lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
From: psz at maths.usyd.edu.au (Paul Szabo)
Subject: Re: Compaq mount patch broken

Yesterday I wrote how using the patched /sbin/mount in

  T64V51B19-C0136901-15143-ES-20020817.tar

killed a running mountd with "User defined signal 1". I reported this to
Compaq support, and within 24 hours they had the solution:

> -------------------------------------------------------------------
> Sounds like /usr/sbin/mountd and /usr/sbin/mount are out of sync.
> 
> In the v51supportos stream, version 4.3.225.1 of /usr/sbin/mountd
> introduced the logic which sends the SIGUSR1 signal to mountd.  The
> corresponding change in mountd is version 4.2.152.1.
> 
> What versions of mountd and mount are provided in the patch?  What
> versions of mountd and mount are running on the customer system?
> ---------------------------------------------------------------------

The PK5/BL19 megapatch (t64v51b19as0005-20020411.tar, that I had not
installed) provides a replacement mountd of the "right" version. This
problem was caused by me attempting to install the latest security patch
"by hand", without the required megapatch.

Cheers,

Paul Szabo - psz@...hs.usyd.edu.au  http://www.maths.usyd.edu.au:8000/u/psz/
School of Mathematics and Statistics  University of Sydney   2006  Australia

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