HP Tru64 UNIX and TruCluster Server Version 5.1B-5 Patch Summary and Release Notes (March 2009)

Corrects a kernel memory fault that can happen when running applications that
use the Cray Intra-Node Shared Memory library.
Prevents a potential process (not system) hang seen when a system comes under
heavy memory load with monolithic memory use. (Gigabyte-scale single objects.)
Prevents a kernel memory fault when running with protection on the 128-byte
bucket an action that should only be undertaken as directed by HP customer
support personnel.
Addresses a situation in which a taso-compiled binary is unable to allocate more
memory after performing a series of mmap calls.
Corrects a problem that causes hwmgr to dump core when performing
environmental testing and using hwmgr to verify that a particular sensor's status
would change from OK to Fault.
Provides the correct labels to the audit subsystem for mach events.
Fixes a memory management fault and panic in UFS.
Addresses two problems with the NFS server:
A potential crash during a concurrent read and truncate operation on an AdvFS
file.
A potential crash with malformed or malicious READDIR[PLUS] version 3
RPCs.
Improves ufs_invalidate() handling of fractional pages.
Corrects the cause of an "ialloc: dup alloc" panic.
Increases the character limit in file property lists from 245 to 255.
Improves I/O performance by reducing kernel locking overhead.
Addresses system problems that can occur when the system is under heavy I/O
load or low memory conditions.
Provides protection against a class of potential security vulnerabilities called buffer
overflows. Buffer overflows are sometimes exploited in an attempt to subvert the
function of a privileged program and possibly execute commands at the elevated
privileges if the program file has the setuid privilege. This patch allows a system
administrator to enable memory management protections that limit potential
buffer overflow vulnerabilities.
Prevents a kernel memory fault panic that occurs when the audit daemon is set to
periodically dump the kernel audit buffers to the audit log file (auditd -d freq).
Corrects conditions that cause "blkfree: freeing free block" and "blkfree: freeing
free frag" panics.
Allows systems configured to use NTP to keep accurate time regardless off whether
the NTP daemon is running.
Corrects a condition that can cause a panic in audit_rec_build when auditing execve
with the exec_argp or exec_envp audit style enabled.
3.4 Summary of Base Operating System Patches 125