HP Tru64 UNIX and TruCluster Server Version 5.1B-6 Patch Summary and Release Notes
• Fixes the behavior of the rpc.rquotad daemon in a cluster.
• Addresses a mountd problem in which spurious signals can cause mountd to dump core
and a second problem that causes .INCLUDE parsing to function incorrectly.
• Enables AutoFS mount-on paths to have the correct maximum length when AutoFs files are
mapped directly.
• Fixes an rpc.lockd problem involving lock contention, in which lock requests accumulate
on a linked list that is searched with each kernel lock manager poll and result in excessive
CPU consumption
• Fixes an issue in which an error was being reported with an empty direct map.
• Fixes a problem where rpc.statd does not correctly create the sm and sm.bak directories on
startup, causing rpc.statd to exit.
Patch 27064.00
OSFOBSOLETE540
• Updates Tru64 UNIX version information in accordance with HP rebranding efforts.
Patch 27065.00
• Updates Tru64 UNIX version information in accordance with HP rebranding efforts.
• Corrects a potential security vulnerability where, under certain circumstances, system
integrity may be compromised. This may be in the form of improper file or privilege
management.
OSFOEMBASE540
Patch 27068.00
OSFPGMR540
• Fixes a sendmail registration issue with PSM.
• Updates sysconfig to use the cluster interconnect, thereby allowing for a greater SSI
collaboration. This will help with changing variables on hung systems, single user systems,
and normal running systems.
• Corrects several potential security vulnerability where, under certain circumstances, system
integrity may be compromised. These may be in the form of improper file or privilege
management.
• Corrects a core dump problem that occurs when output of the lint command for nonexisting
file is supplied to error.
• Fixes many small problems in dsfmgr.
• Fixes various problems in the dbx and object file tools dbx, ostrip, strip, mcs, dis, cord, file,
and stdump.
• Provides protection against a class of potential security vulnerabilities called buffer overflows.
Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged
program and possibly execute commands at the elevated privileges if the program file has
the setuid privilege. This patch allows a system administrator to enable memory management
protections that limit potential buffer overflow vulnerabilities.
• Corrects a problem that occurs when stdin, stdout and stderr are closed and cfg_connect
fails to connect to cfgmgr.
Patch 27069.00
OSFPRINT540
• Provides LPD support for the following HP Printers:
— Color LaserJet 4650
— Color LaserJet 9500
Summary of Base Operating System Patches 139