This chapter provides information about the patches included in Patch Kit 4 for the base operating system. It also includes any general information about working with these patches.
This chapter is organized as follows:
Section 1.1 provides release notes that are specific to the Tru64 UNIX patches in this kit, as well as release notes that are of general interest.
Section 1.2 provides brief descriptions of the purpose of the Tru64 UNIX patches included in this kit.
Tru64 UNIX patch kits are cumulative.
For this kit, this means that
the patches and related documentation from patch kits 1 through 3 are included,
along with patches that are new to this kit.
To aid you in using this document,
release notes that are new with this release are listed as (New) in the section
head.
The beginning of
Section 1.2
provides a key for
understanding the history of individual patches.
1.1 Release Notes
This section provides release notes that are specific to the Tru64 UNIX
patches in this kit, as well as release notes that are of general interest.
1.1.1 Required Storage Space
Approximately 250 MB of temporary storage space is required to untar
the base and TruCluster components of this patch kit.
We recommend that this
kit not be placed in the
/
,
/usr
, or
/var
file systems because doing so may unduly constrain the available
storage space for the patching activity.
The following permanent storage space is required to successfully install the base component of the patch kit:
Approximately 71 MB of storage space in
/var/adm/patch/backup
may be required for archived original files if you choose to install
and revert all patches.
See the
Patch Kit Installation Instructions
for more information.
Approximately 73 MB of storage space in
/var/adm/patch
may be required for original files if you choose to install and
revert all patches.
See the
Patch Kit Installation Instructions
for more information.
Approximately 1346 KB of storage space is required in
/var/adm/patch/doc
for patch abstract and README documentation.
Approximately 176 KB of storage space is needed in
/usr/sbin/dupatch
for the patch management utility.
See
Section 2.1.1
for information on space needed
for the TruCluster Server patches.
1.1.2 New Russian Keyboard Patch 1197.00 (New)
The new Russian 3R-LKQ48-BT keyboard, for which Patch 1197.00
provides an updated keyboard map, comes with five extra keycaps.
To enable
any of those extra keycaps, you will need to modify the file
/usr/lib/X11/xkb/symbols/digital/russian
.
For example:
// KEY <AD09> can be replaced by an extra keycap. // If you replace it with the extra keycap, please uncomment // the following definition and comment out the oringinal one. // // key <AD09> { // symbols[Group1]=3D [ o, O ], // symbols[Group2]=3D [ Ukrainian_i, Ukrainian_I ] // }; key <AD09> { symbols[Group1]=3D [ o, O ], symbols[Group2]=3D [ Cyrillic_shcha, Cyrillic_SHCHA ] };
1.1.3 Problem Seen on Systems with Smart Array Controller (New)
This section describes the steps you should take if your system is configured with a Smart Array controller and you see the following event logged.
Host name: unx104 SCSI CAM ERROR PACKET SCSI device class: CISS (Smart Array) Bus Number: 6 Target Number: 4 Lon Number: 0 ... ... Event Information: Command timed out...resetting controller
If this occurs, take the following steps:
Create a file named
ciss.temp
with the
following lines:
ciss:
ciss_throttle_threshold=5
Execute the following command:
#sysconfigdb -m -f
ciss.temp
Reboot your system:
# shutdown -r now
1.1.4 Problem with lockmode=4 on AlphaServers with QLogic SCSI Disk Controllers
When an AlphaServer GS Series system with a QLogic SCSI disk controller
is set to lockmode=4, the system may panic on boot.
We will provide a fix
for this in the near future.
1.1.5 Updates to sys_check
This section describes updates to the
sys_check
command.
See
Section A.2
for the revised
sys_check
reference page.
1.1.5.1 sys_check Version 125 Web Kit
The following information is for users who have installed
sys_check
Version 125 web kit or higher and are currently using
that version of
sys_check
in the web kit as the system
default version.
This patch kit contains
sys_check
Version 124.
If
you have already installed the
sys_check
Version 125 web
kit or higher, then installing this patch kit will downgrade the version of
sys_check
that is being used by the system.
However, you can easily
set the system default back to the version of
sys_check
that you downloaded from the web by using the
/usr/sbin/use_sys_check
script.
For example, type
use_sys_check 125
at the command line prompt to set
sys_check
Version 125
as the system default.
If you wish to delete the
sys_check
patch (that is,
sys_check
Version 124) then you should make sure that Version 124
is the system default version before deleting the patch.
You can verify this
by examining the output of the
sys_check -v
command.
If
124.0 is not the default version, then you should run the
/usr/sbin/use_sys_check
124
command to set the system default version of
sys_check
to version 124.
Setting the system default to 124 ensures that
the Version 124
sys_check
files get removed when the patch
is deleted.
After you delete the patch, the system default version of
sys_check
will automatically be set to the version of
sys_check
that you downloaded from the web.
This is because
dupatch
saves the symbolic links that point to the web kit location
when the patch gets installed and will restore these symbolic links when the
patch gets deleted.
If you delete the patch and the system default version is not set to
124, then Version 124 will remain on the system because
sys_check
Version 124 has been backed up by the web kit (for example,
/usr/sbin/sys_check.124.0
).
You will encounter problems if you delete the
sys_check
web kit and then delete this patch kit.
This is because
dupatch
will restore the symbolic links to the web kit location when the
patch is deleted.
If you have deleted the web kit, then the symbolic links
will point to non-existent files.
You can fix this problem by re-installing
the
sys_check
web kit.
1.1.6 Support for SDLT160 Tape Device
You must add the following entries in the
/etc/ddr.dbase
and then run
/sbin/ddr_config
for the new SDLT160 tape
device to be recognized.
Add the following to
/etc/ddr.dbase
:
scsi_density_table_size = 0x4a scsi_tape_density[0x42] = "density_code_42" 0 0 scsi_tape_density[0x43] = "density_code_43" 0 0 scsi_tape_density[0x44] = "density_code_44" 0 0 scsi_tape_density[0x45] = "density_code_45" 0 0 scsi_tape_density[0x46] = "density_code_46" 0 0 scsi_tape_density[0x47] = "density_code_47" 0 0 scsi_tape_density[0x48] = "131000_bpi" 131000 0 scsi_tape_density[0x49] = "190000_bpi" 190000 0 SCSIDEVICE # # Matches SDLT320 # Type = tape Name = "COMPAQ" "SDLT320" # # PARAMETERS: TypeSubClass = tk TagQueueDepth = 0 MaxTransferSize = 0x0fffffb # (16MB - 4) ReadyTimeSeconds = 120 # seconds DENSITY: # DensityNumber = 0 DensityCode = 0x48 CompressionCode = 0x1 Buffered = 0x1 DENSITY: # DensityNumber = 1,5 DensityCode = default CompressionCode = 0x1 Buffered = 0x1 DENSITY: # DensityNumber = 2,4,6,7 DensityCode = default CompressionCode = 0x0 Buffered = 0x1 DENSITY: # DensityNumber = 3 DensityCode = 0x48 CompressionCode = 0x0 Buffered = 0x1
Run
/sbin/ddr_config
(see
ddr_config
(8) for more information).
1.1.7 envconfig(8) Update Tru64 UNIX Patch 156.00
Patch 156.00 changes the
envconfig
command.
See
Section A.1
for an updated
envconfig
(8)1.1.8 Information for Tru64 UNIX Patches 1146.00 and 1148.00
Patches 1146.00 and 1148.00 deliver version V2.0-094d of the
libots3
library.
If your system has the Compaq FORTRAN Compiler,
the Developer's Tool Kit (DTK) (OTABASE subset), or a patch that installs
a newer version of this library, do not apply this patch.
If a new revision
of the
libots3
library is already installed on your system,
and you install this patch, you will receive the following informational
message:
Problem installing: - Tru64_UNIX_V5.1A / Threads Patches Patch 00xxx.00 - Shared libots3 library fix ./usr/shlib/libots3.so: is installed by: OTABASE212 and cannot be replaced by this patch. This patch will not be installed.
To determine what version of the
libots3
library
is installed on your system, enter the following command:
#
what /usr/shlib/libots3.so libots3.so:
libots3.a V2.0-094 GEM 27 Feb 2001
1.1.9 Information for Tru64 UNIX Patch 252.00
The Essential Services Monitor (ESM) daemon,
esmd
,
improves the availability of essential system daemons by automatically restarting
them if they terminate.
The daemon monitors the Event Manager daemon,
evmd
, and, in a cluster environment, the CAA daemon,
caad
.
