Originally posted by: Smilin
Originally posted by: Syppion
While I agree that removing the security update is a bad idea, the blame for the conflict falls on Microsoft - not EA or DICE.
Apparently this 'bug' in kb917422 has been around since it's release, conflicting with several "low-key" applications. Fortunately Microsoft released a hotfix (
here) on the 19th.
I suspect the influx of bf2142 players (or EA's clout?) convinced Microsoft to release a hotfix. Either way, this problem is solved.
Heh. I highly doubt 2142 had anything to do with the fix since it was being worked on before 2142.
I know the guys who work on this stuff and they start pounding away at it the moment they find out. The people with the 'clout' to make this stuff happen are MS premier tech support customers. I've seen them get a fix within hours. Heck, depending on what they want done they can get changes made to the OS even when there isn't a bug. Had EA done any form of half-assed testing, the dev support guys at MS would certainly help them fix 2142 or the fix the update.
Often this stuff results from shenanigans that 3rd party apps are doing. We had once recently 06-41, 51 maybe? can't remember. Anyway it shifted where a particular .dll was loaded in memory. People using sloppy programming practices *ahem*sunjava*ahem* and hard coding memory allocations broke. In this case I don't know exactly what's getting broken but those "low-key" apps seem to be mostly CD/DVD copy protection software (which I hate) so I'm not crying much
That said, yes security updates can have regressions. This won't be the last time. Once they get rolled into a sp they have undergone full regression testing but security takes precedence when deciding to get them released.
I find it irresponsible that EA would tell consumers to remove a security update rather than: 1) Fixing 2142 or 2) Asking MS to fix the update. EA are grown ups. They know better. When SUN had problems with a security update and Java did they tell customers to remove the security update? No, they called MS. Fix was out within days.
This reminds me of the same $$ first mentality they had about the BF 1942 DOS attack..
You could send a request for info to a server but give the wrong return address (app layer here, not spoofed ip stuff). The server would send back the info to the victim. It allowed something like an 8 to 1 data ratio so a couple PCs could DOS attack big-iron servers this way. EA never fixed it until someone DOS attacked them with their own 1942 servers.
So can I get a couple confirmations the hotfix from MS fixes the issue without having to remove the security update? If so, I'll update the original post up top. Once EA releases a permanent fix or the MS fix gets rolled into a critical update (so everyone gets it via WU instead of manually) we'll let the sticky die off.