HP Tru64 UNIX and TruCluster Server Version 5.1B-5 Patch Summary and Release Notes (March 2009)

Modifies the prpasswdd and rpc.yppasswdd daemons to properly handle
/var/tcb/files on a file system from different from /var.
Fixes client login, su, rshd, edauth, and sshd2 hangs and long delays under
Enhanced Security, as well as some intermittent errors or failures seen with
prpasswdd or rpc.yppasswdd.
Corrects a problem in which logins in TruCluster environments using Enhanced
Security can hang on any member other than the one serving /var to CFS.
Fixes a problem in which group and other read privileges get stripped from
/etc/passwd when a user switches from enhanced to base security.
Corrects a problem on systems running Enhanced Security in which the command
edauth -R refuses to write user-profile entries to the root partition.
Corrects a problem that occurs when using C1crypt for password encryption on
Enhanced Security systems in which users are unable to change their passwords
and see the passwd command warning "Password not changed: failed to write
protected password entry."
Changes the use of the configuration file /etc/svc.conf to /etc/nsswitch.conf to allow
netgroup data to be provided from LDAP, rather than only from NIS.
Fixes problems with Enhanced Security user accounts that reference a template.
Patch 27013.00
OSFCDEAPPS540
Resolves security vulnerabilities within the X PixMap routines used in the IMG
library.
Corrects a potential security vulnerability where, under certain circumstances,
system integrity may be compromised. This may be in the form of improper file
access.
Corrects a problem in which dtcm dumps core when the following steps are taken:
1. Select a date
2. Choose Browse-Compare Calendars...
3. Press the Mail... button.
Fixes the dtcm warning message when selecting View –> Day in dtcm.
Resolves a potential buffer overflow within the X PixMap routines.
Patch 27014.00
OSFCDEDEV540
Fixes several potential security vulnerabilities where, under certain circumstances,
system integrity may be compromised when a buffer overflow occurs in the DtSvc
utility. Buffer overflows are sometimes exploited in an attempt to subvert the
142 Tru64 UNIX Patches