Restart activity is reported in the
syslog
daemon.log file.
1.1.10 Information for Tru64 UNIX Patch 1134.00
This section contains release notes for Patch 1134.00.
1.1.10.1 Updates to sh, csh, and ksh
The updated shells in this kit all implement the following changes when processing shell inline input files:
File permissions allow only read and write for owner.
If excessive inline input file name collisions occur, the following error message will be returned:
Unable to create temporary file
1.1.10.2 sh noclobber Option and >| , >>| Constructs Added
A
noclobber
option similar to that already available
with
csh
and
ksh
has been added to
the Bourne shell.
When the
noclobber
option is used (set -C
), the shell behavior for the redirection operators
>
and
>>
changes as follows:
For
>
with
noclobber
set,
sh
will return an error rather than overwrite an
existing file.
If the specified file name is actually a symbolic link, the
presence of the symbolic link satisfies the criteria
file exists
whether or not the symbolic link target exists and
sh
returns an error.
The
>|
construct will suppress
these checks and create the file.
For
>>
with
noclobber
set, output is appended to the tail of an existing file.
If the file name
is actually a symbolic link whose target does not exist,
sh
returns an error rather than create the file.
The
>>|
construct
will suppress these checks and create the file.
1.1.10.3 ksh noclobber Behavior Clarified
For
>
with
noclobber
set,
ksh
will return an error rather than overwrite an existing file.
If the specified file name is actually a symbolic link, the presence of the
symbolic link satisfies the criteria
file exists
whether
or not the symbolic link target exists and
ksh
returns
an error.
The
>|
construct will suppress these
checks and create the file.
For
>>
with
noclobber
set, output
is appended to the tail of an existing file.
If the file name is actually
a symbolic link to a nonexistent file,
ksh
returns an
error.
This is a behavior change.
Because
ksh
does not
have a
>>|
redirection override, create the symbolic link
target before accessing it through
>>
if you depend upon
appending through a symbolic link.
1.1.10.4 csh noclobber Behavior Clarified
For
>
with
noclobber
set,
csh
will return an error rather than overwrite an existing file.
If the specified file name is actually a symbolic link, the presence of the
symbolic link satisfies the criteria
file exists
whether
or not the symbolic link target exists, and
csh
returns
an error.
The
>|
construct will suppress these checks and
create the file.
For
>>
with
noclobber
set, output
is appended to the tail of an existing file.
If the file does not exist, or
the file name is actually a symbolic link whose target does not exist,
csh
returns an error rather than create the file.
The
>>|
construct will suppress these checks and create the file.
1.1.10.5 Updated mkdir System Call and Command
This kit reverts the
mkdir
system call, and thus
the
mkdir
command, to its Tru64 UNIX Version 4.n behavior
with respect to symbolic links.
For the unusual case where a symbolic link
is used as the very last element of a
mkdir
path, the
mkdir
system call now returns an error rather than create the target.
If you want
mkdir
to follow the symbolic link you
can do so by making the last character of the
mkdir
pathname
a slash.
For example, if
/var/tmp/foo
is a symbolic link
to
/usr/xxx
, which does not exist, then
mkdir("/var/tmp/foo",0755)
will return an error but
mkdir("var/tmp/foo/",0755)
will create
/usr/xxx
.
The behavior of
mkdir
can also be controlled systemwide
by an addition to the
sysconfig
options for the
vfs
subsystem.
The new
sysconfig
option
follow_mkdir_symlinks
defaults to 0, specifying the secure symbolic
link behavior.
Changing this option to 1, which we strongly discourage,
will cause
mkdir
to follow symbolic links.
1.1.11 Reference Page Updates Tru64 UNIX Patch 1107.00
The installation of Patch 1107.00 results in changes to the
sys_attrs_netrain
(5)nifftmt
(7)niffconfig
(8)ifconfig
(8)
sys_attrs_netrain
(5)
nifftmt
(7)
niffconfig
(8)
ifconfig
(8)
1.1.12 Information for Tru64 UNIX Patch 1367.00
This section contains release notes for Tru64 UNIX Patch 1367.00.
1.1.12.1 Enabling the /dev/poll Function
In order to enable the
/dev/poll
function the special
device
poll
must be created manually.
The procedure is
as follows:
Change your directory to
/dev
:
#
cd /dev
Execute the MAKEDEV script, found in that directory with either
poll
or
std
as an argument:
#
MAKEDEV
[poll or std]
1.1.12.2 Removal of Version-Switched Patch
This patch provides a script,
/usr/sbin/evm_versw_undo
,
that allows you to remove the EVM patch after the version switch has been
thrown by running
clu_upgrade -switch
.
This script will
set back the version identifiers and request a cluster shutdown and reboot
to finish the deletion of the patch.
Another rolling upgrade will be required
to delete the patch with
dupatch
.
Note
Because the removal of a version-switched patch requires a cluster shutdown, only run this script when you are absolutely sure that this patch is the cause of your problem.
This script must be run by root in multiuser mode after completing the rolling upgrade that installed the patch and before starting another rolling upgrade. The final removal of the patch can only be accomplished by rebooting the system or cluster after this script completes its processing. This script will offer to shut down your system or cluster at the end of its processing. If you choose to wait, it is your responsibility to execute the shutdown of the system or cluster.
Do not forget or wait for an extended period of time before shutting down the cluster. Cluster members that attempt to reboot before the entire cluster is shut down can experience panics or hangs.
This patch adds a new
ee
subsystem attribute,
link_check_interval
, that allows the
ee
driver
link state polling interval to be tuned for faster failover times when using
ee
devices for Link Aggregation.
The
sys_attrs_ee
(5) reference page is updated as
follows:
link_check_interval
The interval at which the driver polls the interface link
state, in units of hundredths of seconds. Modifying this
interval is recommended only when using "ee" devices for
Link Aggregation.
Default value: 200 (2 seconds)
Minimum value: 10 (0.1 seconds)
Maximum value: 1000 (10 seconds)
1.1.12.4 lag(7) and lagconfig(8) Reference Page Updates
This patch enables support for network Link Aggregation, or trunking. Link Aggregation can be used to provide increased network bandwidth and availability. Two or more physical Ethernet ports can be combined to create a link aggregation group, which is seen by upper-layer software as a single logical network interface.
See the
Network Administration: Connections
manual
for information on configuring link aggregation groups.
See
lag
(7)lagconfig
(8)lag
(7)lagconfig
(8)1.1.12.5 wol(8) Reference Page Update
The installation of this patch changes the information in the
wol
(8)wol
(8)1.2 Summary of Base Operating System Patches
This section provides brief descriptions of the patches in Patch Kit 4 for the Tru64 UNIX operating system. Because Tru64 UNIX patch kits are cumulative, each patch lists its state according to the following criteria:
New
Indicates a patch that is new for this release.
New (Supersedes Patches ... )
Indicates a patch that is new to the kit but was combined (merged) with one or more patches during the creation of earlier versions of this kit, before it was publicly released.
Existing (Kit 3)
Indicates a patch that was new in the previous Version 5.1A patch kit.
Existing
Indicates a patch that existed in earlier Version 5.1A patch kits.
Supersedes Patches ...
Indicates a patch that was combined (merged) with other patches.
