Thanks to everyone who replied.
The summary is that LOTS of people are having a problem with 105802-05
(and with its x86 counterpart 105803-05). So it's clearly a bug with this
patch.
At least three people have filed bug reports with Sun.
One of them was assigned BugID 4171550.
It seems that all we can do it wait until Sun released a fixed patch.
Which they will hopefully do soon!
(One could back out of the patch; but then one leaves oneself open to the
remote root exploits described in the CERT advisory!)
Thanks to:
Tim Evans <tkevans@eplrx7.es.dupont.com>
Dave Yearke <yearke@eng.buffalo.edu>
Charles Nguyen <ctn@umn.edu>
Michael Neef <Michael.Neef@neuroinformatik.ruhr-uni-bochum.de>
HCDEB@mead.com
Michael Pearlman <canuck@caam.rice.edu>
John D Groenveld <jdg117@elvis.arl.psu.edu>
Frank Fiamingo - Columbus <frank.fiamingo@ssds.com>
lauradel collins <lauradel@cs.uoregon.edu>
linda@crrel.usace.army.mil
Davin.
Original question:
>To: sun-managers@sunmanagers.ececs.uc.edu
>Subject: Problem with new tooltalk patch.
>
>Late last week, in response to the CERT tooltalk advisory (CA-98.11),
>I installed patch "105802-05 OpenWindows 3.6: tooltalk patch".
>
>Since then, our users have had problems logging in with CDE to some systems.
>Some of that went away when I patched those systems up to be more current in
>other patches too (but might still exist on some SS5's).
>
>Also, since doing that 105802-05 patch install, I am fairly regularly
>finding (and killing) CPU-bound /usr/dt/bin/rpc.ttdbserverd processes
>on our timeshare servers (headless, non-CDE xdm servers). (Those processes
>show NO system calls when truss'ed, and require a kill -9 to kill them.)
>
>Any advice would be appreciated.
>Are others also having a problem with 105802-05?
-- Davin Milun E-mail: milun@cs.Buffalo.EDU milun@acm.org Fax: (716) 645-3464 WWW: http://www.cs.buffalo.edu/~milun/
This archive was generated by hypermail 2.1.2 : Fri Sep 28 2001 - 23:12:48 CDT