaded boxes or anything similar.

Patch 1328.00

OSF440-929

Patch: Fixes improper file or privilege management

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1331.00

OSF440X11-053

Patch: Correction to XCopyPlane

State: Supersedes patches OSF440X11-035 (577.00), OSF440X11-041B (713.00), OSF440X11-043 (835.00), OSF440X11-044 (1329.00)

This patch corrects the following:

  • Provides the Xserver library for the new 3DLabs Oxygen VX1 PCI graphics card.

  • Fixes the problem of erroneous pixels left behind when dragging CDE application manager icons on the desktop.

  • Fixes an Xserver crash when using GTK on systems using the Oxygen VX1 graphics card.

  • Window corruption on Oxygen VX1 graphics card if backing store/save unders are enabled.

  • On the Oxygen VX1 graphics card, this patch corrects XCopyPlane to only copy the requested bitplane rather than all bitplanes.

Patch 1337.00

OSF440CDE-031C

Patch: Security (SSRT0753U, SSRT0752U)

State: Supersedes patches OSF440CDE-015 (213.00), OSF440CDE-027 (720.00), OSF440CDE-030 (839.00), OSF440CDE-059 (1332.00), OSF440CDE-057 (1333.00), OSF440CDE-043 (1334.00), OSF440CDE-045 (1335.00)

This patch corrects the following:

  • Fixes a problem where when running the Common Desktop Environment (CDE) on a system with more than one graphics card and monitor (multihead), sometimes new windows were visible when the screen was locked.

  • Fixes a problem on multi-head systems in which the unlock display only works if the default display is screen 0.

  • Fixes the problem of palette files not been read from /etc/dt/palettes.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper privilege management. HP has corrected this potential vulnerability.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of large values of ENVIRONMENT variables and command line arguments. HP has corrected this potential vulnerability.

Patch 1339.00

OSF440-936

Patch: Security (SSRT2368, SSRT2368)

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

Patch 1346.00

OSF440CDE-049

Patch: Security (SSRT2193)

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the mailcv utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability.

Patch 1348.00

OSF440-1010

Patch: Fixes a problem with TULIP network interface cards

State: Supersedes patches OSF440-345 (396.00), OSF440-647 (843.00)

This patch corrects the following:

  • Corrects a problem with some DE500 interfaces that use the Micro Linear ML6694F PHY.

  • Fixes a problem with the 400ms delay upon network cable reinsertion which could lead to temporarily held drivers.

  • Resolves a problem where some de50x network interface cards, under specific circumstances, may not send gratuitous arp packets .

Patch 1356.00

OSF440CDE-022B

Patch: Security (SSRT0617U, SSRT0788U, SSRT0753U, SSRT0752U)

State: Supersedes patch OSF440CDE-019B (465.00), OSF440CDE-020B (467.00), OSF440CDE-022B (586.00), OSF440CDE-034B (1349.00), OSF440CDE-042B (1350.00), OSF440CDE-056B (1351.00), OSF440CDE-048B (1352.00), OSF440CDE-039B (1353.00), OSF440CDE-037B (1354.00)

This patch corrects the following:

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • Fixes a problem in which dtfile ICDE COSE tool does not work when TMPDIR is defined as /ldata/disk_local/tmp. dtfile returns this error:

    /ldata/disk_local/tmp/sdtdbcache_AAAaadmma: Cross-device link
    /ldata/disk_local/tmp/sdtdbcache_BAAaadmma: Cross-device link
    Floating exception (core dumped)

  • Fixes a problem with the Common Desktop Environment (CDE) in which some desktop applications will fail if CDE is not initialized. The error which appears in the users home .dt/errorlog file is:

    Desktop Not Initialized: Could not createAction/Datatypes
    database.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of large values of command line arguments. HP has corrected this potential vulnerability.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the DtSvc utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege.

  • Fixes the dtprintinfo memory fault problem with long LANG value.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of large values of ENVIRONMENT variables and command line arguments. HP has corrected this potential vulnerability.

Patch 1358.00

OSF440X11-051

Patch: Corrects improper file access

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

Patch 1361.00

OSF440CDE-051

Patch: Security (SSRT2280)

State: Supersedes patch OSF440CDE-052 (1359.00)

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the dtterm utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability.

Patch 1363.00

OSF440-921

Patch: Corrects improper file or privilege management

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1365.00

OSF440DX-036

Patch: Corrects improper file access

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

Patch 1368.00

OSF440-894

Patch: Fixes a problem in procfs

State: Supersedes patches OSF440-321 (378.00), OSF440-556 (721.00), OSF440-576 (723.00), OSF440-589 (841.00), OSF440-824 (1366.00)

This patch corrects the following:

  • Fixes a kernel memory fault in procfs_get_s5_dir.

  • Corrects a problem where attaching to a program with a debugger will cause periodic timers to be lost and will make the program hang.

  • Resolves problems encontered with the Ladebug and TotalView debuggers.

  • Fixes a problem that made setuid programs unable to open themselves.

  • Fixes VM locking problem in procfs. Fixes a kernel memory fault related to ioctl PIOCMAP.

  • Fixes a problem in procfs that, in some situations, prevents exiting threads from exiting. This creates a situation where these threads simply spin, consuming CPU time.

Patch 1370.00

OSF440-919

Patch: Corrects improper file or privilege management

State: New

This patch corrects the following:

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • Addresses the problem of coredump when output of lint for a non-existing file is supplied to error.

Patch 1372.00

OSF440-859

Patch: Security (SSRT0642U)

State: Supersedes patches OSF440-149A (123.00), OSF440-251A (287.00), OSF440-301A (364.00), OSF440-370A (421.00), OSF440-462A (562.00), OSF440-439A (564.00)

This patch corrects the following:

  • Fixes a problem of libsecurity producing a core file when handling error conditions.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • Corrects a problem of the rsh command displaying a warning message instead of the rsh command output when C2 security is configured.

  • Fixes a problem with logins in a DCE/C2 environment. The user could encounter an error "Bad priority setting" if there is a u_priority setting used in /etc/auth/system/default file.

  • Fixes a problem for Enhanced Security configurations where the Maximum Login Interval (u_max_login_intvl) field was being ignored for account templates.

  • Fixes a problem when a system is configured with DECnet, C2, and NIS. When invoking edauth(8), the error "Must be on NIS master server to update entry for <user_name>" is returned.

  • Corrects the problem of an incorrectly installed signal handler when Enhanced Security is enabled.

Patch 1374.00

OSF440-774

Patch: Security (SSRT0779U)

State: New

A potential security vulnerability has been discovered where, under certain circumstances, SNMP services can stop functioning.

Patch 1378.00

OSF440X11-049B

Patch: Security (SSRT0753U, SSRT0752U)

State: Supersedes patches OSF440X11-002B (70.00), OSF440X11-011B (335.00), OSF440X11-034B (569.00), OSF440X11-060B (1375.00), OSF440X11-045B (1376.00)

This patch corrects the following:

  • Fixes a problem with Motif Drag-and-Drop where, if a parent drop site was unregistered before a child drop site, subsequently unregistering the child drop site would cause a segmentation fault.

  • Fixes a problem with the toggle button where, if a display is closed and reopened, then the X Server may generate an "Invalid Pixmap Error".

  • Fixes various memory leaks in the Motif library (libXm) that could occur when creating and destroying Motif List, Text, and TextField widgets.

  • A potential security vulnerability has been discovered, where under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of large values of ENVIRONMENT variables. HP has corrected this potential vulnerability.

  • Fixes a problem with the Motif ToggleButton Widget where, in some cases, it may not draw itself correctly.

Patch 1380.00

OSF440-920

Patch: Corrects improper file or privilege management

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1382.00

OSF440-995

Patch: cut command now handles incomplete lines correctly

State: New

This patch fixes the cut command to handle incomplete lines correctly.

Patch 1384.00

OSF440-820

Patch: Corrects improper file or privilege management

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1386.00

OSF440DX-030

Patch: Corrects improper file access

State: Supersedes patches OSF440DX-007 (192.00), OSF440DX-002 (187.00), OSF440DX-020 (571.00)

This patch corrects the following:

  • Fixes a problem with the diskconfig utility where ri type disks were not correctly recognized.

  • Fixes a problem where, when creating an AdvFS partition, the disk configuration utility (/usr/sbin/diskconfig) failed with the error:

    Error in Tcl Script
    Error: can't read dskdir: no such variable

  • Fixes a problem that was causing diskconfig to issue the error message "can't read tminor: no such variable" upon startup.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

Patch 1388.00

OSF440-938

Patch: Fixes an IDE/ATA bus hang

State: Supersedes patch OSF440-315 (373.00), OSF440-468 (573.00)

This patch corrects the following:

  • Processes may hang due to waiting for I/O interrupts.

  • The SCU command set pages pcf will hang a system when ATAPI CD-ROM device is selected.

  • Corrects recognition problems with some models of IDE CD-ROM devices and removable disk devices during system startup. Some IDE devices may cause the system to hang or panic during startup and others may not be recognized.

  • Fixes an IDE/ATA bus hang caused by attempting to complete raw odd byte DMA transfers to and from IDE/ATAPI devices.

Patch 1391.00

OSF440CDE-032

Patch: Security (SSRT0767U, SSRT2251, SSRT2274, SSRT0788U)

State: Supersedes patches OSF440CDE-019A (342.00), OSF440CDE-020A (343.00), OSF440CDE-022A (513.00), OSF440CDE-034A (1108.00), OSF440CDE-042A (1109.00), OSF440CDE-056A (1110.00), OSF440CDE-048A (1111.00), OSF440CDE-039A (1112.00), OSF440CDE-035 (1113.00), OSF440CDE-037A (1114.00), OSF440CDE-050 (1389.00), OSF440CDE-031A (1116.00)

This patch corrects the following:

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • Fixes a problem in which dtfile ICDE COSE tool does not work when TMPDIR is defined as /ldata/disk_local/tmp. The dtfile command returns this error:

    /ldata/disk_local/tmp/sdtdbcache_AAAaadmma: Cross-device link
    /ldata/disk_local/tmp/sdtdbcache_BAAaadmma: Cross-device link
    Floating exception (core dumped)

  • Fixes a problem with the Common Desktop Environment (CDE) in which some desktop applications will fail if CDE is not initialized. The error that appears in the users home .dt/errorlog file is:

    Desktop Not Initialized: Could not createAction/Datatypes
    database.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of large values of command line arguments. HP has corrected this potential vulnerability.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the DtSvc utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege.

  • Fixes a potential security vulnerability in CDE Subprocess Control Service (dtspcd). The dtspcd has a potential buffer overflow condition which may lead to unauthorized access. HP has corrected this potential vulnerability.

  • Fixes the dtprintinfo memory fault problem with long LANG value.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of large values of ENVIRONMENT variables and command line arguments. HP has corrected this potential vulnerability.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. The ttdbserverd contains a potential buffer overflow that may allow unauthorized access. HP has corrected this potential vulnerability.

Patch 1393.00

OSF440X11-047B

Patch: Fixes memory leak in X Toolkit library

State: Supersedes patches OSF440X11-005A (195.00), OSF440X11-018A (222.00), OSF440X11-033B (575.00)

This patch corrects the following:

  • Fixes various Minor System Faults (MSFs) in the X Toolkit library (libXt).

  • Fixes a memory leak in the X Toolkit library (libXt). This memory leak could be seen by applications that create and destroy many Motif ScrolledWindow widgets.

  • Fixes a memory leak in the X Window System's X Toolkit library (Xt) that could occur when creating and destroying Motif List, Text, and TextField widgets.

  • Fixes a problem in the X Toolkit library (Xt) which could cause the TeMIP Iconic_map Presentation Module application (mcc_iconic_map) to crash.

Patch 1395.00

OSF440-846

Patch: Security (SSRT2189)

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the at command. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability.

Patch 1397.00

OSF440-684

Patch: Fixes a problem with ATM signalling

State: Supersedes patch OSF440-486 (733.00)

This patch corrects the following:

  • Fixes a problem of ATM signalling going into "connection released" after a system reboot.

  • Fixes an ATM signaling problem.

Patch 1399.00

OSF440-713

Patch: XTI may experience a fatal error

State: Supersedes patch OSF440-049 (43.00), OSF440-531 (731.00)

This patch corrects the following:

  • Fixes a problem with XTI over TCP/IP when tcp_sendspace and tcp_recvspace have been decreased to 1K. When sending 4K data (using t_snd), the call is successful but no data has been sent and no message is returned.

  • Corrects a memory leak in the XTI socket code.

  • Corrects a problem in XTI which could result in a fatal error if a server was slow in responding and the client queues were backed up.

Patch 1401.00

OSF440-1009

Patch: Command transfer size changed to avoid kernel memory fault

State: New

This patch fixes re_ioctl() cases DIODCMD and DIODCDB. It has been changed to handle a case where the command transfer size has been changed to avoid a kernel memory fault.

Patch 1403.00

OSF440X11-048B

Patch: PowerStorm 4D20 graphics card draws fonts incorrectly

State: New

This patch fixes a problem with a Compaq Professional Workstation XP1000 667 MHz system with a PowerStorm 4D20 (PBXGB-CA) graphics card where fonts were sometimes drawn incorrectly.

Patch 1405.00

OSF440-892

Patch: Corrects improper file or privilege management

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1414.00

OSF440-898

Patch: Provides fixes for the fixfdmn utility

State: Procedes patches OSF440-619 (847.00), OSF440-759 (1406.00), OSF440-767 (1407.00), OSF440-764 (1408.00), OSF440-805 (1409.00), OSF440-1008 (1410.00), OSF440-753 (1411.00), OSF440-711 (1412.00)

This patch corrects the following:

  • This patch provides support for the fixfdmn utility. The fixfdmn utility is a tool that is used to check and repair corrupted AdvFS domains. Refer to the operating system Release Notes for the complete description.

  • Fixes a case where the fixfdmn utility could core dump on a rare corruption in the tag file.

  • Prevents fixfdmn from changing file sizes unnecessarily.

  • Fixes a case were fixfdmn would abort when the same mcell was on the DDL more than once. Also allows fixfdmn to be run on domains which have been mounted under V5.1B and then moved back to an older version of the OS.

  • The fixfdmn utility will now remove full frag groups from the free frag list in the fileset frag file.