Number: Patch 65.00 Abstract: Fix for Compaq C compiler and Compaq driver State: Existing This patch fixes the following problems in the Compaq C compiler and Compiler driver:
|
Number: Patch 88.00 Abstract: Fix for cluster hang during boot State: Supersedes Patches 29.00 This patch fixes a situation in which the second node in a cluster hangs upon boot while setting current time and date with ntpdate. |
Number: Patch 86.00 Abstract: Fix for Korn shell hang State: Existing This patch fixes a problem where the Korn shell (ksh) could hang if you pasted a large number of commands to it when it was running in a terminal emulator window (such as an xterm). |
Number: Patch 97.00 Abstract: Fix for vi editor core dump problem State: Existing This patch fixes a problem where the vi editor core dumps when it finds invalid syntax during a substitute operation. |
Number: Patch 108.00 Abstract: Fixes a potential race deadlock State: Existing This patch fixes a potential race deadlock between vclean/ufs_reclaim and quotaon/quotaoff when quota is enabled. |
Number: Patch 117.00 Abstract: Fix for evmget command State: Existing This patch fixes a situation in which the evmget command and the event log nightly cleanup operation may fail with an "arg list too long" message. |
Number: Patch 123.00 Abstract: Corrects a memory leak in the XTI socket code State: Existing This patch corrects a memory leak in the XTI socket code. |
Number: Patch 136.00 Abstract: Fix for incorrect POSIX 4 message queues behavior State: Existing POSIX 4 message queue behavior was not following the standard and was returning unique message descriptors. |
Number: Patch 138.00 Abstract: Static librt library fix for POSIX 4 message queues State: Existing POSIX 4 message queue behavior was not following the standard and returning unique message descriptors. |
Number: Patch 141.00 Abstract: Security (SSRT0638U) State: Existing (Kit 3) This patch:
|
Number: Patch 143.00 Abstract: Allows dxsetacl utility to delete access ACLs State: Existing This patch allows the dxsetacl utility to delete access ACLs. |
Number: Patch 145.00 Abstract: Security (SSRT0638U) State: Existing This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of root directory compromise via lpr using X11. |
Number: Patch 154.00 Abstract: Security (SSRT0682U) State: Existing This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 156.00 Abstract: Fixes problems which prevented envmond from starting State: Existing This patch fixes problems which prevented envmond from starting. |
Number: Patch 158.00 Abstract: Fix for Spike postlink optimizer State: Existing This patch fixes a problem where Spike may fail to delete the low instruction of a pair of related instructions, causing it to abort with a run-time error. |
Number: Patch 169.00 Abstract: Fixes a problem in latsetup State: Existing This patch fixes a problem in latsetup when the directory /dev/lat is not found. |
Number: Patch 171.00 Abstract: Fixes a problem in diskconfig State: Existing This fixes a problem in diskconfig where partitions with an offset and size of zero cannot be selected. It also fixes a problem where overlapping partitions cannot be adjusted if the existing partitions are not in alphabetical order. |
Number: Patch 173.00 Abstract: Fix for ELSA Gloria Synergy, PS4D10, JIB graphic card State: Existing This patch fixes a problem where, on the ELSA Gloria Synergy, PS4D10, and JIB graphic cards, the cursor position is not being updated properly. The placement of the cursor is one request behind. |
Number: Patch 185.00 Abstract: Corrects a problem in the rdist utility State: Existing This patch corrects a problem in the rdist utility which was causing segmentation faults on files with more than one link. |
Number: Patch 187.00 Abstract: Fixes a volrecover error State: Existing This patch fixes a volrecover error of "Cannot refetch volume" when volumes exist only in a non-rootdg diskgroup. |
Number: Patch 189.00 Abstract: Fix for no rerouting problem on a CFS server State: Existing This patch fixes a problem where pulling the network cable on one node acting as a CFS server in a cluster causes no rerouting to occur. |
Number: Patch 195.00 Abstract: BPF default packet filter may cause system panic State: Existing This patch corrects a problem which could result in a system panic on close() if the BPF default packet filter is in use. |
Number: Patch 210.00 Abstract: Fixes problems with X server X Image Extension (XIE) State: Existing This patch fixes problems with the X server X Image Extension (XIE). |
Number: Patch 212.00 Abstract: Fixes a problem of the ATM setup script failing State: Existing This patch fixes a problem of the ATM setup script failing when configuring an elan if the lane subsystem is not loaded. |
Number: Patch 220.00 Abstract: Corrects a problem with the NIFF daemon State: Existing This patch corrects a problem where the NIFF daemon (niffd) would exit if its connection to the EVM daemon (evmd) failed, as in the case of an EVM daemon restart. |
Number: Patch 222.00 Abstract: Fix for mv command State: Existing This patch fixes a problem where the mv command will not perform a move if the inode of the file is the same as the inode of the destination directory, even though the file and directory are on different file systems. |
Number: Patch 224.00 Abstract: The joind server may fail to clean up its lock files State: Existing The patch fixes a problem where joind may fail to clean up its lock files in /var/join. |
Number: Patch 234.00 Abstract: Adds support for Persistent Reserve for HSV110 State: Existing This patch updates the SCSI CAM Utility Program /sbin/scu by adding support for Persistent Reserve for HSV110 as well as the display of 128-bit WWIDS. |
Number: Patch 238.00 Abstract: Fix for dxsetacl utility State: Existing This patch allows the dxsetacl utility to delete access ACLs. |
Number: 248.00 Abstract: Fixes a problem in the strtod routine State: Existing This patch:
|
Number: Patch 252.00 Abstract: Adds Essential Services Monitor daemon (esmd) State: Existing (Kit 3) This patch provides enablers for the Compaq Database Utility. |
Number: Patch 259.00 Abstract: Removes extraneous header comments State: Existing This patch removes extraneous history edit comments from exported DECthreads header files. |
Number: Patch 269.00 Abstract: Improves user control of clu_mibs State: Existing This patch move the control of the start and stop of the clu_mibs agent from /sbin/init.d/clu_max script to /sbin/init.d/snmpd script. |
Number: Patch 281.00 Abstract: Fix for NHD kit installations State: Existing This patch corrects a problem that occurs during the installation of a New Hardware Device (NHD) kit, in which the version.id file was not properly referenced thereby causing the installation to fail. |
Number: Patch 311.00 Abstract: Quick Setup erroneously reports daemons do not start State: Existing This patch fixes a problem that occurs on some systems, notably an AlphaStation DS10 system, in which Quick Setup may erroneously report that some daemons did not start and subsequent attempts generate other error messages appear that report duplicate host names. |
Number: Patch 327.00 Abstract: Fixes C++ incompatibility State: Existing This patch fixes C++ incompatibility in three files in /usr/include/alpha/hal/ and one file in /usr/include/io/common/. |
Number: Patch 414.00 Abstract: Fixes a problem in stdio.h State: Existing This patch fixes a problem in <stdio.h> where the interface renaming conditionals for fgetpos() and fsetpos() were mismatched. It also fixes a problem in <sys/timeb.h> where the ftime() prototype was not available in the default compilation name space. |
Number: Patch 416.00 Abstract: Fixes a problem in sys/timeb.h State: Existing This patch fixes a problem in <stdio.h> where the interface renaming conditionals for fgetpos() and fsetpos() were mismatched. It also fixes a problem in <sys/timeb.h> where the ftime() prototype was not available in the default compilation name space. |
Number: Patch 428.00 Abstract: Fix for evmwatch termination problem State: Supersedes Patches 164.00 and 257.00 This patch:
|
Number: Patch 438.00 Abstract: Fix for dxproctuner utility State: Existing This patch fixes a problem in dxproctuner where the process information is not displayed when there is a double quotation mark followed by any other character in the command column. |
Number: Patch 446.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U) State New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 453.00 Abstract: Fix for dtgreet application State: Existing This patch fixes a problem in which after installing DCE, enabling SIA would cause a core dump and the greeter window does not comes up. |
Number: Patch 455.00 Abstract: Fix for lsmsa product State: Existing This patch addresses a problem in the display of disk controller to disk hierarchy by the lsmsa product. |
Number: Patch 457.00 Abstract: Fix for broken symbolic links in /usr/lib/X11 State: Existing This patch fixes a problem where three symbolic links in /usr/lib/X11 pointed to nonexistent directories. |
Number: Patch 459.00 Abstract: Symbolic links point to nonexistent directories State: Existing This patch fixes a problem in which three symbolic links in /usr/lib/X11 point to nonexistent directories. |
Number: Patch 465.00 Abstract: Fix for Elsa Gloria Comet card State: Existing This patch fixes a problem in which the Elsa Gloria Comet card does not correctly draw nested shaded boxes or anything similar. |
Number: Patch 467.00 Abstract: Fix for accessx beeping functionality State: Existing This patch fixes a problem in which a beep does not occur when requested when the toggle keys option is enabled via accessx. |
Number: Patch 469.00 Abstract: Fixes a problem in uucp State: Existing This patch fixes a problem in uucp. uucp between two Tru64 UNIX boxes hangs when a uucp failure occurs. |
Number: Patch 481.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U) State: Existing This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 485.00 Abstract: Fix for C++ compile problem State: Existing This patch fixes a C++ compile problem in /usr/include/X11/Xlib.h. |
Number: Patch 490.00 Abstract: Fix for class scheduler failure State: Existing (Kit 3) This patch:
|
Number: Patch 500.00 Abstract: Fixes libXm.so incompatability State: Existing This patch fixes an libXm.so incompatibility. |
Number: Patch 506.00 Abstract: Fix for rdump command State: Existing This patch causes the rdump command to properly dump data onto remote tape devices without receiving the SIGSEGV and dumping core. |
Number: Patch 517.00 Abstract: Fix for LSM resynchronization problem State: Existing This patch corrects a problem with a mirrored LSM volume, with dirty region logging (DRL) enabled, still doing a full resynchronization during the first recovery after an unclean shutdown. |
Number: Patch 519.00 Abstract: Fixes the C++ incompatibility with pwrmgr.h State: Existing This patch fixes the C++ incompatibility of /usr/include/dec/pwrmgr/pwrmgr.h. |
Number: Patch 525.00 Abstract: Security (SSRT0779U) State: Existing This patch fixes a potential security vunerability where, under certain circumstances, SNMP services can stop functioning. |
Number: Patch 527.00 Abstract: Security (SSRT0779U) State: Existing This patch fixes a potential security vunerability where, under certain circumstances, SNMP services can stop functioning. |
Number: Patch 531.00 Abstract: Fix for KMF caused by malformed IPv4-in-IPv4 packets State: Existing (Kit 3) This patch:
|
Number: Patch 533.00 Abstract: Fix for od command State: Existing This patch fixes a problem in which an invalid character sequence causes the od command to hang or display a partial character. |
Number: Patch 535.00 Abstract: Fix for balance utility State: Existing This patch fixes problem in which the balance utility terminated before balancing the whole domain when the domain was very large ( >4 GB ). |
Number: Patch 537.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-48U) State: Existing (Kit 3) This patch fixes several potential security vulnerabilities where, under certain circumstances, system integrity may be compromised. These may be in the form of improper file access. |
Number: Patch 545.00 Abstract: Fixes EVMs periodic channel monitoring function State: Existing This patch fixes a problem in which the Event Manager's channel monitoring function is temporarily disabled if the evmreload command is run. |
Number: Patch 551.00 Abstract: Fixes an ATM signaling problem State: Existing This patch fixes an ATM signaling problem. |
Number: Patch 553.00 Abstract: EVM daemon fails to find user-defined templates State: Existing This patch resolves a problem with the Event Manager (EVM) where user-defined events are not posted in a semirolled cluster. The Event Manager daemon fails to find user-defined templates in /usr/share/evm/templates/local on nonupgraded nodes in a semirolled cluster. |
Number: Patch 565.00 Abstract: Enabler for Compaq Database Utility State: Supersedes Patches 179.00, 292.00 This patch provides enablers for the Compaq Database Utility. |
Number: Patch 569.00 Abstract: CD Mastering Software State: Existing This patch provides that CD Mastering Software for DS25 systems, which do not include a floppy drive, but have a CD-ROM burner instead. In order to write to this device, CD Mastering Software is required. It is made up of mkisofs and cdrecord software. |
Number: Patch 571.00 Abstract: The savecore command prematurely terminates crash dump recovery State: Existing This patch corrects a problem where the savecore command may prematurely terminate crash dump recovery on partitions larger than 4 GB. |
Number: Patch 578.00 Abstract: Fix for zdump utility State: Existing This patch:
|
Number: Patch 580.00 Abstract: Extended Visual Information returns incorrect info State: Existing This patch fixes a problem in which the X server's Extended Visual Information (EVI) extension was returning incorrect information. |
Number: Patch 588.00 Abstract: Fix for NS record syntax in named.local file State: Existing This patch fixes the NS record syntax in a named.local file. |
Number: Patch 691.00 Abstract: Fix for atexit and pthread_prefork handler crashes State: Existing (Kit 3) This patch fixes a problem with atexit() or pthread_atfork() handlers in shared libraries. An application will crash when handlers in shared libaries are called after the libraries are dlclosed and unmapped. |
Number: Patch 693.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U) State: Existing (Kit 3) This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 699.00 Abstract: Fix for kdbx State: Existing (Kit 3) This patch fixes a premature termination of the ofile kdbx extension, warning messages in various kdbx extensions, and token length warnings when kdbx is invoked. |
Number: Patch 701.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U) State: Existing (Kit 3) This patch adds the mktemp(1) reference page for the mktemp command. |
Number: Patch 705.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U) State: Existing (Kit 3) This patch updates the mktemp(3) reference page with changed information regarding the mktemp() and mkstemp() routines, and adds information about the mkdtemp() and mkstemps() libc routines. |
Number: Patch 711.00 Abstract: Fix for shfragbf State: Existing This patch clarifies the output of shfragbf, an AdvFS utility. |
Number: Patch 713.00 Abstract: Fix for rcinet script State: Existing This patch prevents the system from hanging when the rcinet script is used by correcting the order in which NetRAIN-related services are started and stopped. |
Number: Patch 718.00 Abstract Fix for traceroute command State: Existing (Kit 3) This patch corrects a problem where traceroute sometimes failed to provide responses and finish a trace when the destination host name was given on the command line. |
Number: Patch 720.00 Patch: Fix for assembler problems State: Existing (Kit 3) This patch, shipped as Version 3.06.08 of the Tru64 UNIX Assembler, resolves three assembler problems related to the following:
|
Number: Patch 731.00 Abstract: (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U) State: Existing (Kit 3) This patch adds the safe_open(3) reference page for the safe_open() routine in libc. |
Number: Patch 733.00 Abstract: Fix for Memory Channel driver problem State: Existing (Kit 3) This patch addresses a situation in which the Memory Channel device shuts down if too many state change interrupts are received. |
Number: Patch 739.00 Abstract: Fixes a problem with os_mibs State: Existing (Kit 3) This patch fixes a problem with os_mibs that could cause the application to consume an excessive amount of CPU time. |
Number: Patch 741.00 Abstract: Enhancement to savemeta script State: Existing (Kit 3) This patch enhances the capability of savemeta script as follows:
|
Number: Patch 744.00 Abstract: Shared library fix for libaio State: Existing (Kit 3) This patch:
|
Number: Patch 747.00 Abstract: Static library fix for libaio State: Existing (Kit 3) This patch:
|
Number: Patch 749.00 Abstract: Modification to secconfig suitlet State: Existing (Kit 3) This patch makes the customize database option available when using secconfig for shadow passwords. |
Number: Patch 751.00 Abstract: Security (SSRT0818U) State: Existing (Kit 3) This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 753.00 Abstract: Security (SSRT0818U) State: Existing (Kit 3) This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 755.00 Abstract: Security (SSRT0818U) State: Existing (Kit 3) This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 757.00 Abstract: Fix for script command State: Existing (Kit 3) This patch corrects a problem in which script would hang upon exit in a dfs configuration. |
Number: Patch 759.00 Abstract: System Mgmt Station detects failing PCI adapters State: Existing (Kit 3) This patch provides the ability for the System Management Station to render PCI adapters with a warning or failed representation when they are in the indicted state. This is in addition to the previous ability to render CPUs that are in the indicted state. |
Number: Patch 761.00 Abstract: Fixes a problem in the mwm window manager State: Existing (Kit 3) This patch fixes a problem in the mwm window manager in which double-click actions are performed on the second button press instead of the second button release, thus causing the second button release event to be sent to any underlying window. |
Number: Patch 763.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U) State: Existing (Kit 3) This patch adds the dirclean(8) reference page for the /usr/sbin/dirclean utility. |
Number: Patch 765.00 Abstract: Provides the poll reference page State: Existing (Kit 3) This patch adds the poll(7) reference page for the /dev/poll driver. |
Number: Patch 767.00 Abstract: Enhancement to fuser utility State: Existing This patch allows the fuser utility to display the reference option. This option indicates the type of reference made; for example: open, closed, unlinked, or mmapped. |
Number: Patch 769.00 Abstract: Fix for su command State: Existing (Kit 3) This patch corrects the behavior of the su command so that the LOGNAME environment variable is changed to the target user when executed with the - option. |
Number: Patch 771.00 Abstract: lsmsa incorrectly processing passwords State: Existing (Kit 3) This patch fixes a problem where lsmsa incorrectly processes passwords that are longer than eight characters. Anyone who tries to start the LSM GUI using a password of eight or more characters will be denied access. |
Number: Patch 773.00 Abstract: Security (SSRT0795U) State: Existing (Kit 3) This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form where inetd may block incoming connections when scanned by nmap or other port scanners. |
Number: Patch 779.00 Abstract: Fixes an xfs problem State: Existing (Kit 3) This patch fixes an xfs problem which causes a "QueryGlyphs failed" error in showfont. |
Number: Patch 787.00 Abstract: Enhancement for siacfg utility State: Existing (Kit 3) This patch allows nonlocal SIA mechanisms, LDAP for example, to place their mechanism last in the list of mechanisms. |
Number: Patch 789.00 Abstract: Fix for ppdof print filter core dump problem State: Existing (Kit 3) This patch corrects a problem where the filter can core dump when the banner jobname contains 132 characters. |
Number: Patch 791.00 Abstract: Fix for salvage utility core dump problem State: Existing (Kit 3) This patch fixes a problem with the /sbin/advfs/salvage utility that could cause the utility to core dump. |
Number: Patch 793.00 Abstract: Fix for startslip program problem State: Existing (Kit 3) This patch fixes a problem where startslip was not able to extract all the information from the acucap file. |
Number: Patch 795.00 Abstract: A timing window can cause a hang in run_usr_cmd State: Existing (Kit 3) This patch fixes a problem in which a timing window can cause a hang in run_usr_cmd. |
Number: Patch 801.00 Abstract: Fix for convuser utility State: Existing (Kit 3) This patch fixes a problem where, if a user was working in enhanced security and then switched to base security, the group and other read privileges would get stripped from /etc/passwd. |
Number: Patch 803.00 Abstract: Fixes a problem in access_lines for libmld State: Existing (Kit 3) This patch fixes a problem that may cause the third command and other Atom-based instrumentation tools to fail. |
Number: Patch 809.00 Abstract: Enables correctable error reporting from DTAGII State: Existing (Kit 3) This patch enables correctable error reporting from DTAGII chips on GS320/160/80 1.224Ghz CPU systems. |
Number: Patch 817.00 Abstract: Fixes a simple_lock panic when using ATM State: Existing (Kit 3) This patch:
|
Number: Patch 824.00 Abstract: Provides the ckfsec reference page State: Existing (Kit 3) This patch delivers the ckfsec(1) reference page. |
Number: Patch 826.00 Abstract: Security (SSRT0794U) State: Existing (Kit 3) This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. |
Number: Patch 828.00 Abstract: Security (wc.symlink.002.spautils) State: Existing (Kit 3) This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of certain files in world-writable directories. This patch provides the ckfsec utility which can help detect such files. |
Number: Patch 830.00 Abstract: Incompatibility between Java 1.1.x and Java 2 1.2.x State: Existing (Kit 3) This patch allows users who are using SysMan tools on the iPAQ, or who have Java 2 as their default Java version, to communicate with Tru64 UNIX V5.1A systems. |
Number: Patch 832.00 Abstract: Update to exportfs reference page State: Existing (Kit 3) This patch updates the exportfs(2) reference page with changed information regarding the exportfsdata structure as a result of increasing a number of file systems that can be NFS mounted from 256 to 1024. |
Number: Patch 840.00 Abstract: Definition of XtPending was changed State: Existing (Kit 3) This patch fixes a problem where the definition of the X Toolkit function XtPending() was changed in Tru64 UNIX V5.1A which caused some applications built on earlier versions of Tru64 UNIX to fail. |
Number: Patch 848.00 Abstract: Security State: New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 850.00 Abstract: Security State: New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 852.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U) State: Supersedes Patch 92.00 This patch:
|
Number: Patch 992.00 Abstract: Fix for library call used to calculate disk size State: Supersedes Patch 844.00 This patch:
|
Number: Patch 994.00 Abstract: Fix for problems in dsfmgr State: New This patch fixes many small problems in dsfmgr. |
Number: Patch 999.00 Abstract: Security (SSRT1-80U) State: Supersedes Patches 71.00 and 997.00 This patch:
|
Number: Patch 1002.00 Abstract: Security (SSRT1-80U) State: Supersedes Patches 73.00 and 1000.00 This patch:
|
Number: Patch 1008.00 Abstract: Security (SSRT0767U, SSRT2251, SSRT2274, SSRT0788U) State: Supersedes Patches 539.00, 208.00, 429.00, 430.00, 432.00, 695.00, 1003.00, 1004.00, 1005.00, 1006.00, 1283.00 This patch: :
|
Number: Patch 1011.00 Abstract: Security (SSRT0753U, SSRT0752U, SSRT0788U) State: Supersedes Patches 433.00, 434.00, 436.00, 697.00, 1009.00 This patch: :
|
Number: Patch 1020.00 Abstract: Security (SSRT2275) State: Supersedes Patch 1018.00 This patch:
|
Number: Patch 1023.00 Abstract: Fixes memory leak in PanoramiX/Xinerama Extension State: Supersedes Patches 98.00, 99.00, 101.00, 439.00, 441.00, 1021.00 This patch:
|
Number: Patch 1025.00 Abstract: Security (SSRT2301) State: New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised through improper file access (overwriting of files). This potential vulnerability is in the form of a local security domain risk. The following potential security vulnerability has been corrected:
|
Number: Patch 1027.00 Abstract: Security State: New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 1040.00 State: Supersedes Patches 3.00, 5.00, 113.00, 115.00, 119.00, 447.00, 479.00, 451.00, 449.00, 706.00, 707.00, 709.01, 1028.00, 1029.00, 1030.00, 1031.00, 1032.00, 1033.00, 1034.00, 1035.00, 1036.00, 1037.00, 1038.00 This patch:
|
Patch 1040.00 Continued
|
Number: Patch 1042.00 Abstract: Fix for libos shared library State: New This patch fixes a problem where the X server's command line option to turn off VESA Display Power Management Signalling (-dpms) does not work. |
Number: Patch 1044.00 Abstract: Fixes failures under high DMA resource utilization State: New This patch corrects a problem that can occur under high DMA resource utilization. If a request for DMA resources (via dma_map_load()) fails, a stale pointer to freed memory is returned to the requestor, setting up the potential for a double free of malloc'd memory or dereferencing through that pointer, resulting in a panic. |
Number: Patch 1046.00 Abstract: Security State: New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 1059.00 Abstract: Fix for Sysman Account Management tool State: New (Supersedes Patch 1057.00) This patch:
|
