This chapter provides information about the patches included in Patch Kit 2 for the base operating system. It also includes any general information about working with these patches.
This chapter is organized as follows:
Section 1.1 provides release notes that are specific to the Tru64 UNIX patches in this kit, as well as release notes that are of general interest.
Section 1.2 provides brief descriptions of the Tru64 UNIX patches included in this kit.
This section provides release notes that are specific to the Tru64 UNIX
patches in this kit, as well as release notes that are of general interest.
1.1.1 Required Storage Space
Approximately 250 MB of temporary storage space is required to untar
the base and TruCluster components of this patch kit.
We recommend that this
kit not be placed in the
/
,
/usr
, or
/var
file systems because doing so may unduly constrain the available
storage space for the patching activity.
The following permanent storage space is required to install the base component of this patch kit:
Approximately 76.9 MB of storage space in
/var/adm/patch/backup
may be required for archived original files if you choose to install
and revert all patches.
See the
Patch Kit Installation Instructions
for more information.
Approximately 78.2 MB of storage space in
/var/adm/patch
may be required for original files if you choose to install and
revert all patches.
See the
Patch Kit Installation Instructions
for more information.
Approximately 1142 KB of storage space is required in
/var/adm/patch/doc
for patch abstract and README documentation.
Approximately 78247 KB of storage space is needed in
/usr/sbin/dupatch
for the patch management utility.
See
Section 2.1.1
for information on space needed
for the TruCluster Server patches.
1.1.2 Problems Uninstalling the Patch Kit
If you made the following changes to your system after installing the patch kit, you will have to undo those changes before you can uninstall the patch kit:
If you changed your hardware configuration (for example, by adding a new disk), the system configuration that existed prior to installing the patch kit might not recognize the new devices or may not provide the necessary support for them.
If you added new cluster members, the new members will not have an older state to revert to if you attempt to uninstall the patch kit.
To uninstall the patch kit, do the following:
Remove all new hardware and new cluster members that you added after installing the patch kit.
Run
dupatch
to uninstall the patch kit.
Verify that the patch kit was successfully uninstalled.
You can now add the cluster members you removed and reinstall the hardware
you removed, as long as the support for it existed in the pre-patched system.
You can also reinstall the patch kit.
1.1.3 Required Action for Removing Patch 16.00
If you delete Patch 16.00, you must run the
/etc/dn_fix_dat.sh
script prior to rebooting your system.
If you are removing the
patch from a cluster, you must run the script on each cluster member before
you reboot the member.
See
Section 2.1.3
for more information.
1.1.4 ES47/ES80/GS1280 Time Loss
The ES47, ES80, and GS1280 AlphaServers may experience a time loss as a result of console callbacks for environmental information if the server's firmware is lower than V6.4-12.
Updating your firmware to V6.4-12 or higher will keep the problem from occurring or correct the problem if it has occurred.
If your firmware is lower than V6.4-12, the problem is experienced if one or both of the following conditions exists:
The system manager uses the following
hwmgr
utility commands:
#hwmgr
-view devices #hwmgr
-view hierarchy
The Environmental Monitoring daemon,
envmond
,
is running.
Workarounds to the problem are as follows:
Do not use the
hwmgr
-view
commands
Modify either one of the following files:
/etc/rc.config
Turn off environmental monitoring by changing the entry
ENVMON_CONFIGURED=1
to ENVMON_CONFIGURED=0
You can also use the
envconfig
utility to modify
the
/etc/rc.config
file.
See
envconfig
(8)
/etc/sysconfigtab
Go to the end of the file and add the following line and add the following line:
marvel_srvmgmt: MV_Env_Support = 0
You must remove this setting after you install firmware V6.4-11 or higher.
You must reboot your system for these settings to take effect.
1.1.5 Enabling envmond on AlphaServer ES47/ES80/GS1280 systems (Patch 452)
After installing Patch 452, the
envmond
daemon will
be disabled on ES47, ES80, and GS1280 AlphaServers..
To enable environmental monitoring, change the entry
ENVMON_CONFIGURED=0
to ENVMON_CONFIGURED=1
in the
/etc/rc.config
file.
You can do this using one of the following commands:
/usr/sbin/envconfig -c ENVMON_CONFIGURED=1
/usr/sbin/rcmgr set ENVMON_CONFIGURED 1
If your server's firmware is lower than V6.4-12, see
Section 1.1.4
before enabling environmental monitoring.
1.1.6 New Security Feature (Patch 872.00)
Patch 872.00 provides a new security feature to prevent the execution of instructions that reside in heap or other data areas of process memory. The result is additional protection against buffer overflow exploits. This feature is similar in concept to Tru64 UNIX executable stack protection.
The new feature is implemented as a dynamic sysconfig tunable,
executable_data
, in the proc subsystem.
The supported settings allow
system administrators to cause requests from privileged processes for writable
and executable memory to fail, or to be treated as a request for writable
memory, and to optionally generate a message when such a request occurs.
In a buffer overflow exploitation, an attacker feeds a privileged program an unexpectedly large volume of carefully constructed data through inputs such as command line arguments and environment variables. If the program is not coded defensively, the attacker can overwrite areas of memory adjacent to the buffer.
Depending upon the location of the buffer (stack, heap, data area), the attacker can deceive these programs into executing malicious code that takes advantage of the program's privileges or alter a security-sensitive program variable to redirect program flow.
With some expertise, such an attack can be used to gain root access to the system.
Enabling the
executable_data
tunable changes a potential
system compromise into, at worst, a denial-of-service attack.
A vulnerable
program may still contain a buffer overflow, but an exploit that writes an
instruction stream into the buffer and attempts to transfer control to those
instructions will fail, because memory protection will prohibit instruction
execution from that area of memory.
Many applications never execute from the memory even though they unnecessarily
request write-execute memory directly or as a result of an underlying function
acting on their behalf.
By substituting writable memory for the requested
write-execute memory, the
executable_data
tunable allows
such applications to benefit from the additional protection without requiring
application modification.