  • Allows fixfdmn to fix a rare corruption case in the RBMT/BMT0.

  • Allows fixfdmn to modify only one page of the transaction log.

  • Fixes a case where the fixfdmn utility exits prematurely with the message "Can't allocate 0 bytes for group use array" and then instructs the user on how to make more memory available, although more memory is not needed.

Patch 1417.00

OSF440-916

Patch: Corrects security vulnerability

State: Supersedes patches OSF440-228 (271.00), OSF440-925 (1415.00)

This patch corrects the following:

  • Fixes a coredump problem with ftp(1) when a .netrc file contains an invalid macdef (macro definition).

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. HP has corrected this potential vulnerability.

  • Corrects a bug in the ftp(1) open command. The optional port argument now accepts port numbers between 32768 and 65535.

Patch 1419.00

OSF440-861

Patch: Corrects improper file or privilege management

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1421.00

OSF440X11-058

Patch: Provides updated Russian keyboard map

State: New

This patch provides an updated keyboard map for the Russian 3R-LKQ48-BT keyboard model.

Patch 1423.00

OSF440-856

Patch: Corrects improper file or privilege management

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1425.00

OSF440-790

Patch: Provides the ckfsec(1) reference page

State: New

This patch delivers the ckfsec(1) reference page.

Patch 1427.00

OSF440-956

Patch: Corrects improper file or privilege management

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1429.00

OSF440-712

Patch: Security (SSRT0664U, SSRT0762U)

State: Supersedes patches OSF440-178 (236.00), OSF440-524 (742.00), OSF440-494 (744.00)

This patch corrects the following:

  • Fixes a problem that occurs when using ftp. When mget or nlist specify a filename with metacharacters and the mode is ASCII, the file is returned with <LF> as the end-of-file separator. With this patch, files are returned with <CR><LF> as the end-of-file separator.

  • Corrects a problem with the ftp daemon which could result in PC ftp clients hanging when transferring some files in ASCII mode.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • Corrects a problem with an ftp daemon failure when using globbing string of several asterisks. An additional correction was made for a character drop with the put command.

Patch 1431.00

OSF440-917

Patch: Corrects improper file or privilege management

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1433.00

OSF440-789

Patch: Provides the ckfsec utility

State: Supersedes patches

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of certain files in world-writable directories. This patch provides the ckfsec utility which can help detect such files.

Patch 1435.00

OSF440-761

Patch: Security (SSRT0794U)

State: Supersedes patch OSF440-022 (20.00)

This patch corrects the following:

  • Fixes a problem that prevents a user from using the ipcs command on a system whose kernel has been booted from a file that is not /vmunix.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. HP has corrected this potential vulnerability.

Patch 1437.00

OSF440-812

Patch: Correction for remote debugging with dbx -remote

State: New

This patch corrects a problem with remote debugging of a system kernel so that it is now possible to do so with KDEBUG enabled.

Patch 1439.00

OSF440-760

Patch: savecore prematurely terminates crash dump recovery

State: New

This patch corrects a problem where savecore may prematurely terminate crash dump recovery on partitions larger than 4GB.

Patch 1442.00

OSF440CDE-053B

Patch: Security (SSRT1-80U)

State: Supersedes patches OSF440CDE-029B (853.00), OSF440CDE-054B (1440.00)

This patch corrects the following:

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the CDE online help. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the CDE online help. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability.

Patch 1444.00

OSF440-857

Patch: Corrects improper file or privilege management

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1446.00

OSF440-944

Patch: scu displays misleading data expected pattern

State: New

This patch fixes a problem with scu where a mismatch between expected and found data displays incorrect data expected.

Patch 1449.00

OSF440X11-057B

Patch: Security (SSRT2280)

State: Supersedes patches OSF440X11-010B (334.00), OSF440X11-026B (471.00), OSF440X11-032B (594.00), OSF440X11-055B (1447.00)

This patch corrects the following:

  • Fixes a problem in which ^C fails to work in dtterm when logged in to a 4.0E or 4.0F system using XDMCP.

  • Prevents a potential core dump from the X11 library when running an input method server for Japanese, Chinese, or Korean.

  • Fixes two memory leaks in the X Window System's X library (Xlib) that can occur when creating and destroying Motif List, Text, and TextField widgets.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in X11 applications. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability.

Patch 1451.00

OSF440CDE-046

Patch: CDE login screen truncates message in issue file

State: New

This patch fixes a problem where the CDE login screen may truncate the message contained in the /etc/issue file when it is displayed.

Patch 1456.00

OSF440-1046

Patch: Fixes a problem with gated

State: New

This patch fixes a core dump problem with the gated daemon.

Patch 1458.00

OSF440-1052

Patch: Security (SSRT3469, SSRT3531)

State: Supersedes patches OSF440-290 (322.00), OSF440-1019 (1292.00)

This patch corrects the following:

  • Fixes a problem where sendmail core dumped when trying to send certain 8-bit, mime-encoded files.

  • A potential security vulnerability has been identified in sendmail which may result in non-privileged users gaining unauthorized access to files or privileged access on the system. This potential vulnerability may be in the form of a local or remote security domain risk.

  • A potential security vulnerability has been reported that may result in unauthorized Privileged Access or a Denial of Service (DoS). This potential vulnerability may be in the form of local and remote security domain risks. HP has corrected this potential vulnerability.

    SSRT3531 sendmail - (Severity - High)

Patch 1464.00

OSF440-1054

Patch: Security (SSRT2400)

State: New

This patch revises the following reference pages for the update of BIND from V4.9.3 to V8.3.4:

named.boot(4)
named.conf(4)
named.star(4)
resolver(4)
bind_intro(7)
bind_manual_setup(7)
named-bootconf(8)
named-xfer(8)
named(8)
nslookup(8)

Patch 1466.00

OSF440-1049

Patch: Fixes a problem in rpc.lockd

State: Supersedes patch OSF440-496 (686.00)

This patch corrects the following:

  • Fixes a problem in rpc.lockd where the FCNTL () function fails to lock NFS mounted directories.

  • Fixes three issues with rpc.lockd dealing with replies to message passing RPCs, requests from hosts with multiple IP addresses, and grant messages issued to down clients.

Patch 1468.00

OSF440-1067

Patch: Fixes a potential panic in the auditing of the swapctl syscall

State: New

This patch fixes a potential panic in the auditing of the swapctl syscall.

Patch 1470.00

OSF440-788C

Patch: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

Patch 1476.00

OSF440-1037

Patch: Fix for rm command

State: Supersedes patch OSF440-989 (1139.00)

This patch corrects the following:

  • Addresses a performance issue of rm -r with large directories.

  • Fixes a problem with the race condition in the rm command, wherein two threads can successfully delete a file simultaneously.

Patch 1478.00

OSF440-1050

Patch: Security (SSRT3498, SSRT3498)

State: New

This patch fixes a potential problem in screend.

Patch 1480.00

OSF440-1043

Patch: Fixes SDLT media error caused bus resets

State: Supersedes patches OSF440-062 (56.00), OSF440-119 (95.00), OSF440-129 (103.00), OSF440-072 (151.00), OSF440-235 (274.00), OSF440-386 (436.00), OSF440-561 (714.00), OSF440-568 (716.00), OSF440-601 (837.00), OSF440-780 (1340.00), OSF440-900 (1341.00), OSF440-723 (1342.00), OSF440-901 (1344.00)

This patch corrects the following:

  • Fixes a problem in which a system with a KZPCA host bus adapter may hang when the SCSI bus is reset.

Patch 1480.00

continued

  • Fixes excessive I/O command timeouts when using KZPCM on CLIPPERs causing disk I/O to be retried and fatal tape I/O errors. Additionally, the ITPSA driver now supports the KZPCM, 8951U, and 8952U adapters. Support has also been added to identify hardware in the event log.

  • Fixes the following problems related to the ITPSA driver that supports the KZPCM adapter:

    • A panic, machine check, or hang can occur when aborting an I/O due to a command timeout or aborting an application program with pending I/Os.

    • Errors can occur while the system is processing a SCSI bus or SCSI bus device reset request that is issued from the class driver.

    • On the 8951U and 8952U adapters, SCSI bus resets are lost when these adapters are connected to single-ended drives.

    • A panic can occur during boot when lockmode is set to 4.

  • Fixes a problem with the ITPSA driver for KZPCM and KZPCA devices which resulted in a synchronization problem, causing the SCSI bus to hang.

  • Fixes the following ITPSA driver problems:

    • The chip interrupt register fields in error log are incorrect.

    • Lessens the opportunity of aborts being issued for an already completed I/O.

    • A kernel memory fault panic caused by a SWS data structure being released twice.

    • A simple lock timeout panic. It was possible for a bus reset to be generated before the previous bus reset was processed, causing excessive processing within the ISR.

    • The driver negotiated for ULTRA2 speed when it was attached to a single-ended bus.

    • The system will panic in itpsa_allocReq() on boot when lockmode=4 is set.

    • Fixes a problem with some slower tape devices serviced by the ITPSA driver by lengthening the timeout value used.

    • Fixes a problem that can cause a simple lock timeout or a kernel memory fault on EV6 systems using the ITPSA driver.

    • Fixes a panic in the ITPSA driver. It is seen when an abort to the SCSI rewind command is issued to a TLZ10 tape device.

  • Adds the capability for KZPCA devices to work with SCSI devices that only support asynchronous data transfers.

  • Fixes a kernel memory fault related to the KZPCA adapter.

  • Fixes a kernel memory fault panic after an "ITPSA: itpsa_action - error converting path ID to ITPSA softc structure" message.

  • Fixes the SDLT media error which caused bus resets with KZPCA adapters.

  • Fixes a problem in the KZPCA ITPSA driver that is seen when a SCSI target presents multiple LUNs.

Patch 1482.00

OSF440-1036

Patch: Fixes a buffer overflow problem in the write command

State: New

This patch fixes a buffer overflow problem in the write command.

Patch 1491.00

OSF440-1094

Patch: Fix for tape read-write operations failure

State: Supersedes patches OSF440-005 (44.00), OSF440-224 (267.00), OSF440-238 (277.00), OSF440-255 (290.00), OSF440-319 (333.00), OSF440-298 (363.00), OSF440-308 (367.00), OSF440-406 (454.00), OSF440-422 (546.00), OSF440-625 (815.00), OSF440-899 (1221.00), OSF440-745 (1222.00), OSF440-923 (1224.00), OSF440-1084 (1487.00), OSF440-100 (77.00), OSF440-248 (284.00), OSF440-624 (809.00)

This patch corrects the following:

  • Fixes a kmf problem in bucket 2 (64-byte bucket) when the type of SCSI device dynamically changes.

  • Corrects a problem in which the wrong status could be returned when using a tape device.

  • Increases the performance of random I/O on the HSG80 disk controller.

  • Fixes a problem in which the system can panic with a kernel memory fault.

  • Fixes a problem with continuous resets when an I/O command is causing the resets.

  • Fixes a problem with a read capacity recovery failure.

  • Fixes a problem with bad block replacement (BBR) processing.

  • Fixes a problem where programs that read, analyze, and monitor disk statistics (such as collect) will occasionally display incorrect results.

  • Fixes a problem in which the system can panic with a kernel memory fault during an installation with an HSZ70 or HSZ80 connected to the system.

  • Fixes a problem when the type of SCSI device dynamically changes, which can result in a kernel memory fault or memory corruption panic.

  • Fixes a simple lock panic.

  • Corrects a problem where interrupting an aseagent daemon with a signal can cause devices to become unaccessible.

  • Fixes erroneous disk utilization values reported by the table system call.

  • Fixes a problem where threads are hung in I/O after a disk device has completed error recovery.

  • Adds support for the SuperDLT1 and the SDLT320.

  • Provides support for possible future tape devices.

  • Fixes the problem where the tapex -L command would report failure when run on certain devices. The failure would be reported when the command was run on certain TLZ09 devices, depending on the firmware.

  • Fixes a problem that could result in unit attention status being missed.

  • Fixes the problem where tape read/write operations fail with following repetitive binary.errorlog message:

    ctape_strategy: Device state flags indicate a Reserve is Pending

  • Fixes the problem where tapes reporting a SCSI version other than 2 would not work properly.

