HP Tru64 UNIX and TruCluster Server Version 5.1B-6 Patch Summary and Release Notes

— LaserJet 4200
— LaserJet 4250
— LaserJet 4300
— LaserJet 4350
— LaserJet 9040
— LaserJet 9050
Fixes a problem with lpstat -o in handling hyphens in printer names. If there is a hyphen in
printer name, lpstat -o was interpreting it as a job-id instead of printer name.
Corrects a problem that exists with print jobs submitted on clusters that occurs when an
“on”attribute in /etc/printcap is specified for one node and a job is submitted on another
node.
Modifies lpd to fix /etc/hosts.lpd case sensitivity; for example, "node.domain" treated the
same as "Node.Domain."
Makes start-up scripts in /sbin/init.d world readable.
Improves printing (lpd) maintainability, including the addition of new DEBUG lpr.log
messages, a DEBUG message screening feature, and an improved remote printing
connection-retry scheme.
Fixes a problem in which job pages are missing when the jj printcap flag is set to 1.
Fixes a problem in which temporary files are left in root (/) when lpd gets bad file names
from /etc/printcap.
Provides new delay timers to address timing problems.
Provides a new syslog DEBUG message for lpr.log to debug bad remote job file names.
Fixes a problem that causes queues that use the lpf output filter (and potentially other output
filters) to hang when the print subsystem is used heavily; for example, 300 queues used
continuously.
Fixes an error in which remote job reprinting does not occur when needed.
Adds a new /etc/printcap option, sr, to suppress job reprinting.
Patch 27070.00
OSFRCS540
Corrects a potential security vulnerability where, under certain circumstances, system
integrity may be compromised. This may be in the form of improper file or privilege
management.
Patch 27071.00
OSFRIS540
Corrects a joind failover problem and an extracted RIS area issue.
Patch 27072.00
OSFSCCS540
Corrects a potential security vulnerability where, under certain circumstances, system
integrity may be compromised. This may be in the form of improper file or privilege
management.
Provides protection against a class of potential security vulnerabilities called buffer overflows.
Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged
program and possibly execute commands at the elevated privileges if the program file has
the setuid privilege. This patch allows a system administrator to enable memory management
protections that limit potential buffer overflow vulnerabilities.
140 Tru64 UNIX Patches