PROBLEM: (91267) (PATCH ID: OSF520X11-016) ******** There are two Compound Text encodings for JISX0212 Japanese characters, JISX0212.1990-0:GL and JISX0212.1990-0:GR, and the X Window System have to support both of them. However, Tru64 UNIX V5.1A supports only JISX0212.1990-0:GR. As the result, JISX0212 Japanese characters may not be cut & pasted between applications of different systems in multi-version and multi-vendor environment. PROBLEM: (TEMIP-464) (PATCH ID: OSF520X11-015) ******** This patch fixes a problem in the X Toolkit library (Xt) which could cause the TeMIP Iconic_map Presentation Module application (mcc_iconic_map) to crash. PROBLEM: (IL_G03334) (PATCH ID: OSF520X11-025) ******** This patch fixes a problem where the definition of the X Toolkit function XtPending() was changed in Tru64 UNIX V5.1A which caused some applications built on earlier versions of Tru64 UNIX to fail. The X Toolkit specification has always specified that XtPending() returns Boolean, however, the sample implementation and the man page from X.Org up through X11R6.3 had it returning XtInputMask. In X11R6.4, X.Org changed the sample implementation to match the specification and that change was included in Tru64 UNIX V5.1A. Subsequently, that change was found to cause problems for the ERDAS Imagine application. This patch changes the definition of XtPending() back to returning XtInputMask. Note that XtPending() has been deprecated in favor of XtAppPending() since at least X11R4. Applications should be using XtAppPending() instead of XtPending(). PROBLEM: (88863, 93763) (PATCH ID: OSF520X11-028) ******** Input Method severs, like VJE Delta, can not connect to it's clients. They try to connect X Window application programs (ex; dtterm) using X11 R6 XIM protocol, but fails. This problem prevents usres from entering non English strings (ex; Japanese) to their X Window applications. PROBLEM: (94290, SSRT2280) (PATCH ID: OSF520X11-035) ******** A potential security vulnerability has been discovered, where under certain circumstances, system integrity may be compromised when a buffer overflow occurs in X11 applications. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability. PROBLEM: (94738, SSRT2280) (PATCH ID: OSF520X11-036) ******** A potential security vulnerability has been discovered, where under certain circumstances, system integrity may be compromised when a buffer overflow occurs in X11 applications. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. HP has corrected this potential vulnerability.