HP Tru64 UNIX and TruCluster Server Version 5.1B-5 Patch Summary and Release Notes (March 2009)
• Corrects a kernel memory fault that can happen when running applications that
use the Cray Intra-Node Shared Memory library.
• Prevents a potential process (not system) hang seen when a system comes under
heavy memory load with monolithic memory use. (Gigabyte-scale single objects.)
• Prevents a kernel memory fault when running with protection on the 128-byte
bucket — an action that should only be undertaken as directed by HP customer
support personnel.
• Addresses a situation in which a taso-compiled binary is unable to allocate more
memory after performing a series of mmap calls.
• Corrects a problem that causes hwmgr to dump core when performing
environmental testing and using hwmgr to verify that a particular sensor's status
would change from OK to Fault.
• Provides the correct labels to the audit subsystem for mach events.
• Fixes a memory management fault and panic in UFS.
• Addresses two problems with the NFS server:
— A potential crash during a concurrent read and truncate operation on an AdvFS
file.
— A potential crash with malformed or malicious READDIR[PLUS] version 3
RPCs.
• Improves ufs_invalidate() handling of fractional pages.
• Corrects the cause of an "ialloc: dup alloc" panic.
• Increases the character limit in file property lists from 245 to 255.
• Improves I/O performance by reducing kernel locking overhead.
• Addresses system problems that can occur when the system is under heavy I/O
load or low memory conditions.
• Provides protection against a class of potential security vulnerabilities called buffer
overflows. Buffer overflows are sometimes exploited in an attempt to subvert the
function of a privileged program and possibly execute commands at the elevated
privileges if the program file has the setuid privilege. This patch allows a system
administrator to enable memory management protections that limit potential
buffer overflow vulnerabilities.
• Prevents a kernel memory fault panic that occurs when the audit daemon is set to
periodically dump the kernel audit buffers to the audit log file (auditd -d freq).
• Corrects conditions that cause "blkfree: freeing free block" and "blkfree: freeing
free frag" panics.
• Allows systems configured to use NTP to keep accurate time regardless off whether
the NTP daemon is running.
• Corrects a condition that can cause a panic in audit_rec_build when auditing execve
with the exec_argp or exec_envp audit style enabled.
3.4 Summary of Base Operating System Patches 125