Patch 1493.00

OSF440-1100

Patch: Security (SSRT2275, SSRT2301, SSRT2309, SSRT2412)

State: Supersedes patches OSF440-426 (532.00), OSF440-443 (515.00), OSF440-285 (318.00), OSF440-171 (231.00), OSF440-343 (394.00), OSF440-400 (448.00), OSF440-113 (89.00), OSF440-177 (235.00), OSF440-184 (241.00), OSF440-053 (47.00), OSF440-334 (387.00), OSF440-529 (701.00), OSF440-608 (833.00), OSF440-236 (275.00), OSF440-254 (289.00), OSF440-333 (386.00), OSF440-485 (538.00), OSF440-452 (540.00), OSF440-509 (666.00), OSF440-658 (807.00), OSF440-114 (90.00), OSF440-009 (168.00), OSF440-226 (269.00), OSF440-401 (449.00), OSF440-017 (15.00), OSF440-026 (23.00), OSF440-027 (24.00), OSF440-028 (25.00), OSF440-146 (120.00), OSF440-055 (142.00), OSF440-066 (145.00), OSF440-077 (156.00), OSF440-096 (175.00), OSF440-318 (376.00), OSF440-359 (410.00), OSF440-392 (440.00), OSF440-464 (521.00), OSF440-390 (654.00), OSF440-532 (655.00), OSF440-551 (656.00), OSF440-498 (657.00), OSF440-552 (659.00), OSF440-599 (790.00), OSF440-620 (792.00), OSF440-102 (79.00), OSF440-151 (125.00), OSF440-035 (138.00), OSF440-093 (172.00), OSF440-115 (91.00), OSF440-098 (177.00), OSF440-094 (173.00), OSF440-193 (247.00), OSF440-223 (266.00), OSF440-357 (408.00), OSF440-054A (48.00), OSF440-388 (438.00), OSF440-111 (87.00), OSF440-411A (457.00), OSF440-431 (508.00), OSF440-423 (509.00), OSF440-479 (511.00), OSF440-510 (647.00), OSF440-535 (648.00), OSF440-542 (649.00), OSF440-495 (651.00), OSF440-584 (786.00), OSF440-595 (787.00), OSF440-654 (789.00), OSF440-371 (422.00), OSF440-474 (549.00), OSF440-466 (551.00), OSF440-588 (811.00), OSF440-021 (135.00), OSF440-052A (46.00), OSF440-130 (104.00), OSF440-064 (144.00), OSF440-472 (557.00), OSF440-078 (72.00), OSF440-198 (251.00), OSF440-368 (419.00), OSF440-349 (400.00), OSF440-131A (105.00), OSF440-122A (98.00), OSF440-199 (252.00), OSF440-014 (12.00), OSF440-109 (85.00), OSF440-412 (458.00), OSF440-455 (544.00), OSF440-101 (78.00), OSF440-391 (439.00), OSF440-565 (688.00), OSF440-154 (128.00), OSF440-258 (293.00), OSF440-275 (309.00), OSF440-478 (522.00), OSF440-484 (524.00), OSF440-563 (662.00), OSF440-528 (664.00), OSF440-641A (797.00), OSF440-609 (799.00), OSF440-642 (831.00), OSF440-007 (59.00), OSF440-304 (330.00), OSF440-037 (139.00), OSF440-121 (97.00), OSF440-038 (140.00), OSF440-044 (39.00), OSF440-087 (165.00), OSF440-167 (228.00), OSF440-266 (301.00), OSF440-445 (590.00), OSF440-004 (34.00), OSF440-011 (9.00), OSF440-012 (10.00), OSF440-015 (13.00), OSF440-003 (27.00), OSF440-032 (30.00), OSF440-061 (55.00), OSF440-120 (96.00), OSF440-123 (99.00), OSF440-128 (102.00), OSF440-132 (106.00), OSF440-133 (107.00), OSF440-136 (110.00), OSF440-142 (116.00), OSF440-143 (117.00), OSF440-148 (122.00), OSF440-152 (126.00), OSF440-155 (129.00), OSF440-039 (141.00), OSF440-067 (146.00), OSF440-081 (160.00), OSF440-085 (164.00), OSF440-095 (174.00), OSF440-033A (31.00), OSF440-099 (178.00), OSF440-104A (81.00), OSF440-138 (112.00), OSF440-164 (134.00), OSF440-158 (224.00), OSF440-229 (272.00), OSF440-170 (230.00), OSF440-180 (238.00), OSF440-182 (239.00), OSF440-187 (244.00), OSF440-194 (248.00), OSF440-204 (255.00), OSF440-206 (257.00), OSF440-209 (259.00), OSF440-221 (265.00), OSF440-227 (270.00), OSF440-256 (291.00), OSF440-259 (294.00), OSF440-268 (303.00), OSF440-272 (307.00), OSF440-276 (310.00), OSF440-278 (312.00), OSF440-284 (317.00), OSF440-144 (118.00), OSF440-036 (33.00), OSF440-056 (49.00), OSF440-057 (50.00), OSF440-058 (51.00), OSF440-059 (52.00), OSF440-112 (88.00), OSF440-125 (100.00), OSF440-141 (115.00), OSF440-147 (121.00), OSF440-060A (54.00), OSF440-082 (161.00), OSF440-305 (331.00), OSF440-166 (227.00), OSF440-174 (234.00), OSF440-208 (258.00), OSF440-213 (261.00), OSF440-220 (264.00), OSF440-244 (280.00), OSF440-257 (292.00), OSF440-265 (300.00), OSF440-289 (321.00), OSF440-097A (176.00),

Patch 1493.00

continued

OSF440-303 (329.00), OSF440-168A (229.00), OSF440-107 (83.00), OSF440-191 (246.00), OSF440-159 (131.00), OSF440-088 (73.00), OSF440-065 (58.00), OSF440-207 (180.00), OSF440-239 (210.00), OSF440-253 (288.00), OSF440-269 (304.00), OSF440-288 (320.00), OSF440-294 (326.00), OSF440-018 (16.00), OSF440-157 (130.00), OSF440-314 (332.00), OSF440-073 (152.00), OSF440-219 (263.00), OSF440-116 (92.00), OSF440-070 (149.00), OSF440-071 (150.00), OSF440-216 (181.00), OSF440-196 (250.00), OSF440-240 (278.00), OSF440-270 (305.00), OSF440-110 (86.00), OSF440-292 (324.00), OSF440-160 (132.00), OSF440-200 (360.00), OSF440-297 (362.00), OSF440-302 (365.00), OSF440-307 (366.00), OSF440-309 (368.00), OSF440-310 (369.00), OSF440-311 (370.00), OSF440-312 (371.00), OSF440-313 (372.00), OSF440-317 (375.00), OSF440-320 (377.00), OSF440-322 (379.00), OSF440-324 (380.00), OSF440-328 (382.00), OSF440-335 (388.00), OSF440-337 (389.00), OSF440-340 (391.00), OSF440-341 (392.00), OSF440-342 (393.00), OSF440-346 (397.00), OSF440-347 (398.00), OSF440-348 (399.00), OSF440-352 (403.00), OSF440-353 (404.00), OSF440-360 (411.00), OSF440-361 (412.00), OSF440-362 (413.00), OSF440-363 (414.00), OSF440-367 (418.00), OSF440-372 (423.00), OSF440-373 (424.00), OSF440-374 (425.00), OSF440-375 (426.00), OSF440-379 (429.00), OSF440-380 (430.00), OSF440-382 (432.00), OSF440-383 (433.00), OSF440-393 (441.00), OSF440-394 (442.00), OSF440-397 (445.00), OSF440-398 (446.00), OSF440-405 (453.00), OSF440-407 (455.00), OSF440-414 (459.00), OSF440-415 (460.00), OSF440-417 (462.00), OSF440-295 (327.00), OSF440-250 (286.00), OSF440-331 (385.00), OSF440-419 (464.00), OSF440-418 (463.00), OSF440-364 (415.00), OSF440-408 (456.00), OSF440-135 (109.00), OSF440-140 (114.00), OSF440-225 (268.00), OSF440-263 (298.00), OSF440-434 (483.00), OSF440-424 (484.00), OSF440-436A (485.00), OSF440-457 (486.00), OSF440-480 (487.00), OSF440-458 (488.00), OSF440-447 (489.00), OSF440-483 (490.00), OSF440-450 (491.00), OSF440-481 (492.00), OSF440-435 (493.00), OSF440-454 (494.00), OSF440-427 (495.00), OSF440-456 (496.00), OSF440-477 (497.00), OSF440-449 (498.00), OSF440-471 (499.00), OSF440-442 (500.00), OSF440-482 (501.00), OSF440-446 (502.00), OSF440-465 (503.00), OSF440-469 (505.00), OSF440-063 (57.00), OSF440-075 (154.00), OSF440-476 (519.00), OSF440-534 (599.00), OSF440-578 (600.00), OSF440-579 (601.00), OSF440-514 (602.00), OSF440-559 (603.00), OSF440-554 (604.00), OSF440-550 (605.00), OSF440-492 (606.00), OSF440-489 (607.00), OSF440-567 (608.00), OSF440-605 (609.00), OSF440-544A (610.00), OSF440-574 (611.00), OSF440-530 (612.00), OSF440-500 (613.00), OSF440-490 (614.00), OSF440-577 (615.00), OSF440-540 (616.00), OSF440-585A (617.00), OSF440-569 (618.00), OSF440-546 (619.00), OSF440-497 (620.00), OSF440-503 (621.00), OSF440-505 (622.00), OSF440-522 (623.00), OSF440-487 (624.00), OSF440-562 (625.00), OSF440-460 (626.00), OSF440-560 (627.00), OSF440-570 (628.00), OSF440-558 (629.00), OSF440-553 (630.00), OSF440-543 (631.00), OSF440-536 (632.00), OSF440-491 (633.00), OSF440-557 (634.00), OSF440-617 (635.00), OSF440-525 (636.00), OSF440-501 (637.00), OSF440-504 (638.00), OSF440-549 (640.00), OSF440-656 (747.00), OSF440-632 (748.00), OSF440-651 (749.00), OSF440-630 (750.00), OSF440-629 (751.00), OSF440-612 (752.00), OSF440-636 (753.00), OSF440-590A (754.00), OSF440-665 (755.00), OSF440-655 (756.00), OSF440-633 (757.00), OSF440-646 (758.00), OSF440-635 (759.00), OSF440-600 (760.00), OSF440-649 (761.00), OSF440-593 (762.00), OSF440-645 (763.00), OSF440-652 (764.00), OSF440-626 (765.00), OSF440-653 (766.00), OSF440-611 (767.00), OSF440-597 (768.00), OSF440-648 (769.00), OSF440-657 (770.00), OSF440-634 (771.00), OSF440-644 (772.00), OSF440-573 (773.00), OSF440-628 (774.00), OSF440-621 (775.00), OSF440-603 (776.00), OSF440-660 (777.00), OSF440-666 (778.00),

Patch 1493.00

continued

OSF440-596 (779.00), OSF440-602 (781.00), OSF440-703 (857.00), OSF440-729 (859.00), OSF440-090 (169.00), OSF440-188 (245.00), OSF440-734 (860.00), OSF440-931 (861.00), OSF440-1015 (862.00), OSF440-792 (863.00), OSF440-972 (864.00), OSF440-897 (865.00), OSF440-803 (866.00), OSF440-778 (867.00), OSF440-682 (868.00), OSF440-887 (869.00), OSF440-873A (870.00), OSF440-913 (871.00), OSF440-671 (872.00), OSF440-670 (873.00), OSF440-678 (874.00), OSF440-817 (875.00), OSF440-1016 (876.00), OSF440-732 (877.00), OSF440-962 (878.00), OSF440-756 (879.00), OSF440-968 (880.00), OSF440-1007 (881.00), OSF440-763 (882.00), OSF440-844 (883.00), OSF440-1011 (884.00), OSF440-801 (885.00), OSF440-896 (886.00), OSF440-985 (887.00), OSF440-827 (888.00), OSF440-990 (889.00), OSF440-781 (890.00), OSF440-668 (891.00), OSF440-870 (892.00), OSF440-1018 (893.00), OSF440-811 (894.00), OSF440-924 (895.00), OSF440-693 (896.00), OSF440-847 (897.00), OSF440-849 (898.00), OSF440-769 (899.00), OSF440-837 (900.00), OSF440-700 (901.00), OSF440-911 (902.00), OSF440-720 (903.00), OSF440-934A (904.00), OSF440-941 (905.00), OSF440-725 (906.00), OSF440-779 (907.00), OSF440-709 (908.00), OSF440-1012 (909.00), OSF440-893 (910.00), OSF440-946 (911.00), OSF440-718 (912.00), OSF440-762 (913.00), OSF440-838 (914.00), OSF440-940 (915.00), OSF440-964 (916.00), OSF440-730 (917.00), OSF440-879 (918.00), OSF440-1003 (919.00), OSF440-902 (920.00), OSF440-695 (921.00), OSF440-914 (922.00), OSF440-991 (923.00), OSF440-786 (924.00), OSF440-831 (925.00), OSF440-771 (926.00), OSF440-776 (927.00), OSF440-791 (928.00), OSF440-699 (929.00), OSF440-701 (930.00), OSF440-741 (931.00), OSF440-679 (932.00), OSF440-886 (933.00), OSF440-672 (934.00), OSF440-905 (935.00), OSF440-716 (936.00), OSF440-802 (937.00), OSF440-726 (938.00), OSF440-922 (939.00), OSF440-697 (940.00), OSF440-881 (941.00), OSF440-692 (942.00), OSF440-738 (943.00), OSF440-737 (944.00), OSF440-698 (945.00), OSF440-952 (946.00), OSF440-663 (947.00), OSF440-819 (948.00), OSF440-866 (949.00), OSF440-788A (950.00), OSF440-661 (951.00), OSF440-742 (952.00), OSF440-874 (953.00), OSF440-821 (954.00), OSF440-841 (955.00), OSF440-664 (956.00), OSF440-809 (957.00), OSF440-676 (958.00), OSF440-833 (959.00), OSF440-806 (960.00), OSF440-880 (961.00), OSF440-794 (962.00), OSF440-984A (963.00), OSF440-951 (964.00), OSF440-685 (965.00), OSF440-987 (966.00), OSF440-884 (967.00), OSF440-814 (968.00), OSF440-876 (969.00), OSF440-1034 (970.00), OSF440-903 (971.00), OSF440-707 (972.00), OSF440-907 (973.00), OSF440-1001 (974.00), OSF440-799 (975.00), OSF440-757 (976.00), OSF440-1004 (977.00), OSF440-748 (978.00), OSF440-889 (979.00), OSF440-816 (980.00), OSF440-754 (981.00), OSF440-687 (982.00), OSF440-1005 (983.00), OSF440-835 (984.00), OSF440-772 (985.00), OSF440-673 (986.00), OSF440-854 (987.00), OSF440-997 (988.00), OSF440-688 (989.00), OSF440-933 (990.00), OSF440-832 (991.00), OSF440-966 (992.00), OSF440-719 (993.00), OSF440-727 (994.00), OSF440-992A (995.00), OSF440-895 (996.00), OSF440-826 (997.00), OSF440-715 (998.00), OSF440-680 (999.00), OSF440-785 (1000.00), OSF440-810A (1001.00), OSF440-834 (1002.00), OSF440-836 (1003.00), OSF440-906 (1004.00), OSF440-875 (1005.00), OSF440-714 (1006.00), OSF440-829 (1007.00), OSF440-689 (1008.00), OSF440-915 (1009.00), OSF440-818 (1010.00), OSF440-783 (1011.00), OSF440-973 (1012.00), OSF440-691 (1013.00), OSF440-702 (1014.00), OSF440-871 (1015.00), OSF440-808 (1016.00), OSF440-733 (1017.00), OSF440-843 (1018.00), OSF440-850A (1019.00), OSF440-967 (1020.00), OSF440-721 (1021.00), OSF440-787 (1022.00), OSF440-976 (1023.00), OSF440-963 (1024.00), OSF440-882 (1025.00), OSF440-957 (1026.00), OSF440-813 (1027.00), OSF440-743 (1028.00), OSF440-867 (1029.00), OSF440-815 (1030.00), OSF440-746 (1031.00),

Patch 1493.00

continued

OSF440-669 (1032.00), OSF440-735 (1033.00), OSF440-912 (1034.00), OSF440-749 (1035.00), OSF440-770 (1036.00), OSF440-728 (1037.00), OSF440-942 (1038.00), OSF440-667 (1039.00), OSF440-696 (1040.00), OSF440-694 (1041.00), OSF440-840 (1042.00), OSF440-724 (1043.00), OSF440-740 (1044.00), OSF440-1017 (1045.00), OSF440-758 (1046.00), OSF440-777 (1047.00), OSF440-855 (1048.00), OSF440-690 (1049.00), OSF440-662 (1050.00), OSF440-860 (1051.00), OSF440-755 (1052.00), OSF440-865 (1053.00), OSF440-830 (1054.00), OSF440-949 (1055.00), OSF440-705 (1452.00), OSF440-708 (1057.00), OSF440-965 (1143.00), OSF440-1026 (1460.00), OSF440-1048 (1454.00), OSF440-1053 (1459.00), OSF440-1065 (1461.00), OSF440-1063 (1462.00), OSF440-1070 (1471.00), OSF440-1020 (1472.00), OSF440-1024 (1474.00), OSF440-1083 (1483.00), OSF440-1076 (1485.00), OSF440-1088 (1489.00)

This patch corrects the following:

  • Corrects slow shutdown due to name lookups while deleting routes.

  • Prevents a "not currently mounted" warning message from being displayed for file systems the user did not request to umount.

  • Fixes a problem with the btcreate command where it does not pass the full pathname to newfs.

  • Corrects a problem in the btextract script which could result in the failure of the script due to a problem in the use of the grep utility in the script.

  • Fixes a problem with the btcreate command where default restore fails if disklabel is different.

  • Fixes a problem with btcreate not waiting long enough for the next tape to be loaded with some media changers.

  • Fixes system crashes seen on ASE or TruCluster systems when changing the network interfaces. The stack is not informative and the panic may be "trap: illegal instruction", or "kernel memory fault".

  • Corrects a problem where ICMP redirect packets can modify the default route.

  • Fixes a problem where vi puts the server port into PASSALL MODE (where XON/XOFF is no longer effective). This creates garbage in the file.

  • Fixes the error handling when invalid multibyte sequences are encountered in the more, ex, and vi commands.

  • Fixes a problem in which the vi editor core dumps when it finds invalid syntax during a substitute operation.

  • Fixes the following editors to handle tags functionality using the CTRL-T key:

    vi
    edit
    ex
    view
    vedit

  • When printing jobs, a timeout can occur after five minutes which causes some large print jobs to stop, then resume printing from the beginning of the print job.

Patch 1493.00

continued

  • When slave lpd daemons try to process jobs on the print queue, some of them can fail to obtain a lock on the lock file, and exit with an error.

  • Print jobs will print out twice.

  • A remote print job may fail to print, with the error message:

    lstat/open failed for dfA... no such file or directory

  • If a print job is printing, and the connection to the remote printer is lost, the print job does not resume printing after the connection is restored.

  • Sometimes, as sequence numbers wrap around from 999 to 000, job 000 gets submitted before, and prints before, job 999.

  • The lpstat -u output is incorrect.

  • When using the I18N ya option, the queue daemon filters will terminate after 32 jobs.

  • Under certain circumstances, print jobs are terminated when printing to certain printers that are connected to a DECserver through TCP/IP.

  • When lpd reads any data from the printer that has not been read, for local and remote connections, the read-backs for remote connections cause an additional 2-second time out which may cause a job-submit failure on the job-number wraparound.

  • Corrects a problem in which, under certain conditions, unnecessary error messages are written to the lpr.log file.

  • A user is unable to delete a print job from a remote system with a hostname greater than 32 characters because the hostname was truncated.

  • When a TCP/IP connection fails, the retry algorithm would take longer to print jobs due to a long retry interval.

  • A timing hole during lpd last-job completion and shutdown needed to be closed.

  • It was not possible to print to the lpd queue using Windows 2000.

  • Introduces the JJ /etc/printcap parameter, which allows the user to choose either one TCP/IP connection for all jobs in the print queue (JJ=1), or a TCP/IP connection for each job in the print queue (JJ=0). It also closes a timing hole that existed when lpd was shutting down.

  • Fixes a problem in which lpd hangs when printing to advanced server queues (using /dev/null).

  • Fixes an lpd problem, a memory leak associated with the allocation of a buffer.

  • Corrects how the C shell handles 2-byte characters when running in the Japanese SJIS locale.

  • Corrects the printing of Japanese SJIS strings that are assigned to shell variables in the C shell (csh).

  • Fixes a problem in the C shell (csh) in which a segmentation fault will occur when the user defines an environmental variable which exceeds the 2048 character limitation. This limit has been lengthened to 8192 characters.

  • Fixes a C shell problem where multibyte characters may not be displayed properly inside quotes.

  • Fixes a problem with /usr/bin/ksh and the named-pipe (FIFO) communication that is used by applications.

Patch 1493.00

continued

  • Corrects a problem that was causing ksh to core dump in vi editing mode. ksh was core dumping intermittently when using "." to repeat a command.

  • ksh does a segmentation fault and core dumps when displaying a here-document.

  • Fixes problems in ksh, file, tail, nawk, awk, and pax:

    • Unexpected logouts and terminal hangups occur when using the /bin/su command and /bin/ksh as a login shell.

    • The file command gives incorrect output concerning WAV audio files.

    • The tail command gives erroneous output when used with both the -n and -r flags.

    • The maximum number of fields per record was changed from 99 to 199 for the awk command.

    • The tar/pax program did not always read the last tape record of an archive. This caused confusion for scripts that were reading a series of archives on the no-rewind device.

  • Fixes a problem in ksh which required two SIGTERM signals to be sent to the process when it exec'ed.

  • Corrects a problem that may cause ksh to core dump when displaying a large here-document in a ksh script.

  • Fixes a problem that caused incorrect file dates to be restored when pax was used to copy files.

    The problem occurred in the following cases:

    • If the file was a nonempty directory.

    • If the file was the target of another symbolic link.

  • Fixes a core dump from ksh.

  • Fixes a problem with the Korn shell where data loss occurs when commands are piped together.

  • Fixes a problem in ksh in which a space after the -p switch would cause the command to fail.

  • Fixes a problem in ksh. When the current working directory is / and the command cd .. is entered, the following error message is displayed:

    ksh: ..: bad directory

  • Fixes a cpio hanging problem in the Japanese locales.

  • Fixes a problem with the tar command. Corruption occurs when restoring a file system that contains more than two hard links to a file.

  • Fixes a problem where the tar -F (Fasttar) option ignores files named err but does not ignore files named errs and directories named SCCS and RCS.

  • Fixes a possible handling problem with multibyte character boundary conditions in ksh script processing.

Patch 1493.00

continued

  • Corrects pax/tar/cpio to properly extract explicitly specified files. When an archive contained a file with extended attributes and a different file (occurring later in the archive) was specified to be extracted, improper buffer pointer management resulted in the following display (example uses tar):

    tar: /dev/nrmt0h : This doesn't look like a tar archive
    tar: /dev/nrmt0h : Skipping to next file...
    tar: Memory allocation failed for extended data while reading :
          Not enough space

    The directory option was similarly affected. In this case the information for the specified file was not reported.

  • Fixes a problem with the tar and pax programs. These programs incorrectly append files to an existing archive and cause the file to become corrupt.

  • Fixes two ksh problems that occur in multi-byte Asian locales.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • Fixes a problem in which /usr/bin/ksh hangs for certain scripts that contain wait(1).

  • Modifies the strftime() function to make the %V format specifier return the correct week.

  • Fixes a problem of password error messages not being displayed during installation of the security subsystem.

  • The routines wprintf(), swprint(), and fwprintf() do not handle the S format correctly. Instead of treating the data as logical characters, they treat data as bytes.

  • Fixes problems with rsh(1), rlogin(1), and rcp(1) if netgroup names are defined with uppercase letters.

  • Fixes a problem with portmap by allowing RPC select() timeouts to occur when interrupted by signals.

  • Fixes and enhances the quotacheck and fsck commands.

  • Fixes a problem in which the fsck utility may be unable to repair a UFS filesystem.

  • Fixes a problem in which ufs_fsck can get blocked while attempting to flush NFS buffers for a service that has become suspended.

  • Fixes a problem that was causing the csh globbing function to be extremely slow when accessing file information on NFS, AFS, or VMSTM file systems.

  • Increases the length of the user names for rsh and rexec to allow for NT interoperabilty.

  • Fixes a problem where gmtime() was erroneously setting the tzname[0] array.

  • Fixes problems in the DECthreads library for Tru64 UNIX. Included in this patch are changes to support Ladebug enhancements and a bug fix for applications which employ SCS threads of different priorities.

  • Fixes bugs in the DECthreads library that would affect threaded applications running on Tru64 UNIX V4.0F. The changes are related to synchronous signal processing and thread scheduling.

  • Addresses performance and scalibility issues for highly contended threaded applications running on EV6 SMP machines.

Patch 1493.00

continued

  • Fixes a problem in libc that affects debugger tracebacks of code containing split procedures.

  • Adds functionality to terminate the resulting string from calls to swprintf().

  • Fixes a problem for those applications that assume initial allocations of memory from the C run-time library's malloc() function will return only zero-filled memory.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • Fixes four problems for threaded applications on Tru64 UNIX V4.0F:

    • _pthreads_legacy_init_routine shows up as an unresolved symbol.

    • Programs linked -taso experienced truncated address values resulting in SEGV or data corruption errors.

    • A memory leak when the pthread_attr_setname_np function is used.

    • pthread_setname_np occasionally returning an EINVAL error.

  • Fixes a bug where quotacheck -v <filestystem> will report that it has fixed some quotas. If you keep running the command, it will keep reporting the exact same fixes.

  • Fixes a problem that effects threaded programs compiled with the taso option on Tru64 UNIX V4.0F. The default stack size for taso user threads in DECthreads V3.16 was too large.

  • Corrects the problem of a rexec command hanging on a system.

  • Fixes the following problems with the mv command:

    • An invalid error message when attempting to move files in which the source name is the same as the destination name.

    • When using mv -i to rename a symlink pointing to a file on a different file system owned by a different user, it results in the prompt:

      Ownership of y will change. Continue?

    • When moving a file from one file system to another, the mv command will copy the file rather than using the rename() system call. This can result in file loss.

  • Corrects the problem with the mv(1) command deleting files in the directory when the user moves a directory to itself.

  • Fixes a problem in which the mv command will not perform a move if the inode of the file is the same as the inode of the destination directory, even though the file and directory are on different file systems.

  • Eliminates the previous limitation on the maximum number of external symbols that could be handled by the ar command.

  • The keymap used with curses functionality was not in sync with the table contained in the term.h header file. This change corrects that and enables several nonfunctioning keys in curses-based applications.

  • Fixes a problem where systems could hang in the audit code, preventing rlogins or telnets into it.

Patch 1493.00

continued

  • When starting or stopping NFS, NFS was not checking for NFS daemons running.

  • rpc.pcnfsd was causing core dumps when receiving a SIGTERM signal.

  • Fixes a problem with the what command. This command was unable to process more than one input file at once.

  • Updates the FORE ATM (lfa) driver to Revision V1.0.14.

  • Updates the lfa ATM driver to V1.0.16 and fixes the following two ATM driver problems:

    • Fixes a soft hang that can occur when running NFS over ATM.

    • Allows the ATM subsyst.

  • Updates the lfa ATM device driver to V1.0.17 and adds some enhancements as well as a fix for a kernel memory fault seen when either shutting down or restarting the device driver.

  • Fixes a problem of NetRAIN devices failing to come up after the rcinet restart command is entered.

  • This patch fixes a class_admin/class_daemon problem. When a PID is added to a class it cannot be removed from the class scheduler until the process terminates or the class_scheduler has been stopped.

  • Fixes the name demangling for the tools that print symbol table names generated by the C++ V6.2 compiler. This problem will only occur for most C++ objects compiled with the ANSI options.

  • Fixes a problem with nm that can cause a core dump when the LANG environment variable is set.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • Fixes a problem where some crontab jobs would run multiple times in the same minute.

  • Fixes two cron problems:

    • The cron daemon does intensive logging and fills up the disk.

    • Multiple cron daemons continue to run and consume system resources due to the fact that after a user is deleted from the system there are still jobs running on the user's behalf.

  • Fixes a problem in viewing a variable subrange parameter from a Pascal module while using dbx.

  • Fixes three problems in dbx:

    • dbx stack trace is incomplete.

    • Assignment to a variable would fail after viewing a non-local symbol.

    • The use of vfork would raise a signal 66.

  • Fixes problems with the dbx kernel debug option when used on kernel core files from AlphaServer GS Series systems and other large memory systems.

Patch 1493.00

continued

  • Provides bug fixes to the sys_check utility and updates the sys_check to version 114.

  • Provides the following changes to the sys_check utility:

    • Fixes the ra200info tool from core dumping.

    • Adds the sysconf program.

  • Fixes the following two problems with the collect information tool used by the sys_check utility:

    • A security hole where a user can become root.

    • Collect cannot start at boot time due to incorrectly handling SIGHUP signal.

  • Upgrades sys_check utiility to version 119.1 and provides the following changes:

    • Two NFS problems.

    • Fixes the ra200info tool from core dumping.

    • Utilizes Compaq Analyze when available.

    • Utilizes the new storage cliscript tool in place of hsxterm.

    • Updates the ASU section.

  • Fixes several problems with the collect command, and adds sysloging when collect suspends, resumes, or receives a signal.

  • Fixes errors generated by syscheck when NFS is not configured.

  • Upgrades sys_check to V120.

  • A potential security vulnerability has been discovered where, under certain circumstances, users can clobber temporary files created by shell commands and utilities (for example, under /sbin, /usr/sbin, /usr/bin, and /etc). HP has corrected this potential vulnerability.

  • Fixes the Collect's collector (/usr/sbin/collect) to correctly report the network interface load percentage.

  • Provides the /usr/lbin/mkstemp program which allows the mechanism to create a secure temporary file.

  • When using tip or any other method over the serial com lines to a receiver that sends frequent xoff/xon, characters are randomly repeated.

  • On a DECstation 1290.00/300, the second com port (tty01) does not get configured. An error message "ksh: /dev/tty01: cannot create" is displayed when the tty01 port is accessed.

  • Fixes a serial line hang and enables the halt switch on Eiger.

  • Fixes a kernel problem where proper locking/reference count management was not being performed. This could result in a "lock-terminate: lock held" system panic.

  • Fixes invalid malloc message in mfs.

  • Fixes a problem with the newfs command. When the newfs -N command was run on a mounted file system, it returned an error message similar to the following:

    newfs: /dev/rrz0c: is marked in the disklabel as in use by: 4.2BSD

  • Fixes a problem where a system panic will occur when accessing an ISO9660 format CD-ROM.

Patch 1493.00

continued

  • Fixes a problem with CDFS. Data corruption occurs when reading beyond the end of a partition.

  • Fixes a problem in which the system may memory fault if the TCR/ASE server no longer had access to the CD-ROM device.

  • Fixes a problem where the system can panic with the panic string "secsize_resid < d_reclen" when accessing a defective CD-ROM.

  • Fixes a problem with CDFS. Fatal errors occur when trying to load data from a CDFS CD-ROM over NFS.

  • Fixes a panic seen when accessing the kio subsystem (such as with consvar) with improper arguments. The panic was caused by a kernel double-free, and would most likely be seen as a corruption in either the 64- or 96-byte bucket (buckets 2 and 16).

  • Fixes a problem where process accounting data was not written to the accounting file when it was on an NFS-mounted file system.

  • Corrects a "simple_lock: time limit exceeded" panic in softclock_scan().

  • Fixes a kernel memory fault from socket code. The kernel memory fault results from failing to get a lock on a list of threads that have requested resources on a socket.

  • Corrects a problem where a signal is delivered, but not responded to, by the target process.

  • Fixes a panic of "get_color_bucket: empty buckets" when the sysconfig attribute private-cache-percent is non-zero.

  • A potential security vulnerability has been discovered where, under certain circumstances, users may gain unauthorized access. HP has corrected this potential vulnerability.

  • Fixes a problem with the mount command where it sometimes kills other processes.

  • Fixes problems with loadable drivers indicated by a maximum device number, lack of device number 0, or failure to reconfigure or reload a driver.

  • Fixes a problem in which mount would incorrectly fall back to Version 2 after certain errors had been encountered using Version 3.

  • Fixes an nfs/ufs/vm deadlock. While serving a client, the system running ASE/DT as an NFS server can hang with deadlock.

  • Fixes a problem in which the system may panic with the error message "kernel memory fault".

  • Fixes several KZPCC RAID controller problems which in turn provides full support of the product.

  • Fixes a problem where applications using the fcntl() system calls may appear to hang.

  • Fixes "simple_lock: time limit exceeded" panics.

  • Fixes two problems: fork can fail to obtain swap space and the resource limitation on core files does not work as documented.

Patch 1493.00

continued

  • Fixes a problem where the system can panic with the following console message:

    bs_bf_htop: invalid handle\n N1 = 0

  • Fixes a system pause seen when doing a lot of I/O to UFS file systems.

  • Fixes a problem that causes system panics when thread_swappable is called with the current_thread as the target thread, when the thread is about to be swapped out.

  • This work provides functionality to allow detecting unlinked referenced files.

  • Fixes a problem with the map entry indexing scheme that results in the following panic:

    pmap_release_page: page not found

  • Fixes a problem in which certain invalid kernel address ranges may get ignored. This can result in invalid kernel memory accesses to be left unnoticed.

  • Fixes a problem that causes the Tru64 UNIX Version 5.0 update install procedure to exit with core dumps and /sbin/loader failures on a system.

  • Fixes a problem in the module core() that can cause a panic with the message:

    vrele: bad ref count

  • Fixes two separate problems:

    • A panic in the kernel with the following error message:

      simple_lock: time limit exceeded

    • A panic occurs when booting kernel interactively and setting the memlimit. The panic error message is as follows:

      kernel memory fault

  • Fixes a problem with kdbx. A core file created by kdbx was left in the root directory when recovering from a system crash.

  • Removes a Granularity Hint Regions (also called GH chunks) restriction which may be encountered on AlphaServer DS20 and ES40 systems running the Tru64 UNIX V4.0F release. This restriction can reduce performance for certain database applications.

  • Fixes several problems associated with Controller Reset (hard-error recovery) for the KZPCC backplane RAID controller.

  • Fixes a system hang condition. All NFS-related services may deadlock.

  • Fixes the database application core dumps when using truss/trace tools by remembering that COW has been set up on a shared pte and processes it correctly when a subsequent write access is made to the page.

Patch 1493.00

continued

  • Fixes a data corruption problem that can occur when mapping to private regions.

  • Fixes a problem where AS1200 systems with more than three pairs of memory displays the following warning message on the console during boot:

    pmap_get_align: Unaligned memory hole found...
    Please reset the system to clear any previous memlimit

  • Fixes a kernel memory fault caused when a network application walked an inpq array.

  • Fixes a problem in which signals can be lost in multithreaded applications.

  • Fixes a problem that only occurs if real-time preemption is enabled and SMP test suites are run.

  • Fixes a problem that could result in a incorrect scheduling of threads when they were dispatched from the idle state.

  • Fixes a problem with virtual memory. When running the Oracle database, Oracle cannot detach from a shared memory segment.

  • Fixes single-step support in a debugger, such as Ladebug, for instructions that trap or fault.

  • Fixes an incorrect calculation for memory-usage-by-type when kmem_debug is set.

  • Fixes a simple_lock: hierarchy violation in sigq_abort() when lockmode is set to 4.

  • Fixes a system panic on multi-process systems (approximately 12 CPUs) with large memory (128GB). The system can panic with:

    panic: lock time on vm_page_free_lock

  • Fixes a problem in which unmounting an NFS mounted directory can cause a user process to coredump.

  • Fixes a problem where partitioned Turbolasers return incorrect CPU data for CPUs that are not in the partition.

  • Corrects a problem that was causing degraded performance of the WAN Support for Tru64 UNIX layered products.

  • Under certain conditions, when using Asynchronous I/O, the NULL pointer can be dereferenced in aio_unwire(), causing a kernel memory fault panic. This fix eliminates this possibility.

  • Fixes a problem where ubc_msync() may not flush out all the pages in the requested range.

  • Fixes var adm messages from truncation on larger configurations by raising the default size (4096) of msgbuf_size to 8192.

  • Fixes a problem where systems with the DUV40FAS0002-19991116 patch kit installed would run low on kernel memory after process accounting had been running for a while.

  • Corrects a problem where a mount(8) command failure caused the operating system to crash. Instead, the failure will now only cause the AdvFS file system domain to shut down.

Patch 1493.00

continued

  • Fixes a problem on systems using the AdvFS file system, where the system can panic with the following panic string:

    del_clean_mcell_list: no primary xtnt record

  • Fixes an AdvFS domain panic that occurs with the following message on the console:

    load_x_cache: bad status from bs_refpg of sbm

  • Fixes a problem with AdvFS that will cause the system to panic with "kernel memory fault" in audit_rec_build().

  • Fixes a problem where the statfs system call was reporting incorrect block usage on AdvFS filesets. As a side effect of this problem, the sendmail utility may sleep needlessly (waiting for space to become available).

  • Provides the following fixes and enhancements to AdvFS:

    • AdvFS volumes were not setting the default I/O byte transfer size to the preferred size reported by the disk drives.

    • AdvFS chvol read and write transfer size range was increased.

    • The read-ahead algorithm was modified to improve performance under certain conditions.

  • Fixes the problem where the system panics if AdvFS detects an inconsistency in the free list of mcells that is kept on a per-volume basis in an AdvFS domain. The panic string seen with this panic is as follows:

    alloc_mcell: bad mcell free list

  • Fixes a problem where update takes too long to sync mmap files when using an AdvFS file system.

  • Fixes the following two problems in AdvFS:

    • When a "log half full" or "log full" problem occurs, an entire system will panic.

    • The error message "ftx_bfdmn_recovery:bad record size\n N1 = 1" is received when the wordCnt, as returned by lgr_read, is not enough to hold the ftxDoneLRT record that precedes each log record in a log page.

  • Corrects a problem where a "can't clear a bit twice" panic occurs after an unanticipated system crash and an improperly handled AdvFS recovery operation.

  • Corrects a problem in AdvFS that causes single-CPU systems to hang and causes multiple-CPU systems to panic with a "simple lock time limit exceeded" error specifying lock class name BfAccessTblMutex.

  • Corrects a problem in AdvFS where unmounting a domain that is already in a panicked state could result in the following system panic message:

    log_flush_sync: pinpg error\n N1 = 5

  • Fixes a problem in AdvFS. AdvFS may skip file system recovery after aborted domain activation.

Patch 1493.00

continued

  • Corrects a kernel memory fault that occurs when entering the mount -o dual command.

    Abbreviated stack:

    9 _XentMM()
    10 bs_bfdmn_sweep()
    11 bs_bfdmn_activate()
    12 bs_bfdmn_tbl_activate()
    13 bs_bfset_activate_int()
    14 bs_bfset_activate()
    15 advfs_mountfs()

  • Fixes a problem that may cause panics to occur when msfs_getpage() receives an error return from fs_write_add_stg() when attempting to write to an AdvFS domain that is out of disk space.

  • Fixes a problem in AdvFS. A fileset is busy when attempting to unmount giving an EBUSY error even though the fileset has no open files.

  • ASE/Disaster Tolerance systems hang when a kernel vnode reclaim flushes a vnode's modified data to disk and ASE/DT is currently suspending I/O requests.

  • Fixes a problem with making a msfs_putpage() call. The length argument may get its upper bits truncated, which will result in an incorrect length calculation.

  • Fixes a problem in the AdvFS system. A panic occurs with the following error message:

    lock_read: hierarchy violation

  • Fixes a situation in which a slight memory leak can occur when recovering AdvFS domains with mount.

  • Fixes a problem where a single CPU system using AdvFS can hang in cleanup_closed_list().

  • Corrects AdvFS problems involving clone filesets. The statfs syscall (used by df) was incorrectly returning zero blocks USED for clones. The read-ahead code was incorrectly passing up opportunities to do read-ahead on clone filesets, resulting in a large performance penalty.

  • Corrects two problems in AdvFS property list handling:

    • Creation of property lists entries in AdvFS filesets with no available mcells will result in kernel memory fault (kmf).

    • The get_proplist_entry function (used to disassemble the property list buffer returned by the getproplist system call) returned incorrect name length on property list names longer than 127 characters.

  • Fixes a problem with soclose() that caused permanent looping on exit while aborting pending connections at a TCP/IP listener socket.

  • When configuring the AlphaServer ES40, the ISA devices IDE and USB are not configured if a combo card is installed.

  • The system panics with a kernel memory fault when installing on an AlphaServer DS20.

Patch 1493.00

continued

  • Fixes the following Compaq AlphaServer problems:

    • On the ES40 and DS20, nonfatal 680 environment machine checks are being logged as fatal/noncorrectable errors.

    • On the DS20, a fix has been made to the handling of power supply, temperature, and fan events so that they are reported correctly.

    • Provides support for the Compaq AlphaServer DS20E.

  • Allows the com1_environment variables to be stored in NVRAM. On a DS10 platform, resetting console baud rate to anything other than the rate it was running, a system panic occurs at boot.

  • Fixes various problems with the driver support for the Powerstorm 4D10T (ELSA GLoria Synergy) graphics board.

  • Provides the driver support for the PCI To Ethernet/Graphics Combo Adapter (3X-DEPVD-AA) (also known as the ITI6021E Fast Ethernet NIC 3D Video Combination Adapter, InterServer Combo, or JIB).

  • Adds additional error detection to the FC driver.

  • Updates the emx Fibre Channel driver to revision 1.12, adds support for the KGPSA-CA adapter, and also fixes the following problems:

    • In an ASE environment, the driver was not appropriately restoring the link state after a LIP, which typically occurs when the Fibre Channel cable has been unplugged.

    • When connected to the new Pleiades II switches, the switch ports would consume target IDs on the adapter's SCSCI bus.

    • A kernel memory fault in routine emx_handle_els_request.

    • A system hang at boot up caused by infinitely trying to probe the Fibre Channel link.

  • Fixes a problem where, on systems with a Powerstorm 4D10T (ELSA GLoria Synergy) graphics board, the graphics were not reset to console mode (the blue screen) when the halt button was pressed.

  • Fixes several KZPCC RAID controller problems which in turn provide full support of the product.

  • Updates the emx Fibre Channel driver to Revision 1.17, correcting the following problems:

    • If connected to a switch that is part of a cascaded set of switches and is not the primary switch in the fabric, the host will never complete link initialization.

    • Occasionally, the link fails to initialize on the KGPSA-CA at boot.

    • If the cable connection between the switch and KGPSA-CA was unplugged and then replugged, the KGPSA-CA would fail to properly initialize the link and all FC connections would be terminated until the next system reboot.

    • Corrects some boot messages indicating mailbox command failures.

  • Fixes a kernel memory fault caused by a streams SMP race condition.

Patch 1493.00

continued

  • Fixes the following Universal Serial Bus (USB) problems:

    • The USB mouse no longer functions after resetting the Xserver.

    • System panics may occur in error handling after USB device fails a request.

    • The USB device may not deconfigure properly when unplugged from the bus.

    • Problems that will prevent some USB devices from being configured at boot time.

    • A key on a USB keyboard will continue to repeat after being unplugged.

    • USB keyboards may transmit the incorrect keycode for several keys.

  • Fixes a system hang in which there is a large number of pending ioctls on the streams queue.

  • Fixes a panic in AdvFS which can have the following error messages:

    panic (cpu 1): bs_cow_pg: pin clone err

    panic (cpu 1): bs_cow_pg: cannot get blkMap

  • Fixes a kernel memory fault caused by a mishandling of multicast addresses on the FDDI interface.

  • Fixes a problem most frequently encountered by the ppp daemon /usr/sbin/pppd when the ppp connection is terminated. When run in debug mode, an exiting pppd will log a message similar to the following when the error is encountered:

    >> May 25 12:29:17 dragon pppd[2525]: ioctl(SIOCDIFADDR):
    Invalid argument

  • Fixes a kernel memory fault and an SMP race condition with the AltaVista Firewall 98 server on a multi-CPU system.

  • Fixes a problem when a default IP address and a cluster virtual IP address are interchanged after a network restart. The default interface address is used by all outgoing traffic and the alias address is only usable for the incoming packets.

