This chapter provides information about the patches included in Patch Kit 1 for the base operating system. It also includes any general information about working with these patches.
This chapter is organized as follows:
Section 1.1 provides release notes that are specific to the Tru64 UNIX patches in this kit, as well as release notes that are of general interest.
Section 1.2 provides brief descriptions of the Tru64 UNIX patches included in this kit.
This section provides release notes that are specific to the Tru64 UNIX
patches in this kit, as well as release notes that are of general interest.
1.1.1 Required Storage Space
Approximately 250 MB of temporary storage space is required to untar
the base and TruCluster components of this patch kit.
We recommend that this
kit not be placed in the
/
,
/usr
, or
/var
file systems because doing so may unduly constrain the available
storage space for the patching activity.
The following permanent storage space is required to install the base component of this patch kit:
Approximately 47 MB of storage space in
/var/adm/patch/backup
may be required for archived original files if you choose to install
and revert all patches.
See the
Patch Kit Installation Instructions
for more information.
Approximately 48 MB of storage space in
/var/adm/patch
may be required for original files if you choose to install and
revert all patches.
See the
Patch Kit Installation Instructions
for more information.
Approximately 593 KB of storage space is required in
/var/adm/patch/doc
for patch abstract and README documentation.
Approximately 176 KB of storage space is needed in
/usr/sbin/dupatch
for the patch management utility.
See
Section 2.1.1
for information on space needed
for the TruCluster Server patches.
1.1.2 Problem Seen on Systems with Smart Array Controller
This section describes the steps you should take if your system is configured with a Smart Array controller and you see the following event logged:
Host name: unx104 SCSI CAM ERROR PACKET SCSI device class: CISS (Smart Array) Bus Number: 6 Target Number: 4 Lon Number: 0 ... ... Event Information: Command timed out...resetting controller
If this occurs, take the following steps:
Create a file named
ciss.temp
with the
following lines:
ciss:
ciss_throttle_threshold=5
Execute the following command:
#sysconfigdb -m -f
ciss.temp
Reboot your system:
# shutdown -r now
1.1.3 Broken Links Reported During Baselining
When performing a baseline analysis with the
dupatch
utility, you will encounter the following message during Phase 4:
Phase 4 - Report changed system files and missing files ======================================================= This phase provides information to help you make choices later in this process. It reports both 'missing' and files whose origin cannot be determined. Some of these files may affect patch installation. You will want to consider this information when you later make decisions in phase 5. * list of changed files with unknown origin: ------------------------------------------ ./etc/lprsetup.dat OSFPRINT540 UNKNOWN ./usr/share/doclib/annex/man/man3/Thread.3 OSFTCLBASE540 UNKNOWN BROKEN HARDLINK TO ./usr/share/doclib/annex/man/man3/Tcl_ConditionNotify.3 ./usr/share/doclib/annex/man/man3/Tcl_ConditionNotify.3 OSFTCLBASE540 UNKNOWN BROKEN HARDLINK TO ./usr/share/doclib/annex/man/man3/Thread.3 Press RETURN to proceed...
You can disregard this information.
The presence of these broken links
will not affect your system operation, the installation of
dupatch
or
dupatch
tools, the successful installation
of patches, or the rebuilding of kernels on the system.
1.1.4 New Russian Keyboard (Patch 339.00)
The new Russian 3R-LKQ48-BT keyboard, for which Patch 339.00 provides
an updated keyboard map, comes with five extra keycaps.
To enable any of those
extra keycaps, you will need to modify the file
/usr/lib/X11/xkb/symbols/digital/russian
.
For example:
// KEY <AD09> can be replaced by an extra keycap. // If you replace it with the extra keycap, please uncomment // the following definition and comment out the original one. // // key <AD09> { // symbols[Group1]=3D [ o, O ], // symbols[Group2]=3D [ Ukrainian_i, Ukrainian_I ] // }; key <AD09> { symbols[Group1]=3D [ o, O ], symbols[Group2]=3D [ Cyrillic_shcha, Cyrillic_SHCHA ] };
1.1.5 Panics May Occur on Multi-CPU Systems
Boot-time panics may occur on multi-CPU systems if all of the following conditions exist:
Auditing is enabled
Audit's -m switch is configured to establish a dump interval
The system contains empty CPU slots
The panic will occur on the first reboot after audit is configured or following an update installation on a system with audit already configured with a dump interval. The system will be unable to reboot in this configuration.