See
sys_attrs_proc
(5)
Before enabling
executable_data
(changing it from
the default value of 0), you must run the
/usr/sbin/javaexecutedata
script.
Otherwise, privileged java applications will fail in unpredictable
ways.
See
javaexecutedata
(8)
Note
The Java language interprets bytecode at runtime. Unless marked as exempt, privileged applications written in Java will receive an error when they attempt to execute instructions residing in the unexecutable memory. The manner in which these errors are handled is application-specific and thus unpredictable. This is why you must run the
/usr/sbin/javaexecutedata
before you enableexecutable_data
.
The following example demonstrates the failing behavior to expect for
a privileged processes if
execute_data
is set to 53 but
runs the
/usr/sbin/javaexecutedata
script.
Other Java applications
run with privilege may exhibit different (but still failing) behavior.
# java -classic -jar SwingSet2.jar Process 1185 Invalid write/execute mmap call denied. Process 1185 Invalid write/execute mmap call denied. Process 1185 Invalid write/execute mmap call denied. (...) Process 1185 Invalid write/execute mmap call denied. Process 1185 Invalid write/execute mmap call denied. **Out of memory, exiting**
The following example demonstrates the failing behavior to expect for
a privileged processes if
execute_data
is set to 37 but
runs the
/usr/sbin/javaexecutedata
script.
Other java
applications run with privilege may exhibit different (but still failing)
behavior.
# java -classic -jar SwingSet2.jar Process 1185 Invalid write/execute mmap call modified. Process 1185 Invalid write/execute mmap call modified. (...) Process 1185 Invalid write/execute mmap call modified. Process 1185 Invalid write/execute mmap call modified. Process 1185 Invalid write/execute mmap call modified. SIGSEGV 11* segmentation violation (...) Abort (core dumped)
Certain privileged Pascal programs may also fail when
executable_data
is enabled.
Such programs should also be marked as exempt, using
the new
chatr
utility, included in Patch 872.00 and described
as follows:
$chatr +ed enable priv_pascal_executable current values: 64-bit COFF executable execute from data: disabled new values: 64-bit COFF executable execute from data: enabled
See
chatr
(1)1.1.7 Possible Problem when Processing Many Command Parameters
When running commands or scripts that must process a large amount of
command parameters, your system may hang or you may see an error similar
to this:
/sbin/ls: arg list too long
.
If this occurs, try rerunning the command or script after entering the following command to relax the command-line limits:
# sysconfig -r proc exec_disable_arg_limit=1
This kernel setting should not be used as a default.
It
should only be enabled when encountering a problem where the
exec()
argument size limit has been approached.
1.1.8 Loading Firmware from a BOOTP Server
The
fwupgrade
command has been modified in Patch
Kit 2 to allow the specified firmware update image to be loaded from a
BOOTP
server in a connected network.
This process must use the
bootpd
daemon.
The subset where the
bootpd
ships
is optional, so OSFOBSOLETE540 must be installed.
Create a symbolic link from the shipping location of
bootpd
to the expected location:
# ln -s /usr/opt/obsolete/usr/sbin/bootpd /usr/sbin/bootp
You must manually create the
bootptab
file on the
server.
The following is an example of how to set up the
bootptab
file on the server for this procedure:
# Example bootptab file for BOOTP support .default1:\ :hd=/install/firmware:\ :sm=255.255.255.0\ :gw=16.69.255.1: # tab:tc=.default1:ht=ethernet:ha=08002b86f234:ip=16.69.222.42: bobafett:tc=.default1:ht=ethernet:ha=0008c73a5a47:ip=16.69.222.48: #
In this example, the directory
/install/firmware
was created on the
bootp
server.
This directory must contain
the firmware of the systems to be updated.
The file names must match the
entry on the
fwupgrade
command line.
The firmware files
must have read permissions, that is, 444.
You must edit the
inetd.conf
file so that the file
name passed by
fwupgrade
is found by the console firmware.
Edit the line
/etc/inetd.conf
file on the
bootp
server to look like following:
tftp dgram udp wait root /usr/sbin/tftpd tftp -r /install/firmware
Enable
bootpd
to start by removing the comment symbol
(#) from the beginning of the line in the
/etc/inetd.conf
file;
bootps dgram udp wait root /usr/sbin/bootpd bootpd
See the
fwupgrade
(8)bootptab
(4)bootpd
(8)1.1.9 Enhancements to pmgrd Daemon and collect Utility (Patches 779.00 and 781.00)
The installation of Patch 779.00 and Patch 781.00 provides enhancements
to the performance manager metrics server daemon,
pmgrd
,
and the
collect
utility.
1.1.9.1 Performance Manager Metrics Server Daemon (pmgrd)
The following features have been added to
pmgrd
:
Support for monitoring the disk I/O rates.
Enables
pmgrd
to provide details on disk I/O rates,
such as the average number of bytes transferred per second and the average
number of transfers completed per second over the past 1 minute, 5 minutes,
30 minutes, and 60 minutes.
Support for monitoring the AdvFS statistics.
Enables
pmgrd
to provide the following types of details
on AdvFS file systems:
The domain name
The fileset name
Number of files and blocks
Soft and hard limits of files
Soft and hard limits of blocks
The status of user and group quotas
Grace time and fileset clone information
It can also provide AdvFS volume details such as available blocks, percentage
of volume used, I/O consolidation mode, and the number of read/write blocks.
The new MIB file
pmAdvfs.mib
has been added to provide
these statistics.
The
collect
utility displays these new AdvFS statistics.
(See
Section 1.1.9.2).
As a result of the improvements made to
pmgrd
, we
recommend that you use the SysMan Menu to manage AdvFS file systems rather
than the
dtadvfs
graphical user interface and the
advfsd
daemon.
To use SysMan Menu, select Storage ->
File System
Management Utilities ->
Advanced File System (AdvFS) Utilities.