  • Fixes a problem in which the system may panic with the error message "tcp_output REXMT".

  • Fixes a problem where RCP commands issued from a Sun Solaris system to Compaq Tru64 UNIX may sometimes fail incorrectly with the error message "Connection reset by peer".

  • Fixes a TCP performance problem if the TCP window scale option is turned off when using the HIPPI interface.

  • Fixes a system panic:

    tcphdr too big

  • Consists of changes necessary for the AltaVista Firewall 98 to pass ICSA certification.

  • Fixes a problem with packetfilter applications that use IP packets greater than 8K.

  • This patch involves virtual mac addressing.

  • Fixes a problem that caused AdvFS to incorrectly calculate metadata file size for files greater than 4 GB resulting in corruption on read and stat syscalls.

Patch 1493.00

continued

  • Fixes a bug such that when fuser -k is issued on a dismounted NFS mount point in which some process is running, a hang will occur.

  • Fixes a problem in which an invalid error status is returned from the remove_entry system call.

  • Fixes a problem in which the interaction between NFS file systems and Smoothsync causes procprod to read stale data.

  • Fixes a kernel memory fault when accessing the vm_map_index hash table.

  • Fixes a simple_lock time limit exceeded panic due to an SMP race condition in namecache.

  • Fixes a problem that causes corruption in the floating point registers whereby the flag fields nxm_fp_owned are overwritten with 0s.

  • Fixes a problem in AdvFS. The system panics with a kernel memory fault.

  • Fixes a problem in AdvFS. A system panic occured with the following error message:

    panic: del_dealloc_stg(): cant ref bmt page

  • Fixes a kernel memory fault in VMAC code if_addnewaddr().

  • Fixes a system hang that could last up to a few minutes with large files when performing synchronous I/O requests.

  • Fixes a system panic with the panic string:

    psig: catch not set

  • Corrects a kernel memory fault caused by rw3vp_cache passing a bad address to _OtsZero().

  • Corrects a problem in which the perrmask register on Tsunami systems can be overwritten.

  • Fixes a problem where the output of a ps command, the PAGEIN column reports 0 for all processes.

  • Fixes a problem in which an application can hang because of an undelivered signal.

  • Fixes a problem in AdvFS. A panic occurs with the following error message:

    lock_read: hierarchy violation

  • Fixes a problem where the system appears to hang. A child process is holding a lock too long and preventing other processes from doing work.

  • Fixes a problem where, if the size of the message queue was increased, writers to the queue that were blocked would not wake up for processing.

  • Fixes a problem in which the POSIX interval timer is not resilient to clock slowdown caused either by NTP or by a backwards change of the clock.

  • Fixes a system panic that was seen on large configurations under a heavy load situation.

  • Provides the latest driver for the PowerStorm 4D10T (ELSA GLoria Synergy, SN-PBXGK-BB) graphics card and the latest graphics driver for the PCI To Ethernet/Graphics Combo Adapter (3X-DEPVD-AA).

Patch 1493.00

continued

  • Fixes a problem in AdvFS where putpage_lk/pg_busy deadlock causes hangs in the system.

  • Fixes several panics on systems with holes in memory. The error messages are listed below:

    panic:  put_free_ptepage: invalid pvh state

    panic: kernel memory fault
              trap: invalid memory read access from kernel mode

    panic: not wired
              simple_lock: hierarchy violation

  • Adds a fix to VMAC functionality when used with NetRAIN.

  • Fixes a problem where the following can occur during a system panic:

    • System calls interrupts

    • mpsleep() returns an EINTR error when the panicstr is non-NULL

    • An infinite looping at a very high priority

  • Fixes AdvFS inconsistent quota problems and errors similar to the following appearing on the console:

    vmunix: chk_bf_quota: group quota underflow

  • Fixes a problem with verify. When verify is run on a brand new domain, NFS warnings are displayed even though no NFS related activity is being done.

  • Corrects a problem with the incorrect ordering of network interfaces which was resulting in network partitions.

  • Fixes a "lock_terminate: lock held" panic when deleting a process group.

  • Fixes an "unaligned kernel space access from kernel mode" panic when doing a malloc from kmembucket 26, 896 byte bucket. The faulting virtual address will be the lock signature for thread_deallocate().

  • Fixes a kernel memory fault in u_anon_faultpage() when it accesses the backing object for the anonymous page.

  • Fixes a problem where a root user was not allowed to check file access on behalf of a user without completely becoming the user. The functionality is needed by the ASU (Advanced Server for UNIX) product.

  • Fixes a panic in in_pcbfree() associated with ASE service failover.

  • Fixes a file system panic which has the following error message:

    syscall: complex lock owned

  • Fixes an AdvFS problem which caused the system to crash with a kernel memory fault.

  • Includes UFS delayed metadata mount option that fixes metadata intensive application performance.

  • Fixes a kernel memory fault seen under certain conditions when setting a thread's priority.

Patch 1493.00

continued

  • Fixes a race condition in the UBC code where a lookup is done on a page being invalidated (freed).

  • Fixes a race condition involving signals and threads that only happens on multiprocessor systems.

  • Fixes a problem with a kernel memory fault in AdvFS.

  • Fixes a problem where the operating system only looks in slot 0 for the primary CPU.

  • Corrects a KZPCC lock problem that is seen when a kernel is run with lockmode set to four. This patch also resolves a timing issue which prohibited the KZPCC product from being seen during boot on EV67 platforms.

  • Fixes a kernel memory fault caused by either one of the following conditions:

    • On EV6 platforms, when the debugger is used to view the OT_DEVMAP object mapping memory in I/O space that is mapped to a user process.

    • When routine pmap_coproc_exit_notify() modifies the pmaps' coproc_tbi function to be 0, a null pointer, while it is being checked by routine pmap_remove_all().

  • Fixes a problem in which operations on NFS files can hang indefinitely.

  • Updates the emx Fibre Channel driver to revision 1.21 which corrects a Data Error that is seen when running with the latest Emulex firmware. This error corrupts data when reading from the disk.

  • Fixes a problem in which an invalid PCI entry in sysconfigtab can cause the system to be unbootable.

  • Fixes a problem in which a PCI bridge-based boot device may fail to configure on large I/O systems.

  • Fixes a problem where genvmunix does not boot on a system with an Atalla AXL200 card installed.

  • Fixes several problems specific to AlphaServer 1200 and AlphaServer 4100 systems.

    • The user.log file has the following message:

      redundant power supply failure

    • The messages file has the following intermittent messages:

      ERROR: i2c_read_temp: environmental monitoring error

      ERROR: i2c_read_fail_reg: environmental monitoring error

      ERROR: i2c_read_func_reg: environmental monitoring error

    • Systems were shutting themselves down displaying the following message:

      System has reached a high temperature condition.
      Possible problem source: 
      Clogged air filter or high ambient room temperature.

Patch 1493.00

continued

  • Modification to pci resource management to allow support behind pci bridges for the AXL200 card.

  • Fixes a system hang problem due to a bug in the NFS write gathering code. The code does not fully synch all writes.

  • Fixes a problem where applications on V4.0F systems can hang, looping in readdirplus().

  • Fixes a problem in which an NFS system using a TCP connection can crash.

  • Fixes various performance problems with an upgrade to the Gigabit Ethernet driver Version 1.0.12.

  • Fixes a problem with relocating an TCR/ASE NFS service when one or many clients have the service mounted over TCP.

  • Corrects a problem which could cause the system to spend excessive time in the internet checksum routine, resulting in a degradation of system performance.

  • Fixes reply values for NFS writes which were causing protocol violations.

  • Fixes a problem in AdvFS in which a system that had already domain paniced results in a system panic.

  • Provides support for the DEGPA-TA (1000BaseT) Gigabit Ethernet device.

  • Fixes a problem that caused an incorrect bcache size to be returned to the kernel from the HWRPB. This problem occurred on Professional Workstation 900 and 1000 systems and AlphaServer DS10, DS20, DS20E, ES40, GS80, GS160, and GS320 systems.

  • Fixes an AdvFS kernel memory fault caused by a race condition between migrate and chfile -L in bfflush_start.

  • Provides the device driver support for 3DLabs Oxygen VX1 graphics adapter.

  • Fixes a panic in the UFS file system which has the following error message:

    blkfree: freeing free block

  • Provides support for the DE600/DE602 10/100 Ethernet adapters and fixes the following problems in the driver shipped as part of the NHD kit:

    • A machine check that may occur shortly after boot or when receiving large amounts of data.

    • The primary CPU may appear hung on networks where switches send "Flow Control Pause" frames if they become overloaded.

    • Transmit timeout messages appearing in the console log due to the driver timing out a frame.

  • Fixes a panic in in_pcbfree() when NFS is implemented over TCP.

  • Fixes a problem with AdvFS. An AdvFS domain becomes inaccessible when using the mount -d option.

Patch 1493.00

continued

  • Corrects a kernel problem which causes ping(8) to hang when using the -d flag.

  • Fixes a problem with AdvFS in which a hang occurs due to a deadlock between bsbuf.state and bmt extent map lock.

  • Fixes a problem in AdvFS. The following error messages can occur:

    panic:
      simple_lock: uninitialized lock

    kernel memory fault:
      simple_lock: minimum spl violation

  • Corrects a problem when a network interface is configured using a CIDR bitmask and lies in a certain address range; it could be unreachable by users on the local system and remote systems that choose not to use the routing table, but simply transmit on an interface.

  • Corrects a problem where there is a potential for a system panic in routine sbflush() if there is an attempt to flush a socket buffer while it is locked by another thread.

  • Fixes a problem with AdvFS where all processes are waiting for buffers causing the system to hang.

  • Fixes a hang or simple_lock_state_violation/simple_lock_fault panic in biodone.

  • This patch fixes a panic in AdvFS that has the following error message:

    ftx_fail_2: dirty page not allowed

  • Fixes two panics that have the following error messages:

    simple_lock: time limit exceeded

    simple_lock: lock already owned by cpu

  • Fixes a problem in AdvFS where user data may be lost when a clone file is migrated.

  • Fixes a problem where NFS does not update mtime and atime for special files and named pipes. Additionally, it fixes a problem that can cause an NFS client application to hang, or causes a "lock already owned by thread" panic when lockmode=4.

  • Fixes a problem where incorrect NFS client locking caused a KFM panic.

  • Fixes a problem where NFS clients may hang in the uninterruptable state.

  • Fixes a restart detection problem with the proplistd daemon. Prior to this fix, when mounting a relocated ASE NFS service with property lists, clients did not detect that the proplistd RPC port number had changed. Clients continued to use the proplistd RPC port number of the old ASE cluster member.

  • Prevents a possible NFS over TCP hang. NFS TCP threads will be blocked in sosbwait() causing the system to appear to be hung.

  • Addresses two problems with the ee driver for DE60x Ethernet cards. These problems affect all Tru64 UNIX systems containing ee cards.

    • Fixes a race condition where the card could stop receiving packets from the network under rare circumstances.

    • Fixes the lan_config user options -x and -s.

Patch 1493.00

continued

  • Fixes a problem when using multiple subnets on a network interface; APR request packets sent by the system will contain the IP alias address in the sender field when that alias is in the same subnet as the requested IP address.

  • Fixes a problem when applications make IOCTL calls using an IP alias address on a network interface.

  • Corrects a problem in which a single application's creating and removing of files repeatedly in the absence of other applications working on the same fileset can cause poor update daemon performance due to a flawed kernel hashing algorithm.

  • Fixes panics which can occur if a signal is sent to a multi-threaded task in which one or more threads are calling exit() or exec().

  • Fixes a problem where the setgid bit of a directory was not being set when created, if its parent directory has the setgid bit set.

  • Fixes hangs in AdvFS fileset operations such as clone creation and deletion when I/O errors or device full conditions resulted in the operation being undone.

  • Fixes a problem in which the system may panic with the panic string "Unaligned kernel space access from kernel mode".

  • Fixes a kernel memory fault from ufs_mount().

  • Corrects a simple lock timeout seen when dealing with NFS loopback mounted file systems with large amount of dirty pages.

  • Fixes an unaligned access panic which occurs in malloc() in V4.0F systems, while allocating memory from the 512 byte memory bucket. It can occur on any type of file system.

  • Provides support for activating temporary data logging on a mount point.

  • Fixes a timing window where flushing data to disk can be incomplete when a system is going down, if more than one thread calls reboot() without first going through shutdown, /sbin/reboot, or /sbin/halt.

  • Addresses multiple issues for the KZPCC family of RAID Array 2000 (RA2000) controllers.

    • Errors seen when concurrent opens are issued to separate logical partitions on the same logical device.

    • Change to the preferred chunk size from 16 KB to 64 KB which may increase data transfer rates.

  • Fixes a problem in which the wrong status was returned from EEROM read.

  • Prevents a system panic from occurring while using AdvFS.

  • Fixes a problem with the driver for Gigabit Ethernet adapters (DEGPA-FA and DEGPA-TA) which prevented its use in a NetRAIN (Redundant Array of Independent Network Adapters) set.

  • Fixes a system hang caused by netisr queue corruption due to a race condition that is primarily encountered by third party drivers and layered products that call schednetisr_nospl().

Patch 1493.00

continued

  • Modifies AdvFS kernel code and several utilities. AdvFS will no longer panic with the following error:

    ADVFS EXCEPTION : panic cpu(0) : bad frag free list

    The code is modified so that during frag allocation when AdvFS determines that the frag group header's free list has been corrupted, it stops using it and marks it BAD. It is then removed from the free list so no more allocations can take place and no deallocations are performed. The verify, shfragbf, and vfragpg programs are modified to report BAD frag groups.

  • Corrects an AdvFS panic which can occur during a rmfset operation, causing the following panic string:

    rbf_delete_int: can't find bf attributes

  • Fixes an issue with lightweight wiring of pages and shared memory regions.

  • Corrects a problem where a directory entry may be attempted to be changed to "." and the code checks for this and prevents it from happening.

  • Fixes a lock hierarchy violation in AdvFs.

  • Increases the efficiency of the tcp_timers.

  • Fixes inaccuracy problems when using setrlimit/getrlimit with a threaded application.

  • Fixes a problem in which rmvol would hang in a wait state.

  • Fixes a hang in the UFS file system.