To work around this problem, boot to single-user mode and remove the
-m
option from the audit configuration stored in
/etc/rc.config.common
or
/etc/rc.config
.
The problem will be fixed in the next patch kit.
1.1.6 General and Problem Information for AlphaServer ES47, ES80, and GS1280 Systems
The following information pertains to the new AlphaServer ES47, ES80,
and GS1280 systems, which require Tru64 UNIX Version 5.1B and this patch
kit to be installed.
1.1.6.1 CPU Offline Restrictions
The Primary CPU cannot be taken off line.
CPUs that have I/O hoses attached to them can only be taken off line
if another CPU without I/O attached is present in the system .
A failure to
adhere to this restriction will cause the
psradm
command
to return an error.
In a two CPU configuration, the AlphaServer ES47 and ES80 do not allow
any CPUs to be taken off line.
1.1.6.2 Problem with Capacity on Demand Process
A problem has been discovered with the capacity on demand process in which a CPU can be designated as spare, but is not taken off line as expected.
With the capacity on demand process, the
codconfig
[cpu_id_list]
command lets you specify which CPUs
you have paid for and which are spares.
The command is supposed to mark the
others as spare and then take them off line.
Once a CPU is marked as spare,
the
hwmgr
command and Manage CPUs SUITLET will not let
you put them on line until you use the
ccod
-l
or
ccod
-p
command to either loan or purchase
the CPU.
The workaround to the problem is to use the
codconfig
[cpu_id_list]
command to mark the CPUs as spare and
then use either the
hwmgr
command or the Manage CPUs SUITLET
to take them off line (sometimes referred to as offlining them).
In the following
example, N is the CPU number.
# hwmgr -offline -name cpuN
If, for example, the
codconfig
command returns the
message "Error for CPU 2: Unable to offline this CPU," you would enter the
following
hwmgr
command:
# hwmgr -offline -name cpu2
For more information, see
codconfig
(8)hwmgr
(8)
The Manage CPUs SUITLET is available from the SysMan Menu and SysMan
Station.
1.1.6.3 Hardware SCSI Bus Errors
SCSI CAM errors experienced by the Adaptec controller that require SCSI
bus resets could cause PCI bus faults.
These faults will be seen as a "Machine
Check System Uncorrectable" panic.
This will require the system to be
booted after the machine_check.
A fix for this problem will be included
in a future release
1.1.6.4 Compact Disk Drive Errors Logged
The TEAC CDR-W 416E drive that is shipped with the system will log errors
on reboot if the CD-ROM media is not present.
These messages are only informational.
1.1.6.5 Presence of Third-Party Devices May Cause System Panic
The ATM 3X-DAPBA-FA/UA driver may experience a panic on shutdown if
third-party devices are installed.
1.1.6.6 Repeated Reboots May Cause Panic
Repeated reboots of the system may cause a kernel memory fault panic,
but does not result in the loss of data.
A reboot after the panic should be
successful.
A fix for this problem will be included in a future release.
1.1.6.7 Incorrect Free Page Counts Reported
The
vmstat
-S
command reports incorrect
free page counts on a sparsely configured system.
A sparsely configured system
is one that has gaps in the numbering of CPUs, for example 0, 1, 8,9 10,11.
1.1.6.8 USB Keyboard Driver Does Not Support Non-U.S. Locales
The USB keyboard driver does not support non-U.S. locales, and setting the system's language to anything other than 36 (U.S./English) causes the keyboard to be interpreted as a U.S./English keyboard anyway.
For example, on the Japanese keyboard with the SRM variable "language" set to 50 (Japanese JIS), Shift-2 produces a double quote (") character, while on the U.S./English keyboard it produces an ampersand (@). With this problem, keyboards set to Japanese will produce the ampersand.
A fix for this problem will be included in a future release.
1.1.7 Caution on Updating to Version 5.1B with DEGXA NICs
Do not attempt to do a update installation or rolling upgrade from Version 5.1A to Version 5.1B when the network device is a DEGXA-TA or DEGXA-SA and you have the Version 5.1A Patch Kit 4 and the New Hardware Devices V6 (NHD6) Kit installed.
