HP Tru64 UNIX and TruCluster Server Version 5.1B-6 Patch Summary and Release Notes
An attempt to start a new process on host "hostname" failed
• Corrects a problem in which the application builder core dumps when trying to generate
code for menu items with the set-label action type.
Patch 27015.00
OSFCDEDT540
• Corrects several potential security vulnerabilities where, under certain circumstances, system
integrity may be compromised. These may be in the form of improper file access.
• Fixes the message catalog for the CDE application dtprintinfo.
• Fixes a problem in which dtcreate core dumps while editing the icon image.
• Corrects a problem in which setting the value of screen saver and screen lock in dtstyle
disables both values.
• Corrects a problem that causes dtsession to not work when its norestore option is enabled.
• Resolves a problem that occurs when displaying the user-specified logo in dtlogin.
• Resolves the incorrect system activity report by the w command with XDMCP.
• Fixes a dtcreate problem that occurs while saving an action file in an NFS-mounted
environment.
• Fixes the dtsetup display.
• Sets defaults for dtlogin.
• Changes the quick setup message.
• Sets the proper text for the front panel help page in dtsetup.
• Corrects a potential security vulnerability in the Common Desktop Environment (CDE)
software. This potential vulnerability, which may be locally and remotely exploitable, could
result in a denial of service (DOS), unauthorized privileged access, or both.
SSRT4721 - dtlogin - (Severity - High)
• Ensures that the proper error message is set in dtlogin when an unknown display parameter
is read from the Xaccess file.
Patch 27016.00
OSFCDEMAIL540
• Corrects several potential security vulnerabilities where, under certain circumstances, system
integrity may be compromised. These may be in the form of improper file access.
• Corrects a potential security vulnerability that may result in unauthorized Privileged Access
or a Denial of Service (DoS). This may be in the form of local and remote security domain
risks.
Patch 27019.00
OSFCDEMIN540
• Resolves a problem that occurs when opening big file using dtfile.
• Fixes several potential security vulnerabilities where, under certain circumstances, system
integrity may be compromised. These may be in the form of improper file access.
• Corrects a potential security vulnerability where under certain circumstances, system integrity
may be compromised when a buffer overflow occurs in the DtSvc utility. Buffer overflows
are sometimes exploited in an attempt to subvert the function of a privileged program and
possibly execute commands at the elevated privileges if the program file has the setuid
privilege.
• Fixes dtterm problem that causes a core dump when the resource saveLines values is set to
1000s in $HOME/Dtterm.
108 Tru64 UNIX Patches