You can also
enter the following command:
# sysman advfs
See
pmgrd
(8)pmgrd
(8)1.1.9.2 collect Utility
The following features have been added to the
collect
utility, which is updated from Version 2.0.0 to 2.0.5:
AdvFS monitoring capability. (See Section 1.1.9 for a list of AdvFS metrics that are monitored.)
Enables
collect
to report AdvFS volume I/O queue
and fileset vnode operation statistics.
You can specify the domain or fileset
to be monitored, using the
-A
option.
Viewing CPU and memory metrics on a per Resource Affinity Domain (RAD) basis.
When run on a NUMA platform, enables
collect
to automatically
retrieve CPU and memory metrics for each RAD.
See
collect
(8)pmgrd
(8)1.1.10 File System Management Applications Enhanced (Patch 825.00)
Patch 825.00 enhances SysMan Menu file system management applications
to significantly improve their performance.
1.1.11 Changes to tar, pax, and cpio Behavior (Patch 643.00)
When extracting or listing an archive using the
tar
,
pax
, or
cpio
commands, specifying a slash (/)
at the end of argument will cause the command to act upon the directory and
not the contents in the directory.
For example:
# tar xvf filename.tar dir1/
When creating an archive with these commands, specifying multiple slashes will result in the placement of one slash for any directory entry in the archive header. Previously, specifying multiple slashes would put these slashes in the archive header. For example:
# tar cvf filename.tar dir1//////////
Specifying a single slash when creating the archive will cause
tar
,
pax
, or
cpio
to pick
up all of the directory's contents.
For example:
# tar cvf filename.tar dir1/
1.1.12 Changes to vdump and vrestore Allow Larger Record Sizes (Patch 685.00)
The
vdump
and
vrestore
programs
have been tuned to work with higher record sizes up to 2048 KB.
This provides
a performance gain when doing backups of AdvFS domains, because the program
will make larger tape records for the save sets.
Currently the maximum for the -b option is 64 1024-byte blocks. With this patch, the byte-block size is changed to 2048. By default, the -b option of 60 blocks per record remains unchanged..
The
vrestore
program still has the capability to
autosize
vdump
archives.
1.1.13 Problem Seen on Systems with Smart Array Controller
This section describes the steps you should take if your system is configured with a Smart Array controller and you see the following event logged:
Host name: unx104 SCSI CAM ERROR PACKET SCSI device class: CISS (Smart Array) Bus Number: 6 Target Number: 4 Lon Number: 0 ... ... Event Information: Command timed out...resetting controller
If this occurs, take the following steps:
Create a file named
ciss.temp
with the
following lines:
ciss:
ciss_throttle_threshold=5
Execute the following command:
#sysconfigdb -m -f
ciss.temp
Reboot your system:
# shutdown -r now
1.1.14 Broken Links Reported During Baselining
When performing a baseline analysis with the
dupatch
utility, you will encounter the following message during Phase 4:
Phase 4 - Report changed system files and missing files ======================================================= This phase provides information to help you make choices later in this process. It reports both 'missing' and files whose origin cannot be determined. Some of these files may affect patch installation. You will want to consider this information when you later make decisions in phase 5. * list of changed files with unknown origin: ------------------------------------------ ./etc/lprsetup.dat OSFPRINT540 UNKNOWN ./usr/share/doclib/annex/man/man3/Thread.3 OSFTCLBASE540 UNKNOWN BROKEN HARDLINK TO ./usr/share/doclib/annex/man/man3/Tcl_ConditionNotify.3 ./usr/share/doclib/annex/man/man3/Tcl_ConditionNotify.3 OSFTCLBASE540 UNKNOWN BROKEN HARDLINK TO ./usr/share/doclib/annex/man/man3/Thread.3 Press RETURN to proceed...
You can disregard this information.
The presence of these broken links
will not affect your system operation, the installation of
dupatch
or
dupatch
tools, the successful installation
of patches, or the rebuilding of kernels on the system.
1.1.15 Russian Keyboard (Patch 339.00)
The new Russian 3R-LKQ48-BT keyboard, for which Patch 339.00 provides
an updated keyboard map, comes with five extra keycaps.
To enable any of those
extra keycaps, you will need to modify the file
/usr/lib/X11/xkb/symbols/digital/russian
.
For example:
// KEY <AD09> can be replaced by an extra keycap. // If you replace it with the extra keycap, please uncomment // the following definition and comment out the original one. // // key <AD09> { // symbols[Group1]=3D [ o, O ], // symbols[Group2]=3D [ Ukrainian_i, Ukrainian_I ] // }; key <AD09> { symbols[Group1]=3D [ o, O ], symbols[Group2]=3D [ Cyrillic_shcha, Cyrillic_SHCHA ] };
1.1.16 Panics May Occur on Multi-CPU Systems
Boot-time panics may occur on multi-CPU systems if all of the following conditions exist:
Auditing is enabled.
Audit's -m switch is configured to establish a dump interval.
The system contains empty CPU slots.
The panic will occur on the first reboot after audit is configured or following an update installation on a system with audit already configured with a dump interval. The system will be unable to reboot in this configuration.
To work around this problem, boot to single-user mode and remove the
-m
option from the audit configuration stored in
/etc/rc.config.common
or
/etc/rc.config
.
The problem will be fixed in the next patch kit.
1.1.17 General and Problem Information for AlphaServer ES47, ES80, and GS1280 Systems
The following information pertains to the new AlphaServer ES47, ES80,
and GS1280 systems, which require Tru64 UNIX Version 5.1B and this patch
kit to be installed.
1.1.17.1 CPU Offline Restrictions
The Primary CPU cannot be taken off line.
CPUs that have I/O hoses attached to them can only be taken off line
if another CPU without I/O attached is present in the system .
A failure to
adhere to this restriction will cause the
psradm
command
to return an error.
In a two-CPU configuration, the AlphaServer ES47 and ES80 do not allow
any CPUs to be taken off line.