  • Fixes two problems with the consvar command:

    • Fixes consvar command problem with setting a boot device to a tape device.

    • Fixes consvar -g command to actually show the console settings as intended.

  • Fixes a memory leak when named pipes (FIFOs) are used.

  • Fixes a potential problem flushing data to disk when using data logging with sparse files.

  • Fixes a problem where threads can hang in x_load_inmem_xtnt_map().

  • Fixes a problem where cascaded switches can hang the system at failover time.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • CDFS media burned in 2001 shows the wrong dates.

  • Fixes a "u_anon_free: page busy" panic.

  • Fixes a problem where threads can hang while renaming files on NFS mounted file systems.

  • Fixes a "simple_unlock: lock not owned by cpu" panic in the biodone routine.

Patch 1493.00

continued

  • Provides several fixes including:

    • Signal parent process to enable user notification of mount failure.

    • Return functionality to accept disk-type from user.

    • Exit if overlap detected and not being run interactively.

    • Do not do check_usage for -N option or mfs.

    • Move common variable declarations to header file.

    • Adjust fssize and references to it to handle larger file systems.

  • Fixes a kernel memory fault which occurs while using the tablet instead of the mouse.

  • Fixes a panic in AdvFS which has the following error message:

    panic: Unaligned kernel space access from kernel mode

  • Fixes an AdvFS hang that is caused by a thread waiting for flushCv notification and is holding resources that other threads want. This type of hang has been experienced when shutting the system down.

  • Fixes a problem that sometimes caused the system to select the incorrect IP source address for out-going connections when using IP aliases and subnetting on a network interface.

  • Fixes a system panic with panic string: "lock_terminate: lock held". This is being caused by the table call which, when accessing an open file table from another task, was not doing the proper locking.

  • Corrects two problems:

    • The table() system will not abort connections properly if a tcb hash table number is greater than 1.

    • There was a kmf in option_scan due to SMP race between cfgmgr(CFG_OP_CONFIGURE) and sysconfigdb(CFG_OP_RECONFIGURE). The fix was to add a lock around access to cfg_db.

  • Fixes a bug in NFS that could possibly cause a kernel memory fault.

  • A kernel memory fault can occur on an smp machine when one thread is extending a clone frags file and another thread does a stat system call on a file with a frag.

  • Fixes an error handling path at label pg_error where entries made in the physical map should have been removed.

  • A potential security vulnerability has been discovered in the kernel where, under certain circumstances, a race condition can occur that could allow a non-root user to modify any file and possibly gain root access

  • Corrects an AdvFS problem where an on-disk variable wraps when more than 64K metadata entries are required to map the disk blocks of a file or metadata file. The side effects of this problem were data inconsistencies and an incorrect available size for the domain.

  • Fixes the following system panics:

    "Kernel Memory Fault"  in function sth_close_fifo()
           when closing a vnode that belongs to a FIFO

    "simple_lock: time limit exceeded" in "spec_reclaim"

Patch 1493.00

continued

  • Fixes a problem with vm_faults against anon objects mapped by multiple map entries.

  • Corrects the problem of a simple lock timeout due to POSIX timers and also corrects some inaccuracies of the POSIX realtime timers.

  • Fixes a problem where a system with a dual-mounted AdvFS file system can panic with the panic string, "bs_unpinpg: unpin sync with writeRef >1".

  • The patch updates the emx driver to V2.01 and fixes the following problems:

    • A problem of unexpected tape I/O aborts

    • A panic of "can't grow probe list"

    • Several kernel memory faults within the driver

    • Redundant adapter failures no longer panic the system

    • A problem of panicking with low memory resources

    • Stalling I/O during reprobing when a cluster member goes down

  • Corrects an AdvFS command problem. In rare cases, migrate programs (rmvol, balance, migrate, defragment) would fail to migrate a file due to E_PAGE_NOT_MAPPED.

  • Fixes a system panic with "malloc_check_checksum: memory pool corruption".

  • Corrects a problem where an fcntl() with the FIFO parameter would return an errno=22 (Invalid Argument).

  • Corrects a problem which could result in a system panic on close() if the BPF default packet filter is in use.

  • Fixes a kernel memory fault in msg_rpc_trap.

  • Fixes a time loss problem seen on DS systems only when using console callbacks. The patch resynchronizes the clock when a time loss is detected.

  • Fixes a rare panic in the driver for the DE600/DE602 10/100 Ethernet adapter.

  • Fixes a problem where network interfaces can appear unresponsive to network traffic.

  • Fixes a kernel memory fault that can occur after a user issues kill -STOP.

  • Corrects a problem with ICMP redirect processing which resulted in incorrect ICMP redirect messages.

  • Fixes a panic of "malloc_leak: free with wrong type" when using kmem-debug-protect.

  • Fixes a problem in kernel threads where multi-threaded applications were allowed to start running prior to virtual memory mapping swapin. This was prevented by adding a flag to mark when the map is swapped out and prevents thread swapins until the flag is cleared.

  • Fixes a problem of the fverify -n flag creating directories.

  • Fixes kernel panics which can occur in the context of threaded applications. The panic string is "trap: invalid memory write access from kernel mode" and the faulting virtual address is always 0x0000000000000048.

Patch 1493.00

continued

  • Fixes a problem with AdvFS that when mounting the file system with option -o dual a panic is caused.

  • Corrects a problem in the virtual file system that could cause panic with the panic string "kernel memory fault".

  • Fixes a bug that can cause a panic when a system is powering down.

  • Corrects a problem with excessive receive overrun error messages from the FTA driver.

  • Fixes a bug that causes corruption of binary.errlog.

  • A potential security vulnerability has been discovered in networking where, under certain circumstances, a remote system can take over packets destined for another host.

  • Corrects a kernel memory fault panic in clntktcp_connect().

  • Prevents the error message "local HSM Error: msgsvc: socket close failed" from being generated when an application closes the socket with return state 0.

  • Fixes numerous problems of accessing de-allocated and freed vnodes.

  • Fixes a problem where heavy use of a file system can result in "vnode table full" or "cannot create pipe" error messages.

  • Fixes a problem with crontab in which, when root runs crontab -e user, the user's crontab file is edited and saved, but is not re-read by the cron daemon. Instead, root's crontab file is re-read.

  • Fixes a problem where, when the user attempts to restore to a system configured with backplane RAID, btextract fails.

  • Fixes a problem where a system crash occurs at the end of a rmvol. The following panic string will be seen:

    panic (cpu 0): lsn_io_list: current lsn > hiflushlsn

  • Prevents addvol from adding invalid disks into a domain.

  • Fixes a problem caused when the Tru64 UNIX TCP layer prematurely closes a slow, but good connection with TCP reset.

  • Fixes three problems with the ee driver for DE60x Ethernet cards. These problems affect all Tru64 UNIX systems containing DE60x network interfaces.

    • A fix for a race condition that can cause a panic when a transmit timeout occurs.

    • A fix to improve error checking when allocating buffers.

    • A fix for DMA resource allocation to prevent a panic when a machine runs low on DMA resources.

  • Fixes a problem where the return value of unlink() call was not checked when two threads were trying to move a file to two different destination. Due to this, though one of the threads could unlink() the source file, there were no relevant error message displayed.

  • Corrects a potential system hang when the directory link limit is reached while creating sub-directories. This patch also corrects the erroneous reporting of success, when attempting to write beyond the file size limit using synchronized I/O.

  • Corrects a possible panic when auditing execve with exec_argp/exec_envp enabled.

Patch 1493.00

continued

  • Fixes performance shortcomings in NXM thread replacement.

  • Fixes a kernel crash dump generation problem which resulted in the wrong page(s) being compressed/written. Without this fix, postmortem debugging may be difficult or impossible.

  • This fix will trap an inconsistent directory entry to prevent an infinite loop that might eventually cause a system hang.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • Corrects the problem where a user may experience a core dump when using csh from the Japanese locale.

  • Fixes a problem in fwrite() where it was failing when the total number of bytes to be written is larger than 2 GB.

  • Corrects the problem where the DLI queue stalls when there is no traffic in the TCP/IP or HDLC stacks.

  • Corrects a problem where the SNMP interface counter ifInUcastPkts occasionally decrements or jumps to an arbitrary, large value.

  • Corrects a failure in the safe_open() routine which caused symbolic links given by a relative path from the current working directory sometimes to give ENOENT errors incorrectly.

  • A potential security vulnerability has been identified in the HP Tru64 UNIX operating system which may result in non-privileged users gaining unauthorized access to files or privileged access on the system. This potential vulnerability may be in the form of a local and remote security domain risk.

  • Fixes a segmentation fault problem with long LOCPATH and LANG values.

  • Fixes a problem while expanding positional parameters in the bourne shell. The expansion "$@" should generate zero fields when there are no positional parameters specified for the shell function.

  • Fixed system panic and/or data corruption caused by changing fifo parameter pipe-databuf-size while fifo operations are in flight.

  • Fixes a ksh problem related to cleaning the process when a terminal is abruptly stopped.

  • Fixes the following problems in sh:

    • Service denial problem when a quoted here doc script is executed.

    • Problem with handling ELF files.

    • The shell variable $- was not holding the -C option when it was set to be on.

    • Problem with printing broken characters when the type builtin utility of sh is invoked in Japanese locale.

  • Fixes a kernel panic with "get_xm_page_range_info:kernel memory fault".

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the BIND utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability.

Patch 1493.00

continued

  • Fixes a problem in audit_tool which appends nonsense characters to the audit information to the output of an execve event in brief mode.

  • Prevents a panic in fifo_write with the panic message "NULL fifo_bufhdr append pointer".

  • Fixes sync related processing of vnodes in AdvFS, NFS.

  • Provides protection against a class of potential security vulnerabilities called buffer overflows. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. This patch allows a system administrator to enable memory management protections that limit potential buffer overflow vulnerabilities.

  • Fixes three problems with the alt driver for DEGPA Gigabit Ethernet adapters. These problems affect all Tru64 UNIX systems containing DEGPA network interfaces.

  • The improper scheduling of cron jobs related to the months that do not have 31 days is now corrected.

  • Fixes a problem that may cause the third command and other Atom-based instrumentation tools to fail.

  • Fixes an Asian language processing problem under the Korn shell.

  • Installs DECthreads V3.16-032 which fixes problems that may effect threaded programs using pthread_kill() on Tru64 UNIX V4.0F systems.

  • Fixes an sh problem while executing here document through command substitution.

  • Fixes a problem in the VM subsystem that could cause a crash with the panic string "vm_page_ssm_unwire".

  • Corrects an lpc regression in the lpc buffer overflow fix.

  • Fixes a bug that could cause a panic with the panic string "ubc_object_free: page still resident".

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the ypmatch and traceroute utilities. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the lpq, lpr and lprm commands. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands and the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability.

  • Corrects a problem which had resulted in broadcast or multicast packets being processed multiple times on behalf of a NetRAIN device, once for each backup interface.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

Patch 1493.00

continued

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of file corruption due to the manner in which setuid/setgid programs core dump. HP has corrected this potential vulnerability.

  • Fixed the audit_tool search algorithm to differentiate between privileged and non-privileged uids, and to allow regular expressions in string searches.

  • NetRAIN virtual interface counters are not maintained properly, which affected reporting via netstat and snmp, and affects the proper operation of NetRAIN.

  • Fixes a problem with audit data not being displayed by audit tool, problems with file object selection/deselection and directories, and numa performance issues associated with auditing.

  • A potential security vulnerability has been identified in the HP Tru64 UNIX operating system which may result in a Denial of Service (DoS). This may be in the form of local and remote security domain risks. The following potential vulnerability has been corrected:

    SSRT2322 - BIND resolver (Severity - High)

  • Fixes a problem where opens would fail when running under heavy I/O load with the KZPCC.

  • Corrects a problem in which sh was using a high amount of CPU time.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • Fixes a problem for handling Floating Point Exception in collect.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • Fixes a Tru64 UNIX NFS server panic caused by receiving an illegal file access mode from an NFS client.

  • Fixes a potential problem where system responsiveness may be affected.

  • Corrects a problem where gated will no longer complain each time it attempts to send an OSPF HELLO packet and possibly fill up log files.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. A malicious user can attempt to subvert a program file that has the setuid or setgid privilege and possibly execute commands at an elevated privilege level. HP has corrected this potential vulnerability.

  • New lpd to fix /etc/hosts.lpd case sensitivity. For example, node.domain is treated the same as Node.Domain.

  • Fixes a problem where memory could retain execute permission on EV6 machines. Fixes a delete_pv_entry panic when kernel virtual address space has high usage.

Patch 1493.00

continued

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of network programs core dumping. HP has corrected this potential vulnerability.

  • Resolves kernel memory faults in the TCP/IP subsystem.

  • Enhances cron to do extensive logging.

  • Offlining a CPU with bound process(es) can lead to a "malloc_check_checksum: memory pool corruption" panic.

  • Fixes the following two ACL issues:

    • If multiple processes attempt to access the same file at the same time and access to the file should be allowed by an ACL on the file, access may be denied.

    • If the ACL on a file is corrupt, the corrupted ACL is passed into the kernel causing a variety of problems.

  • Corrects a problem found wherein the rmtmpfiles script would produce errors at startup of the form:

    dirclean: lstat failure for starting directory: /.osonly_tmp/:
    No such file or directory

  • Eliminates the compiler warnings in ksh.

  • Fixes a problem that caused the 4.3BSD socket interface to return incorrect values for IOCTL calls accessing IP alias address information.

  • Eliminates false directory lookup warning messages generated by an incorrect comparison caused by mismatched fileid variable types. The fix also slightly improves client caching performance.

  • A potential security vulnerability has been discovered where, under certain circumstances, users can clobber temporary files created by shell commands and utilities (for example, under /sbin, /usr/sbin, /usr/bin, and /etc). HP has corrected this potential vulnerability.

  • Fixes a regular expression performance problem in sed.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

  • Fixes an application core dump problem when the LANG environment variable is too long.

  • Fixes the predictable TCP Sequence Number.

  • Avoids a silent infinite loop in vdump by correcting the AdvFS system call OP_GET_BKUP_XTNT_MAP. The call will now return the valid xtntCnt when it fails due to E_NOT_ENOUGH_XTNTS.

