
PROBLEM: (81129) (PATCH ID: OSF510-054)
********
This patch corrects a problem in an Enhanced Security configuration
where at login time if it is determined an account's password has
expired, the "Old password:" prompt did not appear. Rather, the user 
is immediately prompted for their new password options and is allowed 
to change to a new password.  This patch also allows a user logged 
into a system configured as a NIS client with Enhanced Security installed 
to change their password.


PROBLEM: (KAOQ71787, 81139) (PATCH ID: OSF510-055)
********
This patch restores the functionality of the 'su' utility in an 
Enhanced Security configuration. In earlier releases, it was possible to 
become another user without knowing their password as long as you knew 
root's password. An example is as follows:
login as user1
su root
enter root's password
su user2

Without the patch user1 would have to know user2's password even though they
knew root's password. After the patch is applied, the su to user2 will be
allowed without providing the password.


PROBLEM: (TKTR60015, 81049) (PATCH ID: OSF510-072)
********
This patch fixes a problem for Enhanced Security 
configurations where the Maximum Login Interval
(u_max_login_intvl) field was being ignored for 
account templates.


PROBLEM: (83212, 84065, 84848, 84849,
          84850) (PATCH ID: OSF510-170)
********
This patch fixes a problem in Enhanced Security in which calls to get data from
or set data in one of the Enhanced Security databases would cause the process 
to hang.
The problem primarily affected the prpasswdd daemon and authentication programs
that made frequent and/or simultaneous requests to get or set the Enhanced 
Security data.

PROBLEM: (BCGM91S2D, HPAQC0PTL)

On standalone systems, the following stack trace could be found in any process
attempting to access the Enhanced Security database:

0 thread_block
1 sleep_prim
2 mpsleep
3 setflck
4 msfs_lockctl
5 fcntl
6 syscall
7 _Xsyscall


PROBLEM: (TKTRB0029, BCSMB1WJN, BCGMC0S9B)

On TruCluster systems, the following stack traces were seen for processes
attempting to access the Enhanced Security database:

0 thread_block
1 sleep_prim
2 mpsleep
3 dlm_wait_on_event
4 convert_lock
5 dlm_convert
6 syscall
7 _Xsyscall

In some processes, the create_lock routine would be found on the stack instead
of the dlm_convert and convert_lock routines.


PROBLEM: (86725) (PATCH ID: OSF510-254)
********
This patch fixes a problem in which login requests can
hang when enhanced security is enabled.


PROBLEM: (89411, IPMT, Request) (PATCH ID: OSF510-408)
********
This problem was seen primarily on systems with hundreds or thousands of
simultaneous logins, pop/imap, telnet, etc. requests occurring.  Depending
on the number and speed of the processor logins would take anywhere from 1 to 4
minutes to complete.  Analysis of the running system would not seem to indicate
a heavy CPU load.