1.1.17.2 Problem with Capacity-on-Demand Process
A problem has been discovered with the capacity on demand process in which a CPU can be designated as spare, but is not taken off line as expected.
With the capacity-on-demand process, the
codconfig
[cpu_id_list]
command lets you specify which CPUs
you have paid for and which are spares.
The command is supposed to mark the
others as spare and then take them off line.
Once a CPU is marked as spare,
the
hwmgr
command and Manage CPUs suitlet will not let
you put them on line until you use the
ccod
-l
or
ccod
-p
command to either loan or purchase
the CPU.
The workaround is to use the
codconfig
[cpu_id_list]
command to mark the CPUs as spare, and then use either
the
hwmgr
command or the Manage CPUs SUITLET to take them
off line (sometimes referred to as offlining them).
In the following example,
N
is the CPU number.
# hwmgr -offline -name cpuN
If, for example, the
codconfig
command returns the
message "Error for CPU 2: Unable to offline this CPU," you would enter the
following
hwmgr
command:
# hwmgr -offline -name cpu2
For more information, see
codconfig
(8)hwmgr
(8)
The Manage CPUs SUITLET is available from the SysMan Menu and SysMan
Station.
1.1.17.3 Hardware SCSI Bus Errors
SCSI CAM errors experienced by the Adaptec controller that require SCSI
bus resets could cause PCI bus faults.
These faults will be seen as a "Machine
Check System Uncorrectable" panic.
This will require the system to be
booted after the machine_check.
A fix for this problem will be included
in a future release.
1.1.17.4 Repeated Reboots May Cause Panic
Repeated reboots of the system may cause a kernel memory fault panic,
but does not result in the loss of data.
A reboot after the panic should be
successful.
A fix for this problem will be included in a future release.
1.1.18 Caution on Updating to Version 5.1B with DEGXA NICs
Do not attempt to do a update installation or rolling upgrade from Version 5.1A to Version 5.1B when the network device is a DEGXA-TA or DEGXA-SA and you have the Version 5.1A Patch Kit 4 and the New Hardware Devices V6 (NHD6) Kit installed.
The NHD6 kit and Patch Kit 4 have provided fixes that are not in the
base operating system release for Version 5.1B.
Once the update is completed
using another network device and the Version 5.1B Patch Kit 1 has been applied,
the DEGXA network interface cards (NICs) can again be used for the network
connection.
1.1.19 Tuning the NFS Server Duplicate Request Cache (Patch 838.00)
The NFS server maintains a list of recently completed nonrepeatable requests. This list is used to reply to client retransmissions of the request in the event that the initial request transmission's reply was lost or that the server took too long to satisfy the request.
Problems may occur with the duplicate request cache in some cases, under
heavy NFS server load and over high aggregate network bandwidth involving
changes to file systems (changes caused by the use of the
creat,
link, unlink, mkdir, rmdir, truncate, utimes,
and
write
commands).
These problems can occur if all the elements in the
duplicate request cache are cycled between an initial client transmission
and subsequent retransmission.
If this occurs, the NFS server cannot detect
that the retransmission is in fact a retransmission.
This may result in the
repetition of a request and may cause out-of-order writes or truncation and
subsequent retruncation of a file.
Patch 838.00 provides a tuning variable to control the size of the NFS server's duplicate request cache:
nfs_dupcache_size
Controls the
absolute size of the NFS server duplicate request cache.
This is measured
in the number of elements that are allocated at NFS server initialization.
If it is determined that the size of the duplicate cache needs to be
modified, you should change
nfs_dupcache_size
.
The new
value for
nfs_dupcache_size
should be set to equal two
times the value of
nfs_dupcache_entries
.
You must use the
dbx
command to modify
nfs_dupcache_size
.
There is no sysconfig interface to this tuning
variable.
1.2 Summary of Base Operating System Patches
This section provides descriptions of the patches in Patch Kit 2 for the Tru64 UNIX operating system. Because Tru64 UNIX patch kits are cumulative, each patch lists its state according to the following criteria:
New
Indicates a patch that is new for this release.
New (Supersedes Patches ...)
Indicates a patch that is new to the kit but was combined (merged) with one or more patches during the creation of earlier versions of this kit, before it was publicly released.
Existing (Kit 1)
Indicates a patch that was new in the previous Version 5.1B patch kit.
Supersedes Patches ...
Indicates a patch that was combined (merged) with other patches.