The NHD6 and PK4 kits have provided fixes that are not in the base operating
system release for Version 5.1B.
Once the update is completed using another
network device and the Version 5.1B Patch Kit 1 has been applied, the DEGXA
network interface cards (NICs) can again be used for the network connection.
1.1.8 Tuning the NFS Server Duplicate Request Cache (Patch 494.00)
The NFS server maintains a list of recently completed non-repeatable requests. This list is used to reply to client retransmissions of the request in the event that the initial request transmission's reply was lost or that the server took too long to satisfy the request.
In some cases, under heavy NFS server load and over high aggregate network
bandwidth involving changes to file systems (changes caused by the use of
the
crate, link, unlink, mkdir, rmdir, truncate, utimes,
and
write
commands) problems may occur with the duplicate
request cache.
Thiese problems can occur if all the elements in the duplicate
request cache are cycled through between an initial client transmission and
subsequent retransmission.
If this occurs, the NFS server cannot detect that
the retransmission is in fact a retransmission.
This may result in the repetition
of a request and may cause out of order writes or truncation and subsequent
retruncation of a file.
Patch 494.00 provides a tuning variable to control the size of the NFS server's duplicate request cache:
nfs_dupcache_size
Controls the
absolute size of the NFS server duplicate request cache.
This is measured
in the number of elements that are allocated at NFS server initialization
If is determined that the size of the duplicate cache needs to be modified,
you should change the
nfs_dupcache_size
.
The new value
for
nfs_dupcache_size
should be set to equal two times the
value of
nfs_dupcache_entries
.
You must use the
dbx
command to modify
nfs_dupcache_size
.
There is no sysconfig interface to this tuning
variable.
1.2 Summary of Base Operating System Patches
This section provides descriptions of the patches in Patch Kit 1 for the Tru64 UNIX operating system.
Number: Patch 2.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 4.00 Abstract: Fixes premature termination of ofile kdbx extension State: New This patch fixes a premature termination of the ofile kdbx extension and warning messages in various kdbx extensions. |
Number: Patch 6.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 8.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 10.00 Abstract: Correct potential buffer overflow State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the CDE online help. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. |
Number: Patch 12.00 Abstract: Correct potential buffer overflow State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the CDE online help. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. |
Number: Patch 14.00 Abstract: Fix for the dsfmgr utility State: New This patch fixes many small problems in dsfmgr. |
Number: Patch 16.00 Abstract: Fix for the dsfmgr utility State: New This patch fixes many small problems in dsfmgr. |
Number: Patch 18.00 Abstract: Security (SSRT2301, SSRT2275) State: New This patch:
|
Number: Patch 20.00 Abstract: Security (SSRT2301, SSRT2275) State: New This patch:
|
Number: Patch 30.00 Abstract: Allows auditing of login and su events State: Supersedes Patches 25.00, 26.00, 27.00, 28.00 This patch:
|
Number: Patch 33.00 Abstract: Correct potential buffer overflow State: Supersedes Patch 31.00 This patch:
|
Number: Patch 36.00 Abstract: Correct potential buffer overflow State: Supersedes Patch 34.00 This patch:
|
Number: Patch 38.00 Abstract: Adds new functionality to tcpdump State: New This patch adds support for IEEE 802.1Q Virtual Local Area Network (VLAN). |
Number: Patch 42.00 Abstract: MD5 authentication problem with Version 2 RIP State: New This patch corrects a problem using MD5 authentication with Version 2 of the Routing Information Protocol (RIP). |
Number: Patch 47.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 58.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U) State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 60.00 Abstract: Update to siacfg utility State: New On systems using Perl 5.8.0 and higher, this patch eliminates the "Using an array as a reference is deprecated" warning when running /usr/sbin/siacfg and during system boot. |
Number: Patch 62.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 64.00 Abstract: Fix for find command State: New This patch fixes a problem with the find -ls command that caused it to display an incorrect number of blocks. |
Number: Patch 84.00 Abstract: Security (SSRT2208) State: New This patch corrects a potential security vulnerability which may allow non-privileged users to gain unauthorized (root) access. This may be in the form of local and remote security domain risks. |
Number: Patch 86.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U) State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 89.00 Abstract: Fixes defects in AutoFS user space and kernel code State: Supersedes Patch 87.00 This patch:
