PROBLEM: (89370) (PATCH ID: OSF520DX-003) ******** When Compaq Analyze detects multiple errors on a device, such as a CPU it ostes an event "indicting" that object. When this happens Auto-deallocation software will be activated to attempt to remove the failing device. At the same time the SysMan Station will also recieve the indictment and indicate the device in a troubles state. The Auto-deallocation software will first check its configuration file to see if it is authorized to deallocate the device. If it is not it will post an event. The SysMan Station will recieve this event and misinterpret it and reset the object to the New state. This will cause any SysMan Station clients to display the object incorrectly in the Normal or OK state. PROBLEM: (90172) (PATCH ID: OSF520DX-007) ******** In a TruCluster, Sysman Station daemon uses the Distributed Lock Manager (DLM) to coordinate certain data collection functions across the cluster. This patch fixes possible deadlock conditions that might occur during failovers or during cluster boot. PROBLEM: (90026, 88161) (PATCH ID: OSF520DX-006) ******** Enablers for Huron Packaged Database Solution PROBLEM: (90145) (PATCH ID: OSF520DX-009) ******** Only one node in a cluster will show properties for objects in the Physical Files System view of the SysMan Station. All of the other nodes will show no properties for these objects. PROBLEM: (90026) (PATCH ID: OSF520DX-008) ******** Enablers for Huron Packaged Database Solution PROBLEM: (91205) (PATCH ID: OSF520DX-015) ******** SysMan Station can not launch commands that require object attributes as parameters. This means that when a command is requested an "wrong number of arguments" error will apear or a command that normally would be focused on an object will be launched without focus PROBLEM: (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U, SSRT1-48U) (PATCH ID: OSF520DX-024) ******** A potential security vulnerability has been discovered, where under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Compaq has corrected this potential vulnerability. PROBLEM: (92197) (PATCH ID: OSF520DX-026) ******** PROBLEM: When an already configured interface card is re-configured with a new IP address, the old IP address is made the IP alias. So, the NIC has 2 IP addresses. This patch fixes the problem, by first deconfiguring the interface card , deleting the old address and then reconfiguring it with a new IP address. Commands : "ifconfig -a" and "netstat -i" can be used to verify that the NIC has only the new IP address. PROBLEM: (93327) (PATCH ID: OSF520DX-029) ******** Some older, legacy applications were not displaying the appropriate pop-up message because of a change to the way error messages are retrieved. This patch fixes the message catalogs so that the proper message is displayed at the appropriate time. PROBLEM: (88400) (PATCH ID: OSF520DX-035) ******** A potential security vulnerability has been discovered, where under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Compaq has corrected this potential vulnerability. PROBLEM: (88383) (PATCH ID: OSF520DX-044) ******** A potential security vulnerability has been discovered, where under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Compaq has corrected this potential vulnerability. PROBLEM: (88344, 88399, 94672, 88333, SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U, SSRT1-48U) (PATCH ID: OSF520DX-060) ******** A potential security vulnerability has been discovered, where under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability. PROBLEM: (91074,) (PATCH ID: OSF520DX-031) ******** A potential security vulnerability has been discovered, where under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Compaq has corrected this potential vulnerability. PROBLEM: (90473) (PATCH ID: OSF520DX-040) ******** Gigabit interconnects were being displayed in the netconfig suitlet. If a user accidentally changes the IP from 10.0.0.x to anything else, the cluster communication over the interconnect may be broken. PROBLEM: (93345, SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U SSRT1-48U) (PATCH ID: OSF520DX-043) ******** A potential security vulnerability has been discovered, where under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Compaq has corrected this potential vulnerability. PROBLEM: (88393) (PATCH ID: OSF520DX-062) ******** The portion of Quick Setup that configures the system as an NIS client creates temporary files that get modified and then copied to their permanent locations. The code did not previously check if the temp files where successfully created. This fix checks for success, and reports an error on failure then exits. PROBLEM: (88394, SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U SSRT1-48U ) (PATCH ID: OSF520DX-041) ******** A potential security vulnerability has been discovered, where under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Compaq has corrected this potential vulnerability. PROBLEM: (88393) (PATCH ID: OSF520DX-059) ******** The portion of Quick Setup that configures the system as an NIS client creates temporary files that get modified and then copied to their permanent locations. The code did not previously check if the temp files where successfully created. This fix checks for success, and reports an error on failure then exits. PROBLEM: (88346) (PATCH ID: OSF520DX-034) ******** A potential security vulnerability has been discovered, where under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Compaq has corrected this potential vulnerability. PROBLEM: (88347) (PATCH ID: OSF520DX-063) ******** A potential security vulnerability has been discovered, where under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. HP has corrected this potential vulnerability.