Number: Patch 2.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 6.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 8.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 10.00 Abstract: Correct potential buffer overflow State: Existing (Kit 1)
|
Number: Patch 12.00 Abstract: Correct potential buffer overflow State: Existing (Kit 1)
|
Number: Patch 16.00 Abstract: Fix for the dsfmgr utility State: Existing (Kit 1)
|
Number: Patch 33.00 Abstract: Correct potential buffer overflow State: Supersedes Patch 31.00
|
Number: Patch 36.00 Abstract: Correct potential buffer overflow State: Supersedes Patch 34.00
|
Number: Patch 38.00 Abstract: Adds new functionality to tcpdump State: Existing (Kit 1)
|
Number: Patch 58.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U) State: Existing (Kit 1)
|
Number: Patch 60.00 Abstract: Update to siacfg utility State: Existing (Kit 1)
|
Number: Patch 62.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 84.00 Abstract: Security (SSRT2208) State: Existing (Kit 1)
|
Number: Patch 86.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U) State: Existing (Kit 1)
|
Number: Patch 89.00 Abstract: Fix defects in AutoFS user space and kernel code State: Supersedes Patch 87.00
|
Number: Patch 91.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 135.00 Abstract: Correct potential buffer overflow State: Existing (Kit 1)
|
Number: Patch 137.00 Abstract: Fix for startslip program State: Existing (Kit 1)
|
Number: Patch 139.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 157.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 159.00 Abstract: Fix hwmgr command to show path state correctly State: Existing (Kit 1)
|
Number: Patch 167.00 Abstract: Security (SSRT2368, SSRT2368) State: Existing (Kit 1)
|
Number: Patch 169.00 Abstract: Fix for SDLT media error State: Existing (Kit 1)
|
Number: Patch 171.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 173.00 Abstract: Fix race condition and improper file access State: Existing (Kit 1)
|
Number: Patch 176.00 Abstract: Resolve kernel memory faults in TCP/IP subsystem State: Supersedes Patch 174.00
|
Number: Patch 178.00 Abstract: Fix for lpd line printer daemon State: Existing (Kit 1)
|
Number: Patch 185.00 Abstract: Prevents addvol from adding invalid disks into domain State: Existing (Kit 1)
|
Number: Patch 187.00 Abstract: Fix for invalid disks being added into domain State: Existing (Kit 1)
|
Number: Patch 191.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 193.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 197.00 Abstract: Read privileges being stripped from passwd file State: Existing (Kit 1)
|
Number: Patch 199.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 201.00 Abstract: Fix for verify utility State: Existing (Kit 1)
|
Number: Patch 203.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 205.00 Abstract: Fixes a correctable error reporting problem State: Existing (Kit 1)
|
Number: Patch 207.00 Abstract: Correct potential buffer overflow State: Existing (Kit 1)
|
Number: Patch 209.00 Abstract: Correct potential buffer overflow State: Existing (Kit 1)
|
Number: Patch 219.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 221.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 223.00 Abstract: Add SCSI reserve/release support to mt State: Existing (Kit 1)
|
Number: Patch 225.00 Abstract: Interop problem between curses.h and esnmp.h. State: Existing (Kit 1)
|
Number: Patch 229.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 232.00 Abstract: Correct improper file access State: Supersedes Patch 230.00
|
Number: Patch 234.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 238.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 240.00 Abstract: Fix for hwmgr command State: Existing (Kit 1)
|
Number: Patch 248.00 Abstract: Fix for hwmgr delete command option State: Existing (Kit 1)
|
Number: Patch 250.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 254.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 262.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 264.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 266.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 268.00 Abstract: Installs version V2.1-120 of libots3 libraries State: Existing (Kit 1)
|
Number: Patch 270.00 Abstract: Installs version V2.1-120 of libots3 libraries State: Existing (Kit 1)
|
Number: Patch 272.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 275.00 Abstract: Fix for hwmgr -view transaction -cluster command State: Supersedes Patch 273.00
|
Number: Patch 279.00 Abstract: Corrections to Oxygen VX1 graphics card XCopyPlane State: Existing (Kit 1)
|
Number: Patch 281.00 Abstract: Fixes a problem in usb_hid.mod State: Existing (Kit 1)
|
Number: Patch 283.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 285.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 289.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 296.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 298.00 Abstract: Fixes consvar -s bootdef_dev failure with KZPCC State: Existing (Kit 1)
|
Number: Patch 300.00 Abstract: Login process crashes when LDAP users try to log in State: Existing (Kit 1)
|
Number: Patch 306.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 309.00 Abstract: Performance tool failures on Sierra Cluster (PFS) State: Supersedes Patch 307.00
|
Number: Patch 311.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 313.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 317.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U) State: Existing (Kit 1)
|
Number: Patch 320.00 Abstract: Fixes problem with IPv6 neighbor discovery daemon State: Supersedes Patch 318.00
|
Number: Patch 322.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 324.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 326.00 Abstract: Fixes a linker error State: Existing (Kit 1)