Number: Patch 1061.00 Abstract: Security (SSRT2208) State: New This patch fixes a potential security vulnerability which may allow non-privileged users to gain unauthorized (root) access. This may be in the form of local and remote security domain risks. This potential security vulnerability in routed has been corrected. |
Number: Patch 1063.00 Abstract: Fixes hwmgr command to show path state correctly State: New This patch fixes the hwmgr command to show path state correctly. |
Number: Patch 1065.00 Abstract: Fix for cp command State: New (Supersedes Patch 160.00) This patch fixes a problem in which the cp and cat commands produce different file sizes when reading from a tape device. It also corrects the cp command performance related to the problem. |
Number: Patch 1073.00 Abstract: Security (SSRT2229) State: New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 1075.00 Abstract: Security State: New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 1087.00 Abstract: Security State: New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised compromised when a buffer overflow occurs in the dxterm utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. |
Number: Patch 1089.00 Abstract: Security State: New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised compromised when a buffer overflow occurs in the dxterm utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. |
Number: Patch 1091.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U) State: New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 1093.00 Abstract: Security (SSRT2339, SSRT2339) State: New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 1095.00 Abstract: Security State: New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 1097.00 Abstract: Fix prevents "simple lock owned" panics State: New This patch prevents "simple lock owned" panics. |
Number: Patch 1099.00 Abstract: Security State: New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 1101.00 Abstract: Security State: New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 1103.00 Abstract: Fix for verify command State: New This patch fixes a problem whereby the verify utility would core dump if it encountered a specific type of metadata inconsistency. |
Number: Patch 1105.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U) State: Supersedes Patch 502.00 This patch fixes several potential security vulnerabilities where, under certain circumstances, system integrity may be compromised. These may be in the form of improper file access. |
Number: Patch 1107.00 Abstract: Adds support to ifconfig application for IPv6 command State: Supersedes Patches 232.00 and 504.00) This patch:
|
Number: Patch 1109.00 Abstract: Security State: New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. . This may be in the form of improper file or privilege management. |
Number: Patch 1111.00 Abstract: Security State: New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 1113.00 Abstract: Security State: New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. . This may be in the form of improper file or privilege management. |
Number: Patch 1115.00 Abstract: Fixes interop problem between curses.h and esnmp.h State: New This patch fixes an interoperability problem between the curses.h and esnmp.h header files. |
Number: Patch 1117.00 Abstract: Security State: New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 1121.00 State: New This patch allows non-Compaq C compilers to avoid name space pollution when getting information about a file. |
Number: Patch 1123.00 Abstract: Security State: New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 1125.00 State: New This patch fixes the display for the hwmgr -show name command to align properly for the name field. |
Number: Patch 1127.00 Abstract: Security State: New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 1129.00 Abstract: Update to hwmgr utility State: New This patch fixes a problem where, when using hwmgr to delete a component, the message "DELETE_COMMIT: Cannot fetch name" may be displayed on the console. |
Number: Patch 1134.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U) State: Supersedes Patches 125.00, 309.00, 460.00, 461.00, 463.00, 734.00, 735.00, 737.00, 1130.00, 1131.00, 1132.00 This patch:
|
Number: Patch 1136.00 Abstract: Modifies enablers for Enterprise Volume Manager State: Supersedes Patches 197.00, 263.00, 313.00, 513.00 This patch modifies enablers for Enterprise Volume Managert. |
Number: Patch 1138.00 Abstract: Modifies enablers for Enterprise Volume Manager State: Supersedes Patches 201.00, 265.00, 317.00, 515.00 This patch modifies enablers for Enterprise Volume Manager. |
Number: Patch 1140.00 Abstract: Modifies enablers for Enterprise Volume Manager State: Supersedes Patches 199.00, 267.00, 315.00 This patch modifies enablers for Enterprise Volume Manager. |
Number: Patch 1142.00 Abstract: Security (SSRT0792U) State: New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 1144.00 Abstract: Security State: New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 1146.00 Abstract: Installs version V2.1-120 of libots3 State: Supersedes Patch 226.00 This patch installs version V2.1-120 of the /usr/lib/libots3.a and /usr/shlib/libots3.so libraries, which do the following:
|
Number: Patch 1148.00 Abstract: Installs version V2.1-120 of libots3 State: Supersedes Patch 228.00 This patch installs version V2.1-120 of the /usr/lib/libots3.a and /usr/shlib/libots3.so libraries, which do the following:
|
Number: Patch 1152.00 Abstract: Security State: Supersedes Patches 584.00, 775.00 This patch:
|
Number: Patch 1154.00 Abstract: Security State: New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the binmail (also called mail) utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. |
Number: Patch 1156.00 Abstract: Security State: New This patch fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 1158.00 Abstract: Security State: Supersedes Patch 529.00 This patch:
|
Number: Patch 1166.00 Abstract: Fixes consvar -s bootdef_dev failure with KZPCC State: New This patch:
|
Number: Patch 1168.00 Abstract: Fix for libdix shared library State: Supersedes Patches 76.00 and 78.00 This patch:
|
Number: Patch 1170.00 Abstract: Security State: Supersedes Patch 84.00 This patch:
|
Number: Patch 1172.00 Abstract: Fix for sysconfig utility State: New This patch fixes a problem in which the lines in the output stream from "sysconfig -Q" can be truncated. |
Number: Patch 1175.00 Abstract: Security State: New (Supersedes Patch 1173.00) This patch:
|
Number: Patch 1177.00 Abstract: Security (SSRT0743U, SSRT2256) State: Supersedes Patch 69.00 This patch:
|
Number: Patch 1179.00 Abstract: Security State: Supersedes Patch 106.00 This patch:
|
Number: Patch 1181.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U) State: Supersedes Patches 109.00, 110.00, 112.00, 282.00, 284.00, 442.00, 444.00, 714.00, 716.00, 1047.00, 1048.00, 1049.00, 1050.00, 1051.00, 1052.00, 1053.00, 1054.00, 1056.00 This patch:
|
Number: Patch 1183.00 Abstract: Security State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file access. |
Number: Patch 1185.00 Abstract: Security State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file or privilege management. |
Number: Patch 1187.00 Abstract: Security State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file or privilege management. |
Number: Patch 1190.00 Abstract: Fix for ld linker State: Supersedes Patches 150.00, 555.00, 1188.00 This patch:
|
Number: Patch 1192.00 Abstract: Security State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file access. |
Number: Patch 1197.00 Abstract: Provides updated keyboard map for Russian keyboard State: New This patch provides an updated keyboard map for the Russian 3R-LKQ48-BT keyboard model. |
Number: Patch 1200.00 Abstract: Performance tool failures on Sierra Clusters PFS State: New (Supersedes Patch 1198.00) This patch:
|
Number: Patch 1202.00 Abstract: Security State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file access. |
Number: Patch 1206.00 Abstract: Security State: New (Supersedes Patches 1203.00 and 1204.00) This patch fixes several potential security vulnerabilities which, under certain circumstances, could compromise system integrity. These may be in the form of improper file or privilege management. |
Number: Patch 1208.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U) State: Supersedes Patch 573.00 This patch fixes several potential security vulnerabilities which, under certain circumstances, could compromise system integrity. These may be in the form of improper file access. |
Number: Patch 1210.00 Abstract: Fixes a simple lock fault in the floppy driver State: New This patch fixes a simple lock panic in the floppy driver. |