|
Number: Patch 91.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 105.00 Abstract: Fix for tar command State: New This patch fixes a one byte gap/hole in the maximum file size in the tar command before an extended header record is used (8589934591 (octal 77777777777)). |
Number: Patch 107.00 Abstract: Fix for X Server command line option State: New This patch fixes a problem where the X server's command line option to turn off VESA Display Power Management Signalling (-dpms) does not work. |
Number: Patch 135.00 Abstract: Correct potential buffer overflow State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the dxterm utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. |
Number: Patch 137.00 Abstract: Fix for startslip program State: New This patch fixes a problem with the startslip program that prevented it from extracting all information from the acucap file. |
Number: Patch 139.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 143.00 Abstract: Fix race condition and improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 155.00 Abstract: Fix race condition and improper file access State: Supersedes Patches 152.00, 153.00 This patch:
|
Number: Patch 157.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 159.00 Abstract: Fix hwmgr command to show path state correctly State: New This patch fixes the hwmgr command to correctly show a path state. |
Number: Patch 161.00 Abstract: Corrects cp performance problem State: New This patch:
|
Number: Patch 167.00 Abstract: Security (SSRT2368, SSRT2368) State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper access. |
Number: Patch 169.00 Abstract: Fix for SDLT media error State: New This patch adds the capability for KZPCA devices to work with SCSI devices that only support asynchronous data transfers and fixes SDLT media error caused bus resets. |
Number: Patch 171.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 173.00 Abstract: Fix race condition and improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 176.00 Abstract: Resolves kernel memory faults in TCP/IP subsystem State: Supersedes Patch 174.00 This patch resolves kernel memory faults in the TCP/IP subsystem. |
Number: Patch 178.00 Abstract: Fix for lpd line printer daemon State: New Fixes the lpd deamon to correct /etc/hosts.lpd case sensitivity, for example, "node.domain" treated the same as "Node.Domain/" |
Number: Patch 185.00 Abstract: Prevents addvol from adding invalid disks into domain State: New This patch prevents addvol from adding invalid disks into a domain. |
Number: Patch 187.00 Abstract: Fix for invalid disks being added into domain State: New This patch prevents addvol from adding invalid disks into a domain. |
Number: Patch 189.00 Abstract: Fix for rmtmpfiles script State: New This patch corrects a problem in which the rmtmpfiles script leave empty directories in /var/tmp at system startup. |
Number: Patch 191.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 193.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 195.00 Abstract: Provides fixes for the collect utility State: New This patch fixes several problems with the collect utility and updates the utility from Version 2.0.0 to 2.0.5. |
Number: Patch 197.00 Abstract: Read privileges being stripped from passwd file State: New This patch fixes a problem in which group and other read privileges get stripped from /etc/passwd when a user switches from enhanced to base security. |
Number: Patch 199.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 201.00 Abstract: Fix for verify utility State: New This patch fixes a problem in which the verify utility core dumps if it encounters a specific type of metadata inconsistency. |
Number: Patch 203.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 205.00 Abstract: Fixes a correctable error reporting problem State: New This patch fixes a correctable error reporting problem that turns off the reporting of correctable errors forever on any CPU, except CPU 0, once throttling of correctable errors has begun. |
Number: Patch 207.00 Abstract: Correct potential buffer overflow State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the libXm utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. |
Number: Patch 209.00 Abstract: Correct potential buffer overflow State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the libXm utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. |
Number: Patch 219.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 221.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 223.00 Abstract: Add SCSI reserve/release support to mt State: New This patch adds SCSI reserve and release support to the mt program to assist open SAN tape management. |
Number: Patch 225.00 Abstract: Interop problem between curses.h and esnmp.h. State: New This patch fixes an interoperability problem between the curses.h and esnmp.h header files. |