|
Number: Patch 328.00 Abstract: Fixes and improves the mcutil program State: Existing (Kit 1)
|
Number: Patch 330.00 Abstract: Allows evmd to stop listening on default TCP port 619 State: Existing (Kit 1)
|
Number: Patch 332.00 Abstract: Fixes memory leak in the PanoramiX/Xinerama Extension State: Existing (Kit 1)
|
Number: Patch 334.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 339.00 Abstract: Updated keyboard map for Russian 3R-LKQ48-BT State: Existing (Kit 1)
|
Number: Patch 343.00 Abstract: Fixes problem seen with TAHI IPv6 conformance test State: Existing (Kit 1)
|
Number: Patch 345.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 347.00 Abstract: Fix allows fuser to display the reference flag State: Existing (Kit 1)
|
Number: Patch 351.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 356.00 Abstract: Fix for ftp open command State: Supersedes Patch 354.00
|
Number: Patch 358.00 Abstract: Fix for mountd daemon State: Existing (Kit 1)
|
Number: Patch 360.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 362.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 364.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 366.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 368.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 370.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 372.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U) State: Existing (Kit 1)
|
Number: Patch 378.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U) State: Existing (Kit 1)
|
Number: Patch 380.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 382.00 Abstract: Fixes a simple lock panic in the floppy driver State: Existing (Kit 1)
|
Number: Patch 384.00 Abstract: Fix for telnetd daemon State: Existing (Kit 1) Fixes a problem in which telnetting from some machines (MS), will leave a UDP port open, requiring a call to yp_unbind() after getnameinfo() to close all ports. |
Number: Patch 387.00 Abstract: Correct improper file access State: Existing (Kit 1)
|
Number: Patch 391.00 Abstract: Updates reference pages for VLAN functionality State: Existing (Kit 1)
|
Number: Patch 396.00 Abstract: Fix for ldapcd daemon State: Supersedes Patch 56.00
|
Number: Patch 414.00 Abstract: Revises several SSH reference pages State: Existing (Kit 1)
|
Number: Patch 416.00 Abstract: Fix for creacct hang State: Existing (Kit 1)
|
Number: Patch 421.00 Abstract: Revises envconfig.8 and envmond.8 reference pages State: Existing (Kit 1)
|
Number: Patch 423.00 Abstract: Fix potential denial of service State: Existing (Kit 1)
|
Number: Patch 433.00 Abstract: Fix race condition and improper file access State: Supersedes Patch 236.00
|
Number: Patch 442.00 Abstract: Incorrect I/O status may be returned by KZPEA driver State: Supersedes Patch 315.00
|
Number: Patch 444.00 Abstract: Revises tcpdump.8 ref page for VLAN functionality State: Existing (Kit 1)
|
Number: Patch 446.00 Abstract: Revises the mt.1 reference page State: Existing (Kit 1)
|
Number: Patch 448.00 Abstract: Allows multiple VX1 graphic cards to be configured State: Supersedes Patch 353.00
|
Number: Patch 452.00 Abstract: Modifications for environmental monitoring facilities State: Supersedes Patch 40.00
|
Number: Patch 454.00 Abstract: Correct potential buffer overflow State: Existing (Kit 1)
|
Number: Patch 458.00 Abstract: Correct potential buffer overflow State: Existing (Kit 1)
|
Number: Patch 476.00 Abstract: Corrects hang in log command State: Existing (Kit 1)
|
Number: Patch 486.00 Abstract: Security (SSRT0785U) State: Supersedes Patches 162.00, 163.00, 165.00
|
Number: Patch 492.00 Abstract: Correct improper file access State: Supersedes Patch 77.00
|
Number: Patch 502.00 Abstract: Fixes Solaris rcp commands failures State: New
|
Number: Patch 506.00 Abstract: Revised newfs(8) reference page State: New
|
Number: Patch 525.00 Abstract: Security (SSRT2301, SSRT2275) State: Supersedes Patch 20.00
|
Number: Patch 527.00 Abstract: Security (SSRT2275) State: Supersedes Patch 258.00
|
Number: Patch 529.00 Abstract: Security (SSR)T2275 State: New
|
Number: Patch 531.00 Abstract: Security (SSRT2275) State: New
|
Number: Patch 533.00 Abstract: Security (SSRT2275) State: New
|
Number: Patch 535.00 Abstract: Corrects problems in dbx and object file tools State: New
|
Number: Patch 537.00 Abstract: Fixes various problems in libc functions State: New
|
Number: Patch 539.00 Abstract: Fixes client hangs under Enhanced Security State: New
|
Number: Patch 541.00 Abstract: Fixes various problems in libc functions State: New
|
Number: Patch 543.00 Abstract: Update to prpasswdd daemon State: New
|
Number: Patch 545.00 Abstract: Fixes problems in dbx and object file tools State: New
|
Number: Patch 547.00 Abstract: Fixes problem in XTI caused by blocked mutex lock State: New
|
Number: Patch 549.00 Abstract: Fixes problem in XTI caused by blocked mutex lock State: New
|
Number: Patch 551.00 Abstract: Corrects improper file or privilege State: New
|
Number: Patch 553.00 Abstract: Corrects improper file or privilege management State: Supersedes Patches 304.00, 189.00
|
Number: Patch 555.00 Abstract: Scripts in /sbin/init.d are now world readable State: New
|
Number: Patch 557.00 Abstract: Scripts in /sbin/init.d are now world readable State: New
|
Number: Patch 560.00 Abstract: Update to nis startup script State: New (Supersedes Patch 558.00)
|
Number: Patch 562.00 Abstract: Scripts in /sbin/init.d are now world readable State: New
|
Number: Patch 564.00 Abstract: Correct improper file access State: Supersedes Patches 335.00, 337.00, 392.00, 394.00
|
Number: Patch 566.00 Abstract: Fixes problems in the kdbx extensions State: Supersedes Patch 4.00
|
Number: Patch 576.00 Abstract: Correct improper file access State: Supersedes Patch 47.00
