search for: checksig

Displaying 20 results from an estimated 124 matches for "checksig".

2008 Aug 25
5
Yum corrupting RPMs
Hi list, Trying to upgrade someone's workstation here to 5.2 (was installed from a 5.0 DVD I think). The RPMs on our internal mirror are in-tact and pass a 'rpm -- checksig' test, yet when I run a 'yum upgrade' a large portion of them are corrupted and fail the GPG check. This seems to be isolated to yum, as downloading the RPM directly via FTP with wget or lftpget provides an RPM that *does* pass the GPG check. I have upgraded key packages to the la...
1999 Oct 21
1
[RHSA-1999:042-01] screen defaults to not using Unix98 ptys
...06408bae76bf581d2bf69 screen-3.9.4-3.i386.rpm 09277e5b10b709ac2d974b952cb29e9b screen-3.9.4-3.src.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig 'filename' If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg 'filename' 10. References: From mail@mail.redhat.com Oct 17:20:32 1999 -0400 Received: (qmail 1551 inv...
2001 Nov 06
1
RPM digital signature
I thought I'd install the binary RPM for Red Hat 7.1. Following the advice from the ReadMe I checked the GPG signature (sorry, I have very little idea what it is) of the .rpm files. Here is what I got. % rpm --checksig *.rpm R-base-1.3.1-3.i386.rpm: md5 GPG NOT OK R-recommended-1.3.1-1.i386.rpm: md5 (GPG) OK (MISSING KEYS: GPG#97D3544E) Does it indicate any problem? Thanks, Vadim -------------------------------------------------- DISCLAIMER This e-mail, and any attachments thereto, is intended only for use...
2000 May 31
1
[RHSA-2000:005-05] New majordomo packages available
...majordomo-1.94.5-2.i386.rpm 89e327c6c92acc97db34e541f34c0c67 6.1/sparc/majordomo-1.94.5-2.sparc.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: Thanks to Brock Tellier at btellier@USA.NET for noting the vulnerability in resen...
1999 Oct 21
1
...75ff7a sparc/wu-ftpd-2.6.0-1.sparc.rpm 7e30ea42e82908752b943621580f6f1c SRPMS/wu-ftpd-2.6.0-1.src.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 10. References: CERT Advisory CA-99-13 Multiple Vulnerabilities in WU-FTPD http://www.cert.org...
2000 Jun 14
0
Security Advisory: local ROOT exploit in BRU
...c/emacs-leim-20.7-1.sparc.rpm a6ae2d4b6afcb0022d59183b12472361 6.2/sparc/emacs-nox-20.7-1.sparc.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: http://www.securityfocus.com/bid/1125 From mail@mail.redhat.com Jun 19:00:12...
2000 May 19
1
[RHSA-2000:028-02] Netscape 4.73 available
...icator-4.73-1.i386.rpm aea9965093a8202196f637e8385035d9 6.2/i386/netscape-navigator-4.73-1.i386.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: N/A
1999 Aug 27
0
2.0.38 fixes a glitch
...m-utils-6.0.1s11-1.4.2.sparc.rpm 0aa30be9b859eca2e003bb983c4839f5 SRPMS/am-utils-6.0.1s11-1.4.2.src.rpm These packages are PGP signed by Red Hat Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nopgp <filename> 10. References: N/A Cristian - -- - -------------------------------------------------------------...
2000 Aug 09
1
[RHSA-2000:048-06] Updated mailx and perl packages are now available.
...sparc/mailx-8.1.1-16.sparc.rpm fa63980aed3bdd2c9c14dcca6745c56c 6.2/sparc/perl-5.00503-11.sparc.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: http://www.securityfocus.com/vdb/bottom.html?vid=1547 http://bugs.perl.org/perlbu...
2006 Sep 27
1
Debug file for -42.0.2 i686 MD5 NOT OK
Downloaded from http://vault.centos.org/debuginfo/4/i386/ The file I received was 23-Aug-2006 06:18 298M. My ls showed 312932522. I presume this is an approximate match. Validation failed. # rpm --checksig kernel-debuginfo-2.6.9-42.0.2.EL.i686.rpm kernel-debuginfo-2.6.9-42.0.2.EL.i686.rpm: sha1 MD5 NOT OK The i586 file validates OK. TIA -- Bill
2000 Aug 08
0
[RHSA-2000:050-01] mopd-linux buffer overflow
...pd-linux-2.5.3-15.i386.rpm 8f54499ea64372f17a5707d4615edddc 6.2/sparc/mopd-linux-2.5.3-15.sparc.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: http://www.openbsd.org/security.html#27 Thanks to Matt Power <mhpower@MIT.EDU...
2000 Aug 08
0
[RHSA-2000:049-02] Remote file access vulnerability in ntop
...b 6.2/i386/ntop-1.3.1-1.i386.rpm e6415fc286119023f321ce7e5bdbfce9 6.2/sparc/ntop-1.3.1-1.sparc.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: N/A Copyright(c) 2000 Red Hat, Inc. ________________________________________...
2000 Aug 08
0
[RHSA-2000:047-03] New umb-scheme packages are available.
...6/umb-scheme-3.2-12.i386.rpm 372da7c9c61ad6f242e5eeff9d6f943b 6.2/sparc/umb-scheme-3.2-12.sparc.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: Thanks to Prasanth A. Kumar for pointing this error out. Copyright(c) 2000 Red...
2000 Aug 11
0
[RHSA-2000:052-02] Zope update
...2000-1.src.rpm 61e9f5fed71cbb784f2e1352cb98fb1a 6.2/noarch/Zope-Hotfix-DTML-08_09_2000-1.noarch.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: http://www.zope.org/Products/Zope/Hotfix_08_09_2000/security_alert Copyright(c)...
2000 Aug 03
0
[RHSA-2000:030-03] Updated mailman packages are available.
...MS/mailman-2.0beta5-1.src.rpm 53561915ca8b245b98bd78f3e3a8fd9d 3.2/i386/mailman-2.0beta5-1.i386.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: N/A Copyright(c) 2000 Red Hat, Inc.
2000 Jul 03
0
[RHSA-2000:016-03] Multiple local imwheel vulnerabilities
...Package Name -------------------------------------------------------------------------- N/A These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: N/A
2000 Jul 06
0
[RHSA-2000:042-01] BitchX denial of service vulnerability
.../i386/BitchX-1.0c16-1.i386.rpm 2317c93fa3ed3a0ee0566ecd1c6d98ad 6.2/sparc/BitchX-1.0c16-1.sparc.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: Thanks to Colten Edwards <edwards@bitchx.dimension6.com> for making us awar...
2000 Jun 07
0
[RHSA-2000:032-02] kdelibs vulnerability for suid-root KDE applications
...6.2/SRPMS/kwintv-0.7.5-2.src.rpm 72e10bb7dfb96a7c655a7f3db79d47a1 6.2/i386/kwintv-0.7.5-2.i386.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: N/A
2000 Jun 22
0
[RHSA-2000:038-01] Zope update
...6_16_2000-1.src.rpm dee87d4dd038b1a10f6e46a0883197b3 6.2/noarch/Zope-Hotfix-06_16_2000-1.noarch.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: http://www.zope.org/Products/Zope/Hotfix_06_16_2000/security_alert
2000 May 09
0
[RHBA-2000:021-01] gnuplot
.../i386/gnuplot-3.7.1-5.i386.rpm 3eb615e63b37108f75db4819f03c02df 6.2/sparc/gnuplot-3.7.1-5.sparc.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 10. References: N/A