Several potential security vulnerabilities have been identified in
the HP Tru64 UNIX operating system that may allow non-privileged
users to gain unauthorized (root) access. This may be in the form of 
local security domain risks.

The potential security vulnerability in the following commands
have been corrected:

    o SSRT2257 /usr/bin/su (Severity - High)
    o SSRT2190 /usr/bin/chsh (Severity - Medium)
    o SSRT2192 /usr/bin/passwd (Severity - Medium)
    o SSRT2259 /usr/bin/chfn (Severity - Medium)
    o SSRT2262 /usr/tcb/bin/dxchpwd (Severity - Medium)
    o SSRT2275 /usr/bin/rdist (Severity - Medium)
               /usr/bin/deliver (Severity - Medium)
               /usr/bin/mh/inc (Severity - Medium)
               /usr/bin/mh/msgchk (Severity - Medium)
               /usr/sbin/imapd (severity - Medium)
    o SSRT2270 BIND resolver glibc(Severity - High)
    o SSRT2277 /usr/bin/ypmatch (Severity - Medium)
    o SSRT2261 /usr/sbin/traceroute (Severity - Medium)
    o SSRT2309 rpc XDR_ARRAY (Severity - High)