Number: Patch 227.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability, where under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 229.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 232.00 Abstract: Correct improper file access State: Supersedes Patch 230.00 This patch:
|
Number: Patch 234.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 238.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 240.00 Abstract: Fix for hwmgr command State: New Fixes a problem in which the display for the hwmgr -show name command is not aligned properly for the name field. |
Number: Patch 248.00 Abstract: Fix for hwmgr delete command option State: New This patch fixes a problem where, when using hwmgr to delete a component, a "DELETE_COMMIT: Cannot fetch name." message may be displayed on the console. This problem can be seen frequently in a cluster environment when the component being deleted does not exist on the system. |
Number: Patch 250.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 252.00 Abstract: Fix for audit_tool command State: New This patch fixes the audit_tool search algorithm to differentiate between prived and non-prived UIDs, and to allow regular expressions in string searches. |
Number: Patch 254.00 Abstract: Correct improper file access State: New This patch:
|
Number: Patch 256.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 258.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 260.00 Abstract: Code now prints greater than 61 UNIX domain sockets State: New This patch:
|
Number: Patch 262.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 264.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 266.00 Abstract:Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 268.00 Abstract: Installs version V2.1-120 of libots3 libraries State: New This patch installs version V2.1-120 of /usr/lib/libots3.a and /usr/shlib/libots3.so, which fixes a problem where long-running OpenMP applications might overflow an internal libots3 counter, resulting in a breakdown of thread synchronization. |
Number: Patch 270.00 Abstract: Installs version V2.1-120 of libots3 libraries State: New This patch installs version V2.1-120 of /usr/lib/libots3.a and /usr/shlib/libots3.so, which fixes a problem where long-running OpenMP applications might overflow an internal libots3 counter, resulting in a breakdown of thread synchronization. |
Number: Patch 272.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 275.00 Abstract: Fix for hwmgr -view transaction -cluster command State: Supersedes Patch 273.00 This patch:
|
Number: Patch 464.00 Abstract: Correct improper file access State: Supersedes Patch 277.00 This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 279.00 Abstract: Corrections to Oxygen VX1 graphics card XCopyPlane State: New Corrects a problem with the Oxygen VX1 graphics card to make XCopyPlane copy only the requested bitplane rather than all bitplanes. |
Number: Patch 281.00 Abstract: Fixes a problem in usb_hid.mod State: New Corrects a problem in which a kernel memory fault sometimes occurs if a USB keyboard or mouse does not respond quickly enough. This KMF can occur during boot or soon after a USB keyboard or mouse is connected. Any device can trigger this, though it is neither predictable nor common. |
Number: Patch 283.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 285.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 287.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 289.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability which, under certain circumstances, could compromise system integrity. |
Number: Patch 294.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 296.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 298.00 Abstract: Fixes consvar -s bootdef_dev failure with KZPCC State: New This patch fixes consvar -s bootdef_dev failure with KZPCC. |
Number: Patch 300.00 Abstract: Login process crashes when LDAP users try to log in State: New This patch fixes a problem in with the login process may crash when LDAP users or users belonging to an LDAP group attempt to log in. |
Number: Patch 304.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 306.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 309.00 Abstract: Performance tool failures on Sierra Cluster (PFS) State: Supersedes Patch 307.00 This patch:
|
Number: Patch 311.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 313.00 Abstract: Correct improper file access State: New This patch:
|
Number: Patch 317.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U) State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 320.00 Abstract: Fixes problem with IPv6 neighbor discovery daemon State: Supersedes Patch 318.00 This patch:
|
Number: Patch 322.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 324.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 326.00 Abstract: Fixes a linker error State: New This patch fixes a linker error that occurs when running the command ld -update_registry /dev/null. |
