Microsoft Pulls Broken XP Update 478
Cally writes "Yahoo! reports that
Microsoft have pulled a Windows XP update from the Windows Update servers after it killed network access for some users of the claimed 600,000 who installed it. (Does this mean only 600,000 XP users trust Windows Update?) The story hints that the problem was something to do with VPN or IPSec drivers clashing with Symantec software - however I haven't found anything about this on the Microsoft KnowledgeBase (the link Yahoo provide goes to the generic support home page.) Anyone got more info?"
updated link (Score:4, Informative)
Link has a typo. (Score:3, Informative)
http://support.microsoft.com/default.aspx?scid=
Re:Link has a typo. (Score:2, Informative)
Re:Microsoft Security (Score:5, Informative)
""There were hundreds of thousands of people who downloaded this, and we know of only a handful of people who had the problem."
Re:Microsoft Security (Score:1, Informative)
What 600,000 people had anything 'fried'?
Article:
"There were hundreds of thousands of people who downloaded this, and we know of only a handful of people who had the problem."
Before you all complain about auto update... (Score:5, Informative)
The article says that since this wasn't a critical patch, just an 'improvement', auto update doesn't install it.
attribution (Score:5, Informative)
It wasn't just Symantec (Score:5, Informative)
I had NO symantec s/ware on my system, (I use Mcafee) and I lost all networking / internet access.
Also, the Yahoo article says that the update had to be removed which is bull$hit, the update could NOT be removed, and the only way to fix my system was to re-install and re-update Windoze.
MS said only a small number complained, well, I did, and a couple of days later the update was pulled, no reply to my email though, not even a thank you or aknowlegment - typical MS =O(
fLaMePr0oF
Re:If only they had apt-get (Score:5, Informative)
sub=dists/latest/binary-i386
dt=`date +"%y%m%d_%H%M%S"`
cd
dpkg-scanpackages latest
grep -Ex "Filename: latest/.+" $sub/Packages | sed "s/Filename: latest\/\(.*\)/\1/" > old/L$dt
pushd $sub
rm Packages.gz
gzip Packages
popd
mv latest $dt
mkdir latest
for x in `cat old/L$dt`; do mv $dt/$x latest; done
if [[ `ls $dt | wc -l` -eq 0 ]]; then rm -r $dt; fi
If it blows up, I can easily roll back, and keep a history of all the intermedate versions.
Re:Why is this news? (Score:5, Informative)
But you're right, this does remind me of the kernel-that-never-should-have-been. I don't remember the version number (it was in the 2.4 series), but it was the one that corrupted your drives when you unmounted them. Of course, IIRC, that kernel wasn't pulled, the next version was just released very quickly. You can still get that kernel version if you really want to corrupt your data
Re:No (Score:3, Informative)
Nearly... it was 600,000 downloads, not 600,000 broken internet connections. According to the article only 'a handful' of the 600,000 who downloaded the patch had problems.
Re:That's the problem with automatic patching (Score:5, Informative)
Happens to even the best... (Score:1, Informative)
At least it wasn't a remote root exploit....
difficulty with software upgrades (Score:5, Informative)
keep a copy of the old software or to make full backups before upgrading the OS. Updating software is not trivial because it X + A + B is not equal X + B + A : the update A can and will in general change something of the modification B. After a few such operations it becomes very difficult to keep track about all possible
states the users can have on their machine.
My experiences from updates:
- even for modern Linux distributions, it is a good idea
to make full new installs rather then upgrading. I personally
always had problems with upgrades and almost never had problems
with full reinstalls.
- the OS X updates went all smooth so far. Still, I always upgrade
first one machine, wait to see if everything works fine before
updating the others.
- XP updates. No problem with vmware. Just keep an copy of the
old virtual machine around. If something screws up or one of
the software has decided to "upgrade" itself:
rm -rf winXPHome
mv old.winXPHome winXPHome
Virtual machines can also easily be copied from one machine to
an other.
Re:Software Update Services... (Score:2, Informative)
Telnet backspace echo
Man, I miss MUDing
Anyhow, to respond to your point - independently test bedding M$ updates certainly sounds like a good idea, but it either means 1- A seperate testbed machine or 2- using a standard machine for the process.
1- requires a fair ammount of money in the company, while 2- still has the possibility of nixxing one machine
It's still a good idea though
Re:Microsoft Security (Score:3, Informative)
Automatic Updates (Score:5, Informative)
For most people, it is the only way they're ever going to install updates on their computer. However, I've found production Windows 2000 servers with this feature enabled! This is at least the 2nd or 3rd time that I've read a story on /. about a Windows XP/2000 patch that was no good.
If you want to disable automatic updates on your computer, go to Control Panel->System->Automatic Updates tab and click the buttons to turn it off. You'll be better off picking what you want to update manually.
updated clickable ..... (Score:4, Informative)
Also don't install the 811493 fix (Score:5, Informative)
Re:It wasn't just Symantec (Score:5, Informative)
Comment removed (Score:2, Informative)
Re:What Happened (Score:3, Informative)
http://www.threedegrees.com/MessageBoards/ShowPos
Sorry
Re:Automatic Updates (Score:3, Informative)
Note that the Automatic Updates feature has three possible configurations.
1) Notify before downloading, notify before installing. This is the most conservative as user intervention is required twice along the way.
2) Download updates automatically, notify before installing. This is probably the best of the three options as it will trickle all updates down to your computer using unused bandwidth and then prompt you to install when everything is there. User still has FULL control over which patches get installed. This, by the way, is the default setting for Windows 2000 and Windows XP.
3) Download updates automatically, install them automatically on a preset schedule. For complete hands-off system administration, let Microsoft have full control over your machine. Not recommended but available anyway.
Of course it can be turned off completely or never installed in case you never want to deal with automatic patching.
greased turkey (Score:3, Informative)
The Fix (Score:5, Informative)
When the update occurs, XP makes a new restore point.
If you are ever having problems after an update... just roll the system back. Easy.
Restore Point Link [bcentral.co.uk]
DavaK
Oh no! The sky is falling! (Score:3, Informative)
I had a similar problem to this about a year ago, under Windows 2000. I was using a piece of firewall/intrusion detection software called BlackIce. They released a new version of BlackIce, I installed it. Then I installed a network/security update from Windows Update.. rebooted, and what do you know, my internet doesn't work anymore. I contact BlackIce's tech support (who was very helpful) and they admitted they were aware of an issue with that particular security update and their software not working together, and that they would be releasing a patch soon for BlackIce. Microsoft wasn't at fault for it, BlackIce was, and they admitted it.
Ironic I heard about it on Slashdot first (Score:2, Informative)
So, I read Slashdot and find the answer to my Windows support problem! That's certainly different :)
BTW, to those who said the only way to solve is to reinstall Windows, have you tried rollin gback to the last system checkpoint before the upgrade? (worked for me on XP)
The parent post is false to get modded up-see here (Score:4, Informative)
"This problem occurs because of a regression error in the Windows XP SP1 versions of the kernel files (Ntoskrnl.exe, Ntkrnlmp.exe, Ntkrnlpa.exe, and Ntkrpamp.exe) that were included in the original 811493 security update. On May 28, 2003, Microsoft released a revised version of the 811493 security update for Windows XP SP1 to address this problem."
It's fixed and is a non-issue. Moderators were had.
I had no problems with this and Symantec (Score:1, Informative)
If I hadn't checked
The problem must lie elsewhere and not with Symantec.