  • Fixes a problem for locking on retry case for multi-threaded select/poll. A panic with the following stack trace is indicative of this problem:

    PANIC: thread_block: simple lock owned

  • A potential security vulnerability has been identified in the HP Tru64 UNIX operating system that may result in denial of service. This may be in the form of local and remote security domain risks. The following potential security vulnerability has been corrected:

    SSRT2266 IGMP (Severity - High)

Patch 1493.00

continued

  • Fixes a problem in fread() where excessive I/O was taking place for large amounts of data, causing performance problems. It also addresses a failure in fread() to properly handle data sizes that have representations greater than 32 bits (2^32 of data).

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

  • Fixes mbuf memory corruption that can cause kernel memory fault panics.

  • Prevents a possible lock hierarchy violation while opening a clone.

  • Fixes several problems with the collect utility.

  • Corrects a problem in AdvFS where it avoids a potential stranded log record in memory that does not get out to disk by fixing a race condition.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability. In addition the following changes were made:

    • shell inline input files are more secure

    • sh noclobber and new constructs added

  • Adds code to print greater than 61 UNIX domain sockets and change file read errors from /dev/kmem to ignore and continue in a running system.

  • Fixes a problem with fopen. The fopen command was returning "file not found" when there was insufficient memory available to allocate the FILE structure. The fopen command now returns "not enough space" for this case.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

  • Prevents a panic when I/O errors occur on an AdvFS directory page.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

  • Prevents segmentation faults when sia_ses_init is passed a malformed argument vector.

  • Fixes a potential security problem.

  • If an I/O fails and it may be helped by an AdvFS-initiated retry, a message will be written to the console providing information on how to retry.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the sh utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege.HP has corrected this potential vulnerability.

Patch 1493.00

continued

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

  • Fixes a problem with the C shell (csh) so that it now correctly recognizes the backslash (\) meta character.

  • Fixes a problem with multi-threaded applications that can cause the application to consume 100% of the CPU usage time.

  • Corrects problems of audit_tool supplying incorrect, or insufficient data about an audit event.

  • Fixes a problem in the collect system monitoring tool when it is run in historical mode.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the ksh utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability.

  • Corrects a problem with csh(1) where if a non-root user performed an ls using wild card characters on a directory having permission 700, then it would display the invalid error message, "Glob aborted". Now it displays the correct error message of "Permission denied".

  • When ACLs are enabled and there is a Default Access ACL on a directory on an AdvFS file system, the permissions of symbolic links created in that directory will appear to be incorrect, even though access is not affected.

  • Corrects an NFS hang when the delayed option is used with the mount command.

  • Fixes two problems in the ee driver for DE60x 10/100 Ethernet adapters. These problems affect all Tru64 UNIX systems containing DE60x network interfaces

  • Fixes the new_wire_method (light weight wiring) issues for Oracle software.

  • Fixes the ARMTech kernel malloc invalid size panic.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the telnetd daemon. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability.

  • Corrects u_anon_free: page busy panics.

  • Provides protection against a class of potential security vulnerabilities called buffer overflows. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. This patch allows a system administrator to enable memory management protections that limit potential buffer overflow vulnerabilities.

  • Corrects the tar program to properly handle unusual directory specifications.

Patch 1493.00

continued

  • Fixes a problem with malloc() over-allocating memory from the kernel when malloc tuning variable __sbrk_override has been set to 1.

  • Prevents a kernel memory fault panic that would occur when the audit daemon is set to periodically dump the kernel audit buffers to the audit log file (auditd -d freq).

  • Corrects a problem which could result either in the panic of a cluster member or in inconsistent data when the sbcompress_threshold configurable is set.

  • Improves msync performance on files that are mapped with the MAP_PRIVATE flag.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • Fixes several potential system crash problems in the lfa driver for DAPBA and DAPCA ATM adapters.

  • Resolves a problem of not being able to view files on some CDROM media that is created by third party software.

  • Fixes a problem where decreasing the smoothsync_age does not always have an effect.

  • Fixes a problem in the kernel network subsystem that caused a kernel memory fault panic in the routine m_adj().

  • Fixes a problem where in rare cases, the system would panic instead of failing gracefully. The panic message is:

    ftx_done_urdr: handle level N1 doesn't match ftx lvl N2

  • Fixes a problem where in some cases, the system would report that there is no space left and would be unable to create files, even though there is disk space left and the BMT has not reached its maximal number of extents.

  • Fixes kernel memory faults caused by ufs_sync_int accessing an inactivated or de-allocated vnode. A Fixed Kernel Memory Fault panic could occur in irefresh while walking the mounted vnode list.

  • Provides a fix where the collect utility does not reproduce the CPU-type correctly.

  • Eliminates compiler warnings in ksh.

  • Installs DECthreads V3.16-030 which fixes problems that may affect threaded programs which use the fork() system call running on Tru64 UNIX V4.0F.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

  • Fixes a memory leak when dlclose'ing libraries in a threaded application.

  • Corrects a problem where df was showing negative values for large NFS file systems.

  • Fixes a kernel memory fault due to a bug in the kernel code.

Patch 1493.00

continued

  • Fixes the following problems in tar/pax/cpio:

    • The tar command now checks and report any write errors.

    • The tar/pax/cpio commands have the capability to unalter the ctime of input files upon creation of an archive. It displays a warning message in case pax/cpio if it is unable to preserve the time of the input files.

    • Corrects the behavior of the tar -o option.

    • Fixes the cpio -m option, if the destination and source files have the same mtime.

    • The pax -l option has been corrected to create hard links properly.

    • The cpio -o option has been corrected not to corrupt extended uid file ownership.

    • Fixes the long file names handling in the tar command.

    • Fixes the pax command to handle ACLs on directories properly.

  • A potential security vulnerability has been identified in the HP Tru64 UNIX operating system which may result in non-privileged users gaining unauthorized access to files or privileged access on the system. This potential vulnerability may be in the form of a local and remote security domain risk.

    The following potential security vulnerability has been corrected:

    SSRT0845U stdio file descriptors (Severity - High)

  • Fixes a problem resulting in a system panic for applications that directly call nxm_get_bindings.

  • Prevents a race in msfs_umount.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • The TCP window has been increased from 96 KB to 500 KB for performance improvements.

  • The netisr thread dynamically estimates the reply size and subsequently reserves the space in the socket buffer.

  • A new timeout check has been added to notice when the data has not been acknowledged in 30-50 seconds and copies those buffers. This will allow the UBC to free up those mbufs and not tie them up.

  • Corrects a problem in which ksh fails to substitute the tilde (~) character for a user's home directory after an assignment using the # or % characters has been used.

  • Allows the collect monitoring tool to recognize and gather KZPCC disk statistics.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability.

  • The dirclean utility no longer attempts to remove the AdvFS .tags directory or the quota.group and quota.user files.

Patch 1493.00

continued

  • Fixes a panic with simple_lock_timeout due to too many pages to scan in ubc_page_alloc().

  • Fixes a problem with strerror where buffers could not be allocated.

  • Makes start-up scripts in /sbin/init.d world readable.

  • Fixes a kernel memory fault panic in the IP multicast loopback code.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the chfn, chsh, or passwd utilities. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability.

  • Addresses a kernel memory fault panic in malloc_thread().

  • Fixes locking problems in vclean().

  • Fixes heap and stack limitations in the older operating system versions required for SAP.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

  • Systems configured with VX1 graphics card will not return to the console when the halt button is pressed. The console is then unusable.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability.

  • Corrects a race condition which could result in a failure to set the modification time of a file. This occurs only on a ufs file system.

  • Keeps USB from initializing on systems where USB is not supported.

  • Adds an initialization of a variable setp necessary for an earlier patch.

  • Prevents panics caused by bad arguments to system calls.

  • Alleviates a temporary hang/pause condition seen when forking or running down an application with several child processes, from a parent process having an extremely large number of unique or discontigous memory allocations.

  • Corrects a problem in which ksh did not clean up the processes associated with a terminal once the window was closed.

  • sh now prints the correct msg when enhanced core file naming is on.

  • Fixes a problem with ksh. When a ksh menu is started from within a user's .profile file, ksh will not stop when the telnet session is stopped.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This could result in a panic with the string: "lock_clear_recursive: recursion not enabled." HP has corrected this potential vulnerability.

  • Corrects the problem where telnetd leaves an extra udp port open.

Patch 1493.00

continued

  • Under certain conditions, invalidating a portion of a very large file can make the file system appear to be hung. Any program trying to access the file system, ls for example, will hang until the file is invalidated. This will only happen when rt_preempt_opt=1.

  • This patch addresses two problems with the alt driver for DEGPA Gigabit Ethernet adapters. These problems affect all Tru64 UNIX systems using alt with vMAC or NetRAIN.

    • A fix for vMAC support. Prior to this patch, vMAC has not worked with DEGPA.

    • A fix to prevent two DEGPA adapters from getting the same MAC address in a NetRAIN configuration.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the dxterm utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability.

  • Fixes memory leaks caused by certain type of scripts which is called in infinite loop. This consumes more virtual address space in the long run.

  • Corrects a Kernel Memory Fault that could result from an inp pointer disappearing when the listen socket is in the process of closing at the same time a new connection is establishing.

  • Fixes a problem where calling send() with the AIO flags set can cause the system to panic with a kernel memory fault in the aio_send code.

  • Corrects the behavior of more, when given both a non-existing file and a non-empty file with a long filename/pathname.

  • ARP request for a permanent ARP entry is ignored, user cannot connect from a remote system.

  • Fixes two code paths where someone could accidentally lookup the unspecified address (0.0.0.0), find an ARP entry for it, and start the timer ticking away on it eventually causing a panic.

  • A potential security vulnerability has been discovered in the HP Tru64 UNIX operating system that may result in a Denial of Service (DoS). This potential vulnerability may be in the form of local and remote security domain risks. The following potential security vulnerability has been corrected:

    SSRT2384 rpc (Severity - High)

  • Fixes a problem for excessive FIDS_LOCK contention observed when large numbers of files are using system based file locking.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

  • Corrects a problem which could result in an alias IP address being incorrectly promoted to being the primary address when another alias is removed.

Patch 1493.00

continued

  • Fixes a problem where sh will not receive a SIGSEGV signal when you run type with a file path greater than 69 characters.

  • Fixes a problem with booting over the network (dataless management) and booting from a tape device.

  • Correction in cron to correctly handle backslash (\) commands so that crontab and /dev/console output do not include backslashes.

  • Updates the emx driver to V2.03 and fixes a problem which could cause an emx driver panic during adapter resets.

  • Fixes a one byte gap/hole in the maximum size in the tar command before an extended header record is used (8589934591 (octal 77777777777)).

  • Allows fuser to display the reference flag. This flag indicates the type of reference made. For example, open, closed, unlinked, or mmapped.

  • Fixes an ISO9660 file system size limitation of 2.1GB and provides full capacity access to DVD-ROM media.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

  • Fixes an occasional panic that can be seen when reading from a process using Granularity Hints via procfs.

  • Fixes a problem when there is a hole in the virtual disk array.

  • Fixes a problem which can result in a panic, hang, or corruption from vnode deallocation during an unmount. This also fixes a VFS_UNMOUNT panic upon unmount.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the csh utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability.

  • Fixes a problem of incorrect default route modification in which there is a race condition between gated startup and installation of static routes.

  • Fixes two possible panics in AdvFS:

    • Caused by bs_real_invalidate_pages.

    • Caused by bs_purge_dirty.

  • A potential security vulnerability has been discovered that may result in a denial of service (DoS) on RPC-based HP Tru64 UNIX servers with Enhanced Security (C2) enabled. This potential security vulnerability may be in the form of local and remote security domain risks.

    SSRT2412 portmapper with Enhanced Security (C2) enabled (Severity - High)

  • Avoids a domain panic when a E_CANT_ACCESS_LOG error is detected.

Patch 1493.00

continued

  • Fixes a problem with RLIMIT_DATA process limits when running fsck on a large file system.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the xdr library, which is used by the rpc library. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability.

  • Fixes a "kernel memory fault" panic in the Virtual Memory subsystem on SMP systems.

  • Eliminates a Simple Lock Time Limit Exceeded due to the IoQueueMutex being held in bs_real_invalidate_pages.

  • A potential security vulnerability has been discovered in the HP Tru64 UNIX operating system, where under certain circumstances, system integrity may be compromised through improper file access (overwriting of files). This potential vulnerability is in the form of a local security domain risk. The following potential security vulnerability has been corrected:

    SSRT2301 uudecode (Severity - Medium)

  • Corrects a problem to avoid log inconsistencies.

  • Corrects a problem introduced in a prior patch which can result in a system panic when outputting through the packet filter.

  • Fixes segmentation errors that can occur when running SAS.

  • When the file system is full, now crontab will not be removing its entries and vi also will not be truncating the existing file.

  • Fixes an "unaligned access" panic when attempting to free or malloc memory from the 512 byte kernel memory bucket (bucket 5).

  • Fixes a kernel build failure seen during an Update Installation from CD-ROM. The problem affects systems whose default time zone (/etc/zoneinfo/localtime) is not in North or South America.

  • This patch provides protection against a class of potential security vulnerabilities called buffer overflows. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. This patch allows a system administrator to enable memory management protections that limit potential buffer overflow vulnerabilities.

  • Fixes a problem where the gettimezone script fails to present menus properly.

  • Fixes a problem that would generate a crash when running in lockmode 4.

  • Corrects a problem with large file systems (greater than 16K cylinder groups) created by newfs/mkfs/extendfs which can cause system panics when accessing data beyond cylinder group 16K.

  • Fixes a problem in the Network startup script where it would fail to configure an interface with an IP address.

  • Fixes a problem with csh picking the wrong message catalog entry from the translated message catalog when LANG was set to Japanese locale.

  • Fixes a possible security hole reported by SSRT2323 in QAR 96333.

Patch 1493.00

continued

  • Fixes a problem encountered with the Bourne shell when a file name with a trailing slash (/) is used as an argument to the command.

  • Fixes a problem with NIS clients failing to connect to non-Tru64 NIS servers that only support the V2 NIS protocol.

  • Fixes various problems in the ee driver for DE60x Ethernet adapters.

  • Fixes an I/O hang condition on fibre channel.

  • Fixes a memory fault condition in the emx driver that occurs when responding to an inquiry command from a remote port in the fabric.