|
Number: Patch 578.00 Abstract: Fix for grep command hang State: New
|
Number: Patch 622.00 Abstract: Hang occurs with various PowerStorm graphics options State: Supersedes Patch 107.00
|
Number: Patch 637.00 Abstract: Fix for .mrg..termcap file State: New
|
Number: Patch 640.00 Abstract: Fixes hang in the hardware configuration subsystem State: Supersedes Patches 144.00, 145.00, 146.00, 147.00, 148.00, 149.00, 151.00, 484.00, 638.00
|
Number: Patch 643.00 Abstract: Fix for tar command State: Supersedes Patches 105.00, 641.00
|
Number: Patch 646.00 Abstract: Correct improper file access State: Supersedes Patches 227.00, 644.00
|
Number: Patch 648.00 Abstract: Fix for fwtmp command State: New
|
Number: Patch 650.00 Abstract: Correct potential buffer overflow State: New Addresses potential BIND (Berkeley Internet Name Domain) security vulnerabilities that may result in buffer overflows, unauthorized access, or denial of service. These potential security vulnerabilities may be in the form of local and remote security domain risks. The following potential security vulnerabilities have been corrected:
|
Number: Patch 653.00 Abstract: Correct improper file or privilege State: New (Supersedes Patch 651.00)
|
Number: Patch 656.00 Abstract: Supports monitoring AdvFS statistics using pmgrd State: New (Supersedes Patches 654.00)
|
Number: Patch 658.00 Abstract: Fix for rm command State: New
|
Number: Patch 662.00 Abstract: mtools now prints appropriate error messages State: New
|
Number: Patch 664.00 Abstract: Fixes erroneous reboot of the operating system State: New
|
Number: Patch 667.00 Abstract: Security (SSRT0711U) State: Supersedes Patches 211.00, 429.00, 665.00
|
Number: Patch 669.00 Abstract: Added sysconfig tunables for ES45 environ monitoring State: Supersedes Patches 214.00, 215.00, 217.00, 431.00
|
Number: Patch 671.00 Abstract: Fix for mfs command State: New
|
Number: Patch 674.00 Abstract: Fix for ln command State: New (Supersedes Patch 672.00)
|
Number: Patch 678.00 Abstract: Fix race condition and improper file access State: Supersedes Patches 143.00, 675.00, 676.00
|
Number: Patch 680.00 Abstract: Fix for audit_tool command State: Supersedes Patch 252.00
|
Number: Patch 685.00 Abstract: Fix for vrestore command State: New (Supersedes Patches 681.00, 682.00, 683.00)
|
Number: Patch 687.00 Abstract: Removes compiler warnings State: New
|
Number: Patch 689.00 Abstract: Corrects a problem in os_mibs State: New
|
Number: Patch 692.00 Abstract: Fix for dump command State: New (Supersedes Patch 690.00)
|
Number: Patch 694.00 Abstract: Corrects exit status of sed when disk is full State: New
|
Number: Patch 696.00 Abstract: Revises the sys_attrs_ee(5) reference page State: New
|
Number: Patch 698.00 Abstract: Correct improper file access State: Supersedes Patch 287.00
|
Number: Patch 703.00 Abstract: Correct improper file or privilege management State: New
|
Number: Patch 705.00 Abstract: Eliminates compiler warnings in mkdir State: New
|
Number: Patch 708.00 Abstract: Correct potential buffer overflow State: Supersedes Patches 460.00, 706.00
|
Number: Patch 710.00 Abstract: Fix for ps command State: New
|
Number: Patch 712.00 Abstract: Provides the chatr(1) reference page State: New
|
Number: Patch 714.00 Abstract: Fix for vmstat State: New
|
Number: Patch 716.00 Abstract: Performance enhancement for IPsec State: New Corrects a condition in which IPsec performs poorly when using ESP with the 3DES cipher. |
Number: Patch 718.00 Abstract: Provides correct labels for mach events State: New
|
Number: Patch 720.00 Abstract: Fix for audit subsystem utilities State: New
|
Number: Patch 722.00 Abstract: Fixes a typo in mkcdsl State: New
|
Number: Patch 727.00 Abstract: Fix for which command State: New
|
Number: Patch 729.00 Abstract: Correct improper file or privilege management State: New
|
Number: Patch 731.00 Abstract: Update to pmgrd IoRate Statistics feature State: New
|
Number: Patch 733.00 Abstract: Correct improper file or privilege management State: New
|
Number: Patch 735.00 Abstract: Fix for chfile command State: New
|
Number: Patch 737.00 Abstract: Fix for tip command State: New
|
Number: Patch 739.00 Abstract: Enables tip to log into member-specific log file State: New
|
Number: Patch 741.00 Abstract: Fix for default cron jobs State: New
|
Number: Patch 743.00 Abstract: Corrects a problem in niffd State: New
|
Number: Patch 745.00 Abstract: Correct improper file or privilege management State: New
|
Number: Patch 747.00 Abstract: Fix for btextract utility State: New
|
Number: Patch 749.00 Abstract: make command now checks dependencies on archive libraries State: New
|
Number: Patch 751.00 Abstract: Fix for .mrg...login script State: New
|
Number: Patch 754.00 Abstract: Fixes slow boot problems when booting cluster State: Supersedes Patches 450.00, 752.00
|
Number: Patch 756.00 Abstract: Correct improper file or privilege management State: New
|
Number: Patch 758.00 Abstract: Revision to the vdump.8 reference page State: New
|
Number: Patch 760.00 Abstract: Corrects a problem in the marvel_pfm driver State: New
|
Number: Patch 762.00 Abstract: Fix for SysMan Station failure State: New
|
Number: Patch 764.00 Abstract: Correct improper file or privilege management State: New
|
Number: Patch 766.00 Abstract: Installs DECthreads V3.20-033 State: Supersedes Patches 22.00, 478.00
|
Number: Patch 768.00 Abstract: Installs DECthreads V3.20-033 State: Supersedes Patches 24.00, 480.00
|
Number: Patch 770.00 Abstract: Fixes cluster interconnect route advertisement State: Supersedes Patch 42.00
|
Number: Patch 772.00 Abstract: Fix for find command State: Supersedes Patch 64.00
|
Number: Patch 774.00 Abstract: Fix for dirclean utility State: New
|
Number: Patch 776.00 Abstract: Fixes spike code optimization tool State: New
|
