
PROBLEM:  (79556) (PATCH ID: OSF445-001)
********


The output string for the swprintf() interface was not NULL terminated.


PROBLEM:  (79876) (PATCH ID: OSF445-023)
********


If the "where" or "t" ladebug command does not show all the currently active
functions, it may be because of this problem. The program being debugged had
to have been built with "split procedures", which is done via options in the
om and spike tools. For spike, split procedures are generated if profiling is
specified. For om, split procedures are generated if profiling AND the
-split_procedure option are specified.

PROBLEM:  (TKTR30011, 78909) (PATCH ID: OSF445-025)
********


If a code segment contained a gmtime() call between calls to tzset(),
or any function specified to call tzset() (such as localtime(), mktime(),
strftime(), etc) , the tzname[0] array could contain erroneous time
zone data referring to the "GMT" zone abbreviation instead of the local
time zone, as specified in the TZ environment variable or default time
zone for the system.

PROBLEM:  (62211) (PATCH ID: OSF445-031)
********


This fix increases the length of the user names for rsh and rexec to allow for
NT interoperabilty.

PROBLEM: (72100, 74961, 75971, 77080,
          77288, 79588) (PATCH ID: OSF445-112)
********
Threaded applications which make extensive use of synchronization objects
(mutexes, condition variables) may encounter performance and scaling
regressions when run on some EV6 SMP machines.  Customers encountering
these regressions may observe negative scaling, decreased application
throughput and increased CPU utilitzation, as the number of EV6 CPUs
is increased.  This version of DECthreads contains changes to the
implementation of synchronization objects and thread scheduling around
those objects to improve performance on all SMP systems.  No functional
or interface changes were made.


PROBLEM: (BCSM807S5) (PATCH ID: OSF445-108)
********
Some applications assume that initial allocations of memory from the C
run-time library's malloc() function will return zero-filled memory. The
problem is that malloc() and free() often write into the first 16 bytes of
the allocated memory.
This change to malloc() zeros out the first 16 bytes in the allocated memory.
The result is that memory allocated prior to any call to free() -- and prior
to any other run-time library function that might call free -- should be zero
filled.


PROBLEM: (84534, 84535) (PATCH ID: OSF445-165)
********
This patch fixes a problem that might occur with threaded applications
linked against older versions of DECthreads.  The DECthreads internal
symbol __pthreads_legacy_init_routine may show up as an unresolved
symbol at load time when those applications are run on systems on
which a newer version of DECthreads has been installed.


PROBLEM: (SSRT1-19U) (PATCH ID: OSF445-170)
********
A potential security vulnerability has been discovered, where under
certain circumstances, system integrity may be compromised. This may
be in the form of improper file or privilege management. Compaq has
corrected this potential vulnerability.


PROBLEM: (SSRT0689U) (PATCH ID: OSF445-138)
********
A potential security vulnerability has been discovered, where under
certain circumstances, system integrity may be compromised. This may
be in the form of improper file or privilege management. Compaq has
corrected this potential vulnerability.