Number: Patch 1212.00 Abstract: Fixes and improves the mcutil program State: New This patch fixes and improves the mcutil program by correcting how bus resets are handled by the program, and by enhancing its error reporting capailities. |
Number: Patch 1214.00 Abstract: Fixes binlogd problem State: Supersedes Patches 586.00, 777.00 This patch:
|
Number: Patch 1220.00 Abstract: Added support for DECthreads V3.18-150 State: Supersedes Patches 82.00, 420.00, 783.00, 785.00, 1218.00 This patch installs DECthreads V3.18-150, which is the latest support version of the HP POSIX Threads library for Tru64 UNIX V5.1A. It corrects several problems. |
Number: Patch 1222.00 Abstract: Problem using MD5 authentication with Version 2 RIP State: New This patch corrects a problem using MD5 authentication with Version 2 RIP. |
Number: Patch 1224.00 Abstract: Security State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file or privilege management. |
Number: Patch 1226.00 Abstract: Security State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file access. |
Number: Patch 1228.00 Abstract: Security State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file or privilege management. |
Number: Patch 1226.00 Abstract: Security State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file or privilege management. |
Number: Patch 1232.00 Abstract: Security (SSRT2368, SSRT2368) State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file or privilege management. |
Number: Patch 1235.00 Abstract: SDLT media error caused bus resets with KZPCA adapter State: Supersedes Patches 261.00,483.00, 797.00, 1233.00 This patch:
|
Number: Patch 1237.00 Abstract: Security (SSRT2193) State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity when a buffer overflow occurs in the mailcv utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. |
Number: Patch 1240.00 Abstract: Fixes for the collect utility State: Supersedes Patches 175.00, 799.00, 1238.00 This patch installs Version 2.0.3 of the collect utility and does the following:
|
Number: Patch 1242.00 Abstract: libpset shared library fix State: New This patch fixes a problem that would prohibit processor set exclusive use on non-uniform memory access (NUMA) machines. |
Number: Patch 1244.00 Abstract: libpset static library fix State: New This patch fixes a problem that would prohibit processor set exclusive use on non-uniform memory access (NUMA) machines. |
Number: Patch 1246.00 Abstract: Security State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file access. |
Number: Patch 1251.00 Abstract: Security (SSRT2280) State: New (Supersedes Patch 1249.00) This patch fixes several potential security vulnerabilities where under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the dtterm utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. |
Number: Patch 1253.00 Abstract: Security State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file or privilege management. |
Number: Patch 1255.00 Abstract: Security State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file or privilege management. |
Number: Patch 1257.00 Abstract: Security State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file access. |
Number: Patch 1260.00 Abstract: Fixes a problem in procfs State: Supersedes Patches 216.00, 805.00, 1258.00 This patch:
|
Number: Patch 1262.00 Abstract: Security State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file or privilege management. |
Number: Patch 1264.00 Abstract: Security State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file access. |
Number: Patch 1266.00 Abstract: Security State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file or privilege management. |
Number: Patch 1270.00 Abstract: Fix for the hwmgr utility State: Supersedes Patches 230.00, 811.00, 1267.00, 1268.00 This patch makes the following changes to the hwmgr utility:
|
Number: Patch 1272.00 Abstract: Security State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file or privilege management. |
Number: Patch 1274.00 Abstract: Security State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file or privilege management. |
Number: Patch 1276.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U) State: Supersedes Patch 319.00 This patch fixes potential security vulnerabilities which, under certain circumstances, could compromise system integrity. These may be in the form of improper file access. |
Number: Patch 1278.00 Abstract: Fix for bcheckrc script State: New This patch clarifies a vague message that dn_setup would print if a system was brought to single-user mode because dsfmgr detected database errors during boot. |
Number: Patch 1281.00 Abstract: Corrects a problem with SNMP State: New (Supersedes Patch 1279.00) This patch:
|
Number: Patch 1287.00 Abstract: Security (SSRT2280) State: Supersedes Patches 561.00, 547.00, 813.00, 1284.00, 1285.00 This patch:
|
Number: Patch 1291.00 Abstract: Security (SSRT2280) State: Supersedes Patches 549.00, 815.00, 563.00, 1288.00, 1289.00 This patch:
|
Number: Patch 1293.00 Abstract: Security State: New This patch fixes a potential security vulnerability where under certain circumstances, system integrity may be compromised when a buffer overflow occurs in X11 applications. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. |
Number: Patch 1297.00 Abstract: Security State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file access. |
Number: Patch 1299.00 Abstract: Security State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file access. |
Number: Patch 1302.00 Abstract: Fix for fixdmn problems State: Supersedes Patches 177.00, 559.00, 818.00, 819.00, 820.00, 822.00, 1300.00 This patch makes the following changes to the fixfdmn utility:
|
Number: Patch 1305.00 Abstract: Security (SSRT0664U, SSRT0762U, SSRT0801) State: Supersedes Patches 204.00, 206.00, 567.00, 1303.00 This patch:
|
Number: Patch 1307.00 Abstract: Fixes a problem with the operation of osf_boot State: New This patch fixes a problem with the operation of osf_boot. |
Number: Patch 1309.00 Abstract: Security State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file or privilege management. |
Number: Patch 1311.00 Abstract: Security State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file or privilege management. |
Number: Patch 1313.00 Abstract: Security State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file or privilege management. |
Number: Patch 1315.00 Abstract: Security (SSRT2191) State: New This patch fixes a potential security vulnerability where under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the quot utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. |
Number: Patch 1317.00 Abstract: Security (SSRT2191) State: New This patch fixes a potential security vulnerability where under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the quot utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. |
Number: Patch 1319.00 Abstract: Security State: New This patch fixes a potential security vulnerability which, under certain circumstances, could compromise system integrity. This may be in the form of improper file or privilege management. |
Number: Patch 1328.00 Abstract: Security (SSRT0788U, SSRT0753U, SSRT0752U) State: Supersedes Patches 493.00,495.00, 725.00 This patch:
|
Number: Patch 1330.00 Abstract: Security (SSRT0788U, SSRT0753U, SSRT0752U) State: Supersedes Patches 496.00, 498.00, 727.00 This patch:
A potential security vulnerability has been discovered, where under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. HP has corrected this potential vulnerability. |
Number: Patch 1332.00 Abstract: Security State: New This patch fixes a potential security vulnerability where under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the dxsysinfo utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. |
Number: Patch 1334.00 Abstract: Security State: Supersedes Patches 193.00 and 1119.00 This patch:
|
Number: Patch 1336.00 Abstract: Security State: New (Supersedes Patches 1193.00 and 1195.00) This patch fixes several potential security vulnerabilities where under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the dxterm utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. |
Number: Patch 1346.00 Abstract: Security State: Supersedes Patches 67.00, 582.00, 574.00, 576.00, 703.00, 839.00, 1012.00, 1013.00, 1014.00, 1015.00, 1017.00, 1344.00 This patch:
|
Number: Patch 1348.00 Abstract: Security (SSRT2260, SSRT1-40U, SSRT1-41U, SSRT1-42U) State: Supersedes Patches 288.00, 507.00, 509.00, 1076.00, 1077.00, 1078.00, 1079.00, 1080.00, 1081.00, 1082.00, 1083.00, 1085.00 This patch:
|