Number: Patch 328.00 Abstract: Fixes and improves the mcutil program State: New This patch fixes and improves the mcutil program by correcting how bus resets are handled by the program and enhancing its error reporting capabilities. |
Number: Patch 330.00 Abstract: Allows evmd to stop listening on default TCP port 619 State: New This patch allows the Event Manager daemon, evmd, to stop listening on its default TCP port 619. This capability is not available for clustered systems. |
Number: Patch 332.00 Abstract: Fixes memory leak in the PanoramiX/Xinerama Extension State: New This patch fixes a memory leak in the PanoramiX/Xinerama Extension that could cause a process core dump. |
Number: Patch 334.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 339.00 Abstract: Updated keyboard map for Russian 3R-LKQ48-BT State: New This patch provides an updated keyboard map for the Russian 3R-LKQ48-BT keyboard model. |
Number: Patch 343.00 Abstract: Fixes problem seen with TAHI IPv6 conformance test State: New This patch fixes a problem seen with the TAHI IPv6 conformance test, specifically Test 4 for the IPv6 Specification. |
Number: Patch 345.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 347.00 Abstract: Fix allows fuser to display the reference flag State: New This patch allows the fuser utility to display the reference flag, which indicates the type of reference made; for example, open, closed, unlinked, or mmapped. |
Number: Patch 349.00 Abstract: Corrections to several problems in fixfdmn State: New This patch corrects several problems with the fixfdmn utility. |
Number: Patch 351.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 356.00 Abstract: Fix for ftp open command State: Supersedes Patch 354.00 This patch:
|
Number: Patch 358.00 Abstract: Fix for mountd daemon State: New This patch enables mountd to correctly handle entries with multiple lines input in exports file. |
Number: Patch 360.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 362.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 364.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 366.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 368.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 370.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 372.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U) State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 378.00 Abstract: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U) State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 380.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 384.00 Abstract: Fix for telnetd daemon State: New Fixes a problem in which telnetting from some machines (MS), will leave a UDP port open, requiring a call to yp_unbind() after getnameinfo() to close all ports. |
Number: Patch 387.00 Abstract: Correct improper file access State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 389.00 Abstract: Update SSH Tru64 UNIX V1.1 (2.4.1) to SSH 3.2 State: New This patch addresses several issues and problems with the SSH program, including interoperability with other SSH implementations, SSH client/server configuration files compatibility issues, and the lack of IPV6 support. |
Number: Patch 391.00 Abstract: Updates reference pages for VLAN functionality State: New This patch revises the ifconfig(8), lan_config(8), niffconfig(8), ping(8), vlanconfig(8), and vlan(7) reference pages for VLAN functionality. |
Number: Patch 394.00 Abstract: Correct improper file access State: Supersedes Patches 335.00, 337.00, 392.00 This patch:
|
Number: Patch 396.00 Abstract: Fix for ldapcd daemon State: Supersedes Patch 56.00 This patch fixes the following problems with the ldapcd daemon:
|
Number: Patch 414.00 Abstract: Revises several SSH reference pages State: New This patch revises several of the SSH reference pages which address several issues and problems with SSH, including the following:
|
Number: Patch 416.00 Abstract: Fix for creacct hang State: New Fixes a problem that causes the creacct command to hang when the W2K Active Directory is misconfigured. |
Number: Patch 421.00 Abstract: Revises envconfig.8 and envmond.8 reference pages State: New This patch revises the envconfig(8) and envmond(8) reference pages for the environmental monitoring facilities /usr/sbin/envmond and /usr/sbin/envconfig to support the new GS1280 hardware platform. |
Number: Patch 423.00 Abstract: Fix potential denial of service State: New This patch corrects a potential security vulnerability for systems using Internet Protocol Security (IPsec). Under certain circumstances, a remote attacker may be able to cause IPsec to block all IP traffic from the system, creating a denial of service. |
Number: Patch 425.00 Abstract: NHD6 installs failed to see new disk information State: New This patch updates ddr.mod to support new hardware (NHD6) devices. |
Number: Patch 427.00 Abstract: Security (SSRT2266) State: Supersedes Patches 179.00, 180.00, 181.00, 183.00 This patch:
|