Number: Patch 779.00 Abstract: Provides fixes for the collect utility State: Supersedes Patches 195.00, 777.00
|
Number: Patch 781.00 Abstract: Adds pmadvfs.mib to define AdvFS MIB definitions State: New
|
Number: Patch 783.00 Abstract: Fix buffer overflow and improper file access State: Supersedes Patches 246.00, 456.00
|
Number: Patch 785.00 Abstract: Fix for nissetup script State: New
|
Number: Patch 787.00 Abstract: Revision of the fwupgrade(8) reference page State: New
|
Number: Patch 789.00 Abstract: Correct improper file or privilege State: New
|
Number: Patch 791.00 Abstract: Correct improper file access State: Supersedes Patches 277.00, 464.00
|
Number: Patch 793.00 Abstract: Corrects I/O performance issue seen with CLSM State: New
|
Number: Patch 795.00 Abstract: Fix for advfsstat command State: New
|
Number: Patch 797.00 Abstract: Fixes cut cmd to handle incomplete lines correctly State: New
|
Number: Patch 801.00 Abstract: Fixes reset logic for Tru64 IDE/ATAPI driver State: Supersedes Patches 440.00, 798.00, 799.00
|
Number: Patch 803.00 Abstract: Fix for migrate utility State: New
|
Number: Patch 805.00 Abstract: Sysman station display does not get updated State: New
|
Number: Patch 809.00 Abstract: Fix for bcheckrc script State: New
|
Number: Patch 811.00 Abstract: Fix for defragment utility State: New
|
Number: Patch 813.00 Abstract: Fixes a problem in fixfdmn State: Supersedes Patch 349.00
|
Number: Patch 815.00 Abstract: Addition of new sysconfigurable attribute State: New
|
Number: Patch 817.00 Abstract: Correct improper file or privilege management State: New
|
Number: Patch 819.00 Abstract: Corrects problem with volmake utility State: New
|
Number: Patch 821.00 Abstract: Fixes a problem with scu State: New
|
Number: Patch 823.00 Abstract: Revision to the sys_attrs_proc(5) reference page State: New
|
Number: Patch 825.00 Abstract: Correct improper file access State: Supersedes Patches 462.00, 294.00
|
Number: Patch 835.00 Abstract: Correct improper file access State: New
|
Number: Patch 837.00 Abstract: Fix re_ioctl() cases DIODCMD and DIODCDB State: New
|
Number: Patch 838.00 Abstract: State: Supersedes Patches 65.00, 66.00, 67.00, 68.00, 69.00, 70.00, 71.00, 72.00, 73.00, 75.00, 376.00, 406.00, 408.00, 488.00, 241.00, 242.00, 244.00, 435.00, 498.00, 213.00, 108.00, 109.00, 110.00, 111.00, 112.00, 113.00, 114.00, 115.00, 116.00, 117.00, 118.00, 119.00, 120.00, 121.00, 122.00, 123.00, 124.00, 125.00, 126.00, 127.00, 128.00, 129.00, 130.00, 131.00, 133.00, 397.00, 398.00, 399.00, 400.00, 401.00, 402.00, 403.00, 405.00, 490.00, 78.00, 79.00, 80.00, 82.00, 341.00, 409.00, 410.00, 412.00, 482.00, 494.00, 581.00, 582.00, 583.00, 584.00, 585.00, 586.00, 587.00, 588.00, 589.00, 590.00, 591.00, 592.00, 593.00, 594.00, 595.00, 596.00, 597.00, 598.00, 599.00, 600.00, 601.00, 602.00, 603.00, 604.00, 605.00, 606.00, 607.00, 608.00, 609.00, 610.00, 611.00, 612.00, 613.00, 614.00, 615.00, 616.00, 617.00, 618.00, 256.00, 25.00, 26.00, 27.00, 28.00, 30.00, 14.00, 161.00, 152.00, 153.00, 155.00, 389.00, 18.00, 507.00, 508.00, 509.00, 510.00, 511.00, 512.00, 513.00, 514.00, 515.00, 516.00, 517.00, 518.00, 519.00, 520.00, 521.00, 660.00, 523.00, 826.00, 827.00, 828.00, 829.00
|
Number: Patch 839.00 Abstract: Fixes problems in dbx and object file tools State: New
|
Number: Patch 847.00 Abstract: Security (SSRT2266) State: Supersedes Patches 179.00, 180.00, 181.00, 183.00, 427.00
|
Number: Patch 851.00 Abstract: Fixes various problems in the bcm driver State: Supersedes Patches 425.00, 43.00, 45.00, 48.00, 49.00, 50.00, 51.00, 52.00, 54.00, 500.00, 260.00, 567.00, 568.00, 569.00, 570.00, 571.00, 572.00, 574.00
|
Number: Patch 859.00 Abstract: Fixes ftpd file transfer failure State: New
|
Number: Patch 861.00 Abstract: Fixes a problem in .mrg..protocols merge script State: New
|
Number: Patch 867.00 Abstract: Fixes a process hang problem in ubc_common_lookup State: Supersedes Patches 290.00, 292.00, 436.00, 438.00, 92.00, (93.00, 94.00, 95.00, 96.00, 97.00, 98.00, 99.00, 100.00, 101.00, 374.00, 103.00, 417.00, 419.00, 496.00, 623.00, 624.00, 625.00, 626.00, 627.00, 628.00, 629.00, 630.00, 631.00, 632.00, 633.00, 635.00, 833.00, 845.00, 865.00
|
Patch 867.00 Continued
|
Number: Patch 872.00 Abstract: Security (SSRT2301, SSRT2275, SSRT2384) State: Supersedes Patches 65.00, 66.00, 67.00, 68.00, 69.00, 70.00, 71.00, 72.00, 73.00, 75.00, 376.00, 406.00, 408.00, 488.00, 241.00, 242.00, 244.00, 435.00, 498.00, 213.00, 108.00, 109.00, 110.00, 111.00, 112.00, 113.00, 114.00, 115.00, 116.00, 117.00, 118.00, 119.00, 120.00, 121.00, 122.00, 123.00, 124.00, 125.00, 126.00, 127.00, 128.00, 129.00, 130.00, 131.00, 133.00, 397.00, 398.00, 399.00, 400.00, 401.00, 402.00, 403.00, 405.00, 490.00, 78.00, 79.00, 80.00, 82.00, 341.00, 409.00, 410.00, 412.00, 482.00, 494.00, 581.00, 582.00, 583.00, 584.00, 585.00, 586.00, 587.00, 588.00, 589.00, 590.00, 591.00, 592.00, 593.00, 594.00, 595.00, 596.00, 597.00, 598.00, 599.00, 600.00, 601.00, 602.00, 603.00, 604.00, 605.00, 606.00, 607.00, 608.00, 609.00, 610.00, 611.00, 612.00, 613.00, 614.00, 615.00, 616.00, 617.00, 618.00, 256.00, 25.00, 26.00, 27.00, 28.00, 30.00, 14.00, 161.00, 152.00, 153.00, 155.00, 389.00, 18.00, 507.00, 508.00, 509.00, 510.00, 511.00, 512.00, 513.00, 514.00, 515.00, 516.00, 517.00, 518.00, 519.00, 520.00, 521.00, 660.00, 523.00, 826.00, 827.00, 828.00, 829.00, 831.00, 840.00, 841.00, 843.00, 849.99, 862.00, 864.00, 869.00, 870.00
|
Patch 872.00 Continued
|
Patch 872.00 Continued
|
Patch 872.00 Continued
|
Patch 872.00 Continued
|
Patch 872.00 Continued
|
Patch 872.00 Continued
|
Patch 872.00 Continued
|
Number: Patch 874.00 Abstract: Security (SSRT3469) State: New (Supercedes Patch 857.00 )
|
Number: Patch 876.00 Abstract: Revises collect(8) and pmgrd(8) reference pages State: New
|