Number: Patch 1350.00 Abstract: Security (SSRT2193) State: New (Supersedes Patches 1150.00, 1230.00) This patch fixes several potential security vulnerabilities where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 1352.00 Abstract: Support for Ultrium tape drive State: New (Supersedes Patches 1159.00, 1160.00, 1161.00, 1162.00, 1164.00) This patch:
|
Number: Patch 1357.00 Abstract: Security (SSRT0785U) State: Supersedes Patches 472.00, 473.00, 474.00, 475.00, 477.00, 721.00, 723.00, 1066.00, 1067.00, 1068.00, 1069.00, 1071.00 This patch:
|
Number: Patch 1359.00 Abstract: Corrects hang in the log command State: Existing This patch corrects a possible deadlock in the ./isl/log and ./usr/sbin/log commands. |
Number: Patch 1367.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U) State: Supersedes Patches 181.00, 486.00, 488.00, 191.00, 2.00, 121.00, 241.00, 243.00, 400.00, 401.00, 402.00, 403.00, 404.00, 405.00, 406.00, 407.00, 408.00, 409.00, 410.00, 412.00, 307.00, 302.00, 162.00, 253.00, 255.00, 90.00, 218.00, 303.00, 305.00, 421.00, 422.00, 423.00, 424.00, 426.00, 681.00, 682.00, 683.00, 684.00, 685.00, 686.00, 687.00, 689.00, 807.00, 511.00, 729.00, 541.00, 146.00, 148.00, 126.00, 127.00, 128.00, 129.00, 130.00, 131.00, 132.00, 134.00, 286.00, 6.00, 7.00, 8.00, 9.00, 10.00, 11.00, 12.00, 13.00, 14.00, 15.00, 16.00, 17.00, 18.00, 19.00, 20.00, 21.00, 22.00, 23.00, 24.00, 25.00, 26.00, 27.00, 28.00, 29.00, 30.00, 31.00, 32.00, 33.00, 34.00, 35.00, 36.00, 37.00, 38.00, 39.00, 40.00, 41.00, 42.00, 43.00, 44.00, 45.00, 46.00, 47.00, 48.00, 49.00, 50.00, 51.00, 52.00, 53.00, 54.00, 55.00, 56.00, 57.00, 58.00, 59.00, 60.00, 61.00, 102.00, 63.00, 104.00, 214.00, 236.00, 246.00, 247.00, 248.00, 250.00, 270.00, 271.00, 272.00, 273.00, 274.00, 275.00, 276.00, 277.00, 279.00, 296.00, 298.00, 321.00, 323.00, 325.00, 290.00, 152.00, 93.00, 95.00, 328.00, 329.00, 330.00, 331.00, 332.00, 333.00, 334.00, 335.00, 336.00, 337.00, 338.00, 339.00, 340.00, 341.00, 342.00, 343.00, 344.00, 345.00, 346.00, 347.00, 348.00, 349.00, 350.00, 351.00, 352.00, 353.00, 354.00, 355.00, 356.00, 357.00, 358.00, 359.00, 360.00, 361.00) 362.00, 363.00, 364.00, 365.00, 366.00, 367.00, 368.00, 369.00, 370.00, 371.00, 372.00, 373.00, 374.00, 375.00, 376.00, 377.00, 378.00, 379.00, 380.00, 381.00, 382.00, 383.00, 384.00, 385.00, 386.00, 387.00, 388.00, 389.00, 390.00, 391.00, 392.00, 393.00, 394.00, 395.00, 396.00, 397.00, 399.00, 543.00, 590.00, 592.00, 596.00, 203.00, 594.00, 597.00, 598.00, 599.00, 600.00, 601.00, 602.00, 603.00, 604.00, 605.00, 606.00, 607.00, 608.00, 609.00, 610.00, 611.00, 612.00, 613.00, 614.00, 615.00, 616.00, 617.00, 618.00, 619.00, 620.00, 621.00, 622.00, 623.00, 624.00, 625.00, 626.00, 627.00, 628.00, 629.00, 630.00, 631.00, 632.00, 633.00, 634.00, 635.00, 636.00, 637.00, 638.00, 639.00, 640.00, 641.00, 642.00, 643.00, 644.00, 645.00, 353 646.00, 647.00, 648.00, 649.00, 650.00, 651.00, 652.00, 653.00, 654.00, 655.00, 656.00, 657.00, 658.00, 659.00, 660.00, 661.00, 662.00, 663.00, 664.00, 665.00, 666.00, 667.00, 668.00, 669.00, 671.00, 672.00, 673.00, 674.00, 675.00, 676.00, 677.00, 678.00, 680.00, 834.00, 835.00, 837.00, 842.00, 846.00, 853.00, 854.00, 855.00, 856.00, 857.00, 858.00, 859.00, 860.00, 861.00, 862.00, 863.00, (864.00, 865.00, 866.00, 867.00, 868.00, 869.00, 870.00, 871.00, 872.00, 873.00, 874.00, 875.00, 876.00, 877.00, 878.00, 879.00, 880.00, 881.00, 882.00, 883.00, 884.00, 885.00, 886.00, 887.00, 888.00, 889.00, 890.00, 891.00, 892.00, 893.00, 894.00, 895.00, 896.00, 897.00, 898.00, 899.00, 900.00, 901.00, 902.00, 903.00, 904.00, 905.00, 906.00, 907.00, 908.00, 909.00, 910.00, 911.00, 912.00, 913.00, 914.00, (915.00, 916.00, 917.00, 918.00, 919.00, 920.00, 921.00, 922.00, 923.00, 924.00, 925.00, 926.00, 652 927.00, 928.00, 929.00, 930.00, 931.00, 932.00, 933.00, 934.00, 935.00, 936.00, 937.00, 938.00, 939.00, 940.00, 941.00, 942.00, 943.00, 944.00, 945.00, 946.00, 947.00, 948.00, 949.00, 950.00, 951.00, 952.00, 953.00, 954.00, 955.00, 956.00, 957.00, 958.00, 959.00, 960.00, 961.00, 962.00, 963.00, 964.00, 965.00, 966.00, 967.00, 968.00, 969.00, 970.00, 971.00, 972.00, 973.00, 974.00, 975.00, 976.00, 977.00, 978.00, 979.00, 980.00, 981.00, 982.00, 983.00, 984.00, 985.00, 986.00, 987.00, 988.00, 80.00, 418.00, 780.00, 782.00, 1215.00, 990.00, 1217.00, 1248.00, 1320.00, 1322.00, 1323.00, 1324.00, 1326.00, 1338.00, 1339.00, 1340.00, 1341.00, 1343.00, 1355.00, 1360.00, 1362.00, 1363.00, 1364.00, 1365.00 This patch:
|
Patch 1367.00 Continued
|
Patch 1367.00 Continued
|
Patch 1367.00 Continued
|
Patch 1367.00 Continued
|
Patch 1367.00 Continued
|
Patch 1367.00 Continued
|
Patch 1367.00 Continued
|
Patch 1367.00 Continued
|
Patch 1367.00 Continued
|
Patch 1367.00 Continued
|
Patch 1367.00 Continued
|
Patch 1367.00 Continued
|
Patch 1367.00 Continued
|
Patch 1367.00 Continued
|
Patch 1367.00 Continued
|
Patch 1367.00 Continued
|
Patch 1367.00 Continued
|
Patch 1367.00 Continued
|
Patch 1367.00 Continued
|
Patch 1367.00 Continued
|
Patch 1367.00 Continued
|
Number: Patch 1368.00 Abstract: Correct improper file or privilege management State: Supersedes Patches 181.00, 486.00, 488.00, 191.00, 2.00, 121.00, 241.00, 243.00, 400.00, 401.00, 402.00, 403.00, 404.00, 405.00, 406.00, 407.00, 408.00, 409.00, 410.00, 412.00, 307.00, 302.00, 162.00, 253.00, 255.00, 90.00, 218.00, 303.00, 305.00, 421.00, 422.00, 423.00, 424.00, 426.00, 681.00, 82.00, 683.00, 684.00, 685.00, 686.00, 687.00, 689.00, 807.00, 511.00, 729.00, 541.00, 146.00, 148.00, 126.00, 127.00, 128.00, 129.00, 130.00, 131.00, 132.00, 134.00, 286.00, 6.00, 7.00, 8.00, 9.00, 10.00, 11.00, 12.00, 13.00, 14.00, 15.00, 16.00, 17.00, 18.00, 19.00, 20.00, 21.00, 22.00, 23.00, 24.00, 25.00, 26.00, 27.00, 28.00, 29.00, 30.00, 31.00, 32.00, 33.00, 34.00, 35.00, 36.00, 37.00, 38.00, 39.00, 40.00, 41.00, 42.00, 43.00, 44.00, 45.00, 46.00, 47.00, 48.00, 49.00, 50.00, 51.00, 52.00, 53.00, 54.00, 55.00, 56.00, 57.00, 58.00, 59.00, 60.00, 61.00, 102.00, 63.00, 104.00, 214.00, 236.00, 246.00, 247.00, 248.00, 250.00, 270.00, 271.00, 272.00, 273.00, 274.00, 275.00, 276.00, 277.00, 279.00, 296.00, 298.00, 321.00, 323.00, 325.00, 290.00, 152.00, 93.00, 95.00, 328.00, 329.00, 330.00, 331.00, 332.00, 333.00, 334.00, 335.00, 336.00, 337.00, 338.00, 339.00, 340.00, 341.00, 342.00, 343.00, 344.00, 345.00, 346.00, 347.00, 348.00, 349.00, 350.00, 351.00, 352.00, (353.00, 354.00, 355.00, 356.00, 357.00, 358.00, 359.00, 360.00, 361.00, 362.00, 363.00, 364.00, 365.00, 366.00, 367.00, 368.00, 369.00, 370.00, 371.00, 372.00, 373.00, 374.00, 375.00, 376.00, 377.00, 378.00, 379.00, 380.00, 381.00, 382.00, 383.00, 384.00, 385.00, 386.00, 387.00, 388.00, 389.00, 390.00, 391.00, 392.00, 393.00, 394.00, 395.00, 396.00, 397.00, 399.00, 543.00, 590.00, 592.00, 596.00, 203.00, 594.00, 597.00, 598.00, 599.00, 600.00, 601.00, 602.00, 603.00, 604.00, 605.00, 606.00, 607.00, 608.00, 609.00, 610.00, 611.00, 612.00, 613.00, 614.00, 615.00, 616.00, 617.00, 618.00, 619.00, 620.00, 621.00, 622.00, 623.00, 624.00, 625.00, 626.00, 627.00, 628.00, 629.00, 630.00, 631.00, 632.00, 633.00, 634.00, 635.00, 636.00, 637.00, 638.00, 639.00, 640.00, 641.00, 642.00, 643.00, 644.00, 645.00, 646.00, 647.00, 648.00, 649.00, 650.00, 651.00, 652.00, 653.00, 654.00, 655.00, 656.00, 657.00, 658.00, 659.00, 660.00, 661.00, 662.00, 663.00, 664.00, 665.00, 666.00, 667.00, 668.00, 669.00, 671.00, 672.00, 673.00, 674.00, 675.00, 676.00, 677.00, 678.00, 680.00, 834.00, 835.00, 837.00, 842.00, 846.00, 853.00, 854.00, 855.00, 856.00, 857.00, 858.00, 859.00, 860.00, 861.00, 862.00, 863.00, 864.00, 865.00, 866.00, 867.00, 868.00, 869.00, 870.00, 871.00, 872.00, 873.00, 874.00, 875.00, 876.00, 877.00, 878.00, 879.00, 880.00, 881.00, 882.00, 883.00, 884.00, 885.00, 886.00, 887.00, 888.00, 889.00, 890.00, 891.00, 892.00, 893.00, 894.00, 895.00, 896.00, 897.00, 898.00, 899.00, 900.00, 901.00, 902.00, 903.00, 904.00, 905.00, 906.00, 907.00, 908.00, 909.00, 910.00, 911.00, 912.00, 913.00, 914.00, 915.00, 916.00, 917.00, 918.00, 919.00, 920.00, 921.00, 922.00, 923.00, 924.00, 925.00, 926.00, 927.00, 928.00, 929.00, 930.00, 931.00, 932.00, 933.00, 934.00, 935.00, 936.00, 937.00, 938.00, 939.00, 940.00, 941.00, 942.00, 943.00, 944.00, 945.00, 946.00, 947.00, 948.00, 949.00, 950.00, 951.00, 952.00, 953.00, 954.00, 955.00, 956.00, 957.00, 958.00, 959.00, 960.00, 961.00, 962.00, 963.00, 964.00, 965.00, 966.00, 967.00, 968.00, 969.00, 970.00, 971.00, 972.00, 973.00, 974.00, 975.00, 976.00, 977.00, 978.00, 979.00, 980.00, 981.00, 982.00, 983.00, 984.00, 985.00, 986.00, 987.00, 988.00, 80.00, 418.00, 780.00, 782.00, 1215.00, 990.00, 1217.00, 1248.00, 1320.00, 1322.00, 1323.00, 1324.00, 1326.00, 1338.00, 1339.00, 1340.00, 1341.00, 1343.00, 1355.00, 1360.00, 1362.00, 1363.00, 1364.00, 1365.00 This patch:
|
Patch 1368.00 Continued
|