Number: Patch 429.00 Abstract: Security (SSRT0711U) State: New This patch:
|
Number: Patch 431.00 Abstract: Provides support functionality for DS20L platform State: Supersedes Patches 214.00, 215.00, 217.00 This patch:
|
Number: Patch 433.00 Abstract: Fix race condition and improper file access State: Supersedes Patch 236.00 This patch:
|
Number: Patch 438.00 Abstract: Additional support for Ultrium 2 SCSI tape drive State: Supersedes Patches 290.00, 292.00, 436.00 This patch:
|
Number: Patch 440.00 Abstract: Fix for kernel memory fault State: New This patch fixes the problem of a kernel memory fault in systems that contain more than eight IDE/ATA buses. |
Number: Patch 442.00 Abstract: Incorrect I/O status may be returned by KZPEA driver State: Supersedes Patch 315.00 This patch:
|
Number: Patch 444.00 Abstract: Revises tcpdump.8 ref page for VLAN functionality State: New This patch revises the tcpdump(8) reference page for virtual local area network (VLAN) functionality. |
Number: Patch 446.00 Abstract: Revises the mt.1 reference page State: New This patch revises the mt(1) reference page for the mt command, which has three new commands, mt reserve, mt release and mt tur. |
Number: Patch 448.00 Abstract: Allows multiple VX1 graphic cards to be configured State: Supersedes Patch 353.00 This patch:
|
Number: Patch 450.00 Abstract: Fix for smsd triggering LSM configuration errors State: New This patch corrects a problem in which the SysMan Station daemon, esmsd, triggers LSM configuration errors when querying LSM in a cluster. The installation of this patch ensures that a cluster member will be up-to-date with respect to the LSM configuration when calls are made to an internal LSM routine. |
Number: Patch 452.00 Abstract: Modifications for environmental monitoring facilities State: Supersedes Patch 40.00 This patch:
|
Number: Patch 454.00 Abstract: Correct potential buffer overflow State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the dxsysinfo utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. |
Number: Patch 456.00 Abstract: Fix buffer overflow and improper file access State: Supersedes Patch 246.00 This patch:
|
Number: Patch 458.00 Abstract: Correct potential buffer overflow State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 460.00 Abstract: Correct potential buffer overflow State: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. |
Number: Patch 462.00 Abstract: Support for SmartArray disk controllers State: New Adds Support for SmartArray disk controllers. In the absence of this support, the SysMan Station hardware view fails to operate if the SmartArray product is installed on the system. |
Number: Patch 478.00 Abstract: Installs DECthreads V3.20-029c State: Supersedes Patch 22.00 This patch installs DECthreads V3.20-029c, which fixes problems that may affect threaded programs, including a problem with floating point data corruption. This version of DECthreads is the initial support version of the HP POSIX Threads Library for Tru64 UNIX V5.1B. |
Number: Patch 480.00 Abstract: Installs DECthreads V3.20-029c State: Supersedes Patch 24.00 This patch installs DECthreads V3.20-029c, which fixes problems that may affect threaded programs, including a problem with floating point data corruption. This version of DECthreads is the initial support version of the HP POSIX Threads Library for Tru64 UNIX V5.1B. |
Number: Patch 484.00 Abstract: Corrects invalid hwmgr show component inconsistency State: Supersedes Patches 144.00, 145.00, 146.00, 147.00, 148.00, 149.00, 151.00 This patch:
|
Number: Patch 486.00 Abstract: Security (SSRT0785U) State: Supersedes Patches 162.00, 163.00, 165.00 This patch:
|
Number: Patch 490.00 Abstract: Fix process management State: Supersedes Patches 213.00, 108.00, 109.00, 110.00, 111.00, 112.00, 113.00, 114.00, 115.00, 116.00, 117.00, 118.00, 119.00, 120.00, 121.00, 122.00, 123.00, 124.00, 125.00, 126.00, 127.00, 128.00, 129.00, 130.00, 131.00, 133.00, 397.00, 398.00, 399.00, 400.00, 401.00, 402.00, 403.00, 405.00 This patch:
|
Patch 490.00 Continued
|
Number: Patch 492.00 Abstract: Correct improper file access State: Supersedes Patch 77.00 This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. |
Number: Patch 494.00 Abstract: Fixes an NFS client panic State: Supersedes Patches 78.00, 79.00, 80.00, 82.00, 341.00, 409.00, 410.00, 412.00, 482.00 This patch:
|
Number: Patch 496.00 Abstract: Provides the V1.07 release of ciss driver State: Supersedes Patches 92.00, 93.00, 94.00, 95.00, 96.00, 97.00, 98.00, 99.00, 100.00, 101.00, 374.00, 103.00, 417.00, 419.00 This patch:
|
Number: Patch 498.00 Abstract: Improve I/O performance by reducing kernel locking overhead.hubs State: Supersedes Patches 65.00, 66.00, 67.00, 68.00, 69.00, 70.00, 71.00, 72.00, 73.00, 75.00, 376.00, 406.00, 408.00, 241.00, 242.00, 244.00, 435.00, 488.00
|
Number: Patch 500.00 Abstract: Adds new functionality to support IEEE 802.1Q State: Supersedes Patches 43.00, 45.00, 48.00, 49.00, 50.00, 51.00, 52.00, 54.00 This patch:
|