dcsimg
Page 2 of 2 FirstFirst 12
Results 11 to 20 of 20

Thread: MS releases 4 patches for April 2004

  1. #11
    AO's Resident Redneck The Texan's Avatar
    Join Date
    Aug 2003
    Location
    Texas
    Posts
    1,539
    just go to your windows update page and get all your updates from there.
    Git R Dun - Ty
    A tribe is wanted

  2. #12
    Banned
    Join Date
    Nov 2003
    Posts
    1,161
    Measure twice code once

  3. #13
    Senior Member
    Join Date
    Feb 2004
    Posts
    373
    !mitationRust, I tried to download the pdf, but you have to be a member or have a subscribtion to access it. Was the pdf informative or pretty bland? Are the bugs you are talking about, kernel device driver bugs? Would they be considered critical?

  4. #14
    Banned
    Join Date
    Nov 2003
    Posts
    1,161
    Originally posted here by devpon
    !mitationRust, I tried to download the pdf, but you have to be a member or have a subscribtion to access it. Was the pdf informative or pretty bland? Are the bugs you are talking about, kernel device driver bugs? Would they be considered critical?
    catch originally posted this pdf here.
    http://www.antionline.com/showthread...ight=catch+PDF

    I have a copy on a data CD around here, I'll do some plundering around but like he said it's too big for the site but I'll find a way to post it when I find it. Did you sign up for the site? That site has more intresting PDF's then the NSC site.

  5. #15
    Senior Member
    Join Date
    Feb 2004
    Posts
    373
    !mitationRust, no I haven't signed up yet, but thanks for the extra info.

  6. #16
    Senior Member
    Join Date
    Aug 2001
    Posts
    485
    Hmm, interesting point about Windows update ......

    A lot of the fixes it installs are only about 300K or so, but during the installation phase they link to wxpsp2.windowsupdate.com to download the real fix, which is considerably bigger.
    I can imagine this causing a lot of confusion out there.

    On a dial up connection, this means that the installation phase can appear to hang for at least 30 mins or so. Seen the symptoms at a friends house, who had given up on trying to update his copy of WinXP.

    It would be nice if MS gave some warning as to what was going on, like we are now going to download the real 1.5Mb fixes - took 2 hours in his case

  7. #17
    Member
    Join Date
    Oct 2001
    Posts
    76
    How many of these linux bugs that are up to 1.8 years old have had advisories, and have been actively exploited in the wild? Not all bugs are security issues either, some will be annoyances, others will be more serious. No code is perfect and bugs will never go away no matter who develops the software and regardless of the development model. However, once a vendor is notified of a serious flaw that allows code execution, have been given sufficient time to develop and provide a solution, and the information has been made public, is it not reasonable to expect a patch?

    The CHM bug that allows code execution has been known about for ages, and has been public knowledge since december 30. There are no workarounds, and no fixes. With the current patch schedule, it's been ignored or missed 4 times. It's a bit strange that a vulnerability like this has been unpatched for so long when microsoft are trying to convince world+dog they do actually take security seriously. This is the point I was trying to make, and it wasn't just another 'have a go at microsoft for the sake of it' post. There's far too many of them already, mostly for no good reason at all.

    Are there any alternative download locations for that PDF file? It does look interesting going by the summary, and I've not got a subscription to that site.

  8. #18
    Banned
    Join Date
    Nov 2003
    Posts
    1,161
    Originally posted here by Beryllium9
    No code is perfect and bugs will never go away no matter who develops the software and regardless of the development model.
    Code has to be perfect or damn near when dealing with nuclear silo's in america.
    Example:Google XTS-200 systems "those systems are so validated that they never need patching."

    Like catch stated, AO is not uploading it,it's too big. However I did go on the record saying that I would find away to upload it.....but you will have to download the PDF to get the full effect of the charts and graphs that are presented in the PDF.

  9. #19
    Banned
    Join Date
    Apr 2004
    Posts
    843
    Originally posted here by Draco980172
    I applaud MS's attempt to reduce the number of patches, but it seems to me like including this many fixes in a single patch is just asking for trouble. What if a single fix in this patch breaks something you need. Then you have to uninstall the whole patch. I think they should at least make these readily available as separate patches to mitigate the possible problem that could occur.
    Why is this such a surprise to peaple? They have always managed to package things in thier OS dozens of things which you will most likely never use... but they do this to suit the needs of the some 80% of cyberspace running thier OS. They are with the majority & the majority is lazy and would do anything BUT look through at what they may need to patch up on... vulnerabilities possably months often even years old. They are just to busy to browse up on it all. So once agian they are packing stuff together and sending out these patches all at once to suit the needs of the average fat lard-ass S.O.B. who can hardly breath or get up off the couch... yet alone walk around a few inches except when it comes to food.

  10. #20
    Senior Member kr5kernel's Avatar
    Join Date
    Mar 2004
    Posts
    347
    I ran the april updates ona few computers at work...33% of them wont login correctly after the reboot. They are all running windows 2000 and are cloned dell machines. AFter 2 hours, one logged in and I was able to see the 'system' process eating up 100% cpu usage....not system idle, just 'system'. Ended up re-installing the machines. This has been all over microsoft dev forums...I would advise holding off.....now back to that lsass exploit.......
    kr5kernel
    (kr5kernel at hotmail dot com)
    Linux: Making Penguins Cool Since 1994.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •