FAQ Search Today's Posts Mark Forums Read
» Video Reviews

» Linux Archive

Linux-archive is a website aiming to archive linux email lists and to make them easily accessible for linux users/developers.


» Sponsor

» Partners

» Sponsor

Go Back   Linux Archive > CentOS > CentOS

 
 
LinkBack Thread Tools
 
Old 12-18-2009, 06:46 AM
ken
 
Default unverified files in 5.4

Hey, Gang!

To ensure that a file hasn't been corrupted or tampered with, you can
use rpm to verify the package it came from. Well, I found this:


rpm -Vv util-linux
....
........ /usr/bin/cal
S.?..... /usr/bin/chfn
........ /usr/bin/chrt
S.?..... /usr/bin/chsh
....

Does anyone else get this? And what would be the proper course of
action at this point?

Thanks mucho.

--
Without music, life would be a mistake.
--Friedrich Nietzsche

_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
 
Old 12-18-2009, 02:53 PM
Peter Kjellstrom
 
Default unverified files in 5.4

On Friday 18 December 2009, ken wrote:
> Hey, Gang!
>
> To ensure that a file hasn't been corrupted or tampered with, you can
> use rpm to verify the package it came from. Well, I found this:
>
>
> rpm -Vv util-linux
> ....
> ........ /usr/bin/cal
> S.?..... /usr/bin/chfn
> ........ /usr/bin/chrt
> S.?..... /usr/bin/chsh

I didn't see this on a clean install, but..

S means size differs from rpmdb entry, ? means the md5sum test could not be
done. I'm guessing interference from prelink. If you can, turn it off(*) and
re-run the test.

(*) change to "PRELINKING=no" in /etc/sysconfig/prelink and
run /etc/cron.daily/prelink.

/Peter
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
 
Old 12-20-2009, 07:16 AM
ken
 
Default unverified files in 5.4

On 12/18/2009 10:53 AM Peter Kjellstrom wrote:
> On Friday 18 December 2009, ken wrote:
>> Hey, Gang!
>>
>> To ensure that a file hasn't been corrupted or tampered with, you can
>> use rpm to verify the package it came from. Well, I found this:
>>
>>
>> rpm -Vv util-linux
>> ....
>> ........ /usr/bin/cal
>> S.?..... /usr/bin/chfn
>> ........ /usr/bin/chrt
>> S.?..... /usr/bin/chsh
>
> I didn't see this on a clean install, but..
>
> S means size differs from rpmdb entry, ? means the md5sum test could not be
> done. I'm guessing interference from prelink. If you can, turn it off(*) and
> re-run the test.
>
> (*) change to "PRELINKING=no" in /etc/sysconfig/prelink and
> run /etc/cron.daily/prelink.
>
> /Peter

Thanks, Peter! I don't understand why prelink would affect the rpm
database, but turning prelink off and then back on cleared those flags.
Yes, mine was an upgrade from 5.3.


--
Without music, life would be a mistake.
--Friedrich Nietzsche
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Sun Dec 20 10:30:02 2009
Return-path: <bounce-debian-devel=tom=linux-archive.org@lists.debian.org>
Envelope-to: tom@linux-archive.org
Delivery-date: Sun, 20 Dec 2009 09:52:57 +0200
Received: from liszt.debian.org ([82.195.75.100]:43141)
by s2.java-tips.org with esmtps (TLSv1:AES256-SHA:256)
(Exim 4.69)
(envelope-from <bounce-debian-devel=tom=linux-archive.org@lists.debian.org>)
id 1NMGb3-0005TU-0V
for tom@linux-archive.org; Sun, 20 Dec 2009 09:52:57 +0200
Received: from localhost (localhost [127.0.0.1])
by liszt.debian.org (Postfix) with QMQP
id E1FF413A67E4; Sun, 20 Dec 2009 08:18:07 +0000 (UTC)
Old-Return-Path: <debbugs@rietz.debian.org>
X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on liszt.debian.org
X-Spam-Level:
X-Spam-Status: No, score=-6.0 required=4.0 tests=LDO_WHITELIST,
RCVD_IN_DNSWL_LOW autolearn=failed version=3.2.5
X-Original-To: lists-debian-devel@liszt.debian.org
Delivered-To: lists-debian-devel@liszt.debian.org
Received: from localhost (localhost [127.0.0.1])
by liszt.debian.org (Postfix) with ESMTP id 7D85E13A67DF
for <lists-debian-devel@liszt.debian.org>; Sun, 20 Dec 2009 08:01:57 +0000 (UTC)
X-Virus-Scanned: at lists.debian.org with policy bank en-ht
X-Amavis-Spam-Status: No, score=-6.5 tagged_above=-10000 required=5.3
tests=[BAYES_00=-2, BODY_8BITS=1.5, LDO_WHITELIST=-5,
RCVD_IN_DNSWL_LOW=-1] autolearn=ham
Received: from liszt.debian.org ([127.0.0.1])
by localhost (lists.debian.org [127.0.0.1]) (amavisd-new, port 2525)
with ESMTP id U2QG3uM3T5S2 for <lists-debian-devel@liszt.debian.org>;
Sun, 20 Dec 2009 08:01:50 +0000 (UTC)
Received: from rietz.debian.org (rietz.debian.org [140.211.166.43])
by liszt.debian.org (Postfix) with ESMTP id EF3B113A67C9;
Sun, 20 Dec 2009 08:01:49 +0000 (UTC)
Received: from debbugs by rietz.debian.org with local (Exim 4.63)
(envelope-from <debbugs@rietz.debian.org>)
id 1NMGf3-0004NU-Di; Sun, 20 Dec 2009 07:57:05 +0000
X-Loop: owner@bugs.debian.org
Subject: Bug#561773: ITP: islamic-menus -- Islamic menu categories for applications under GNOME and KDE
Reply-To: =?UTF-8?Q?=D8=A3=D8=AD=D9=85=D8=AF_?= =?UTF-8?Q?=D8=A7=D9=84=D9=85=D8=AD=D9=85=D9=88=D8=AF=D9= 8A?= <aelmahmoudy@users.sourceforge.net>, 561773@bugs.debian.org
Resent-From: =?UTF-8?Q?=D8=A3=D8=AD=D9=85=D8=AF_?= =?UTF-8?Q?=D8=A7=D9=84=D9=85=D8=AD=D9=85=D9=88=D8=AF=D9= 8A?= <aelmahmoudy@users.sourceforge.net>
Resent-To: debian-bugs-dist@lists.debian.org
Resent-CC: debian-devel@lists.debian.org, <wnpp@debian.org>, =?UTF-8?Q?"=D8=A3=D8=AD=D9=85=D8=AF_?= =?UTF-8?Q?=D8=A7=D9=84=D9=85=D8=AD=D9=85=D9=88=D8=AF=D9= 8A"?= <aelmahmoudy@users.sourceforge.net>
X-Loop: owner@bugs.debian.org
Resent-Date: Sun, 20 Dec 2009 07:57:02 +0000
Resent-Message-ID: <handler.561773.B.126129541914613@bugs.debian.or g>
X-Debian-PR-Message: report 561773
X-Debian-PR-Package: wnpp
X-Debian-PR-Keywords:
Received: via spool by submit@bugs.debian.org id=B.126129541914613
(code B ref -1); Sun, 20 Dec 2009 07:57:02 +0000
Received: (at submit) by bugs.debian.org; 20 Dec 2009 07:50:19 +0000
Received: from out.tedata.net.eg ([212.103.160.61])
by rietz.debian.org with esmtp (Exim 4.63)
(envelope-from <aelmahmoudy@users.sourceforge.net>)
id 1NMGYU-0003jv-U7
for submit@bugs.debian.org; Sun, 20 Dec 2009 07:50:19 +0000
Received: (qmail 23586 invoked from network); 20 Dec 2009 07:50:11 -0000
Received: by simscan 1.4.0 ppid: 23417, pid: 23419, t: 7.5097s
scanners: regex: 1.4.0 clamav: 0.94.2/m:51/d:9767 spam: 3.2.3
Received: from host-41.232.110.157.tedata.net (HELO ants) (nehadmohamed@[41.232.110.157])
(envelope-sender <aelmahmoudy@users.sourceforge.net>)
by out.tedata.net.eg (qmail-ldap-1.03) with SMTP
for <submit@bugs.debian.org>; 20 Dec 2009 07:50:03 -0000
Received: from localhost.localdomain (ants [127.0.0.1])
by ants (Postfix) with ESMTP id 4DA064041B;
Sun, 20 Dec 2009 09:50:03 +0200 (EET)
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
From: =?UTF-8?Q?=D8=A3=D8=AD=D9=85=D8=AF_?= =?UTF-8?Q?=D8=A7=D9=84=D9=85=D8=AD=D9=85=D9=88=D8=AF=D9= 8A?=
<aelmahmoudy@users.sourceforge.net>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Message-ID: <20091220075002.30453.28609.reportbug@localhost.lo caldomain>
X-Mailer: reportbug 4.7ubuntu1
Date: Sun, 20 Dec 2009 09:50:02 +0200
Delivered-To: submit@bugs.debian.org
Resent-Date: Sun, 20 Dec 2009 07:57:05 +0000
X-Rc-Spam: 2008-11-04_01
X-Rc-Virus: 2007-09-13_01
X-Rc-Spam: 2008-11-04_01
X-Mailing-List: <debian-devel@lists.debian.org> archive/latest/258059
X-Loop: debian-devel@lists.debian.org
List-Id: <debian-devel.lists.debian.org>
List-Post: <mailto:debian-devel@lists.debian.org>
List-Help: <mailto:debian-devel-request@lists.debian.org?subject=help>
List-Subscribe: <mailto:debian-devel-request@lists.debian.org?subject=subscribe>
List-Unsubscribe: <mailto:debian-devel-request@lists.debian.org?subject=unsubscribe>
Precedence: list
Resent-Sender: debian-devel-request@lists.debian.org
Content-Transfer-Encoding: quoted-printable

Package: wnpp
Severity: wishlist
Owner: "=D8=A3=D8=AD=D9=85=D8=AF =D8=A7=D9=84=D9=85=D8=AD=D9=85=D9=88=D8=AF=
=D9=8A" <aelmahmoudy@users.sourceforge.net>


* Package name : islamic-menus
Version : 1.0.1
Upstream Author : =D8=A3=D8=AD=D9=85=D8=AF =D8=A7=D9=84=D9=85=D8=AD=D9=85=
=D9=88=D8=AF=D9=8A <aelmahmoudy@users.sourceforge.net>
* URL : https://launchpad.net/islamic-menu
* License : GPL3+, CC-BY-SA
Programming Lang: N/A
Description : Islamic menu categories for applications under GNOME =
and KDE

This package installs desktop menus for grouping Islamic applications
on GNOME, KDE and other XDG menu-spec compliant desktop environments.



--=20
To UNSUBSCRIBE, email to debian-devel-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian=
.org
 
Old 12-20-2009, 07:49 AM
Peter Kjellstrom
 
Default unverified files in 5.4

On Sunday 20 December 2009, ken wrote:
> On 12/18/2009 10:53 AM Peter Kjellstrom wrote:
> > On Friday 18 December 2009, ken wrote:
...
> >> To ensure that a file hasn't been corrupted or tampered with, you can
> >> use rpm to verify the package it came from. Well, I found this:
> >>
> >> rpm -Vv util-linux
> >> ....
> >> ........ /usr/bin/cal
> >> S.?..... /usr/bin/chfn
...
> > S means size differs from rpmdb entry, ? means the md5sum test could not
> > be done. I'm guessing interference from prelink. If you can, turn it
> > off(*) and re-run the test.
...
> Thanks, Peter! I don't understand why prelink would affect the rpm
> database,

I'm quite sure that the database only stores the original "un-prelinked"
checksum and the it's up to the -V command to compensate if it finds a
prelinked binary (which apparently doesn't always work...).

> but turning prelink off and then back on cleared those flags.

Great :-)

/Peter

> Yes, mine was an upgrade from 5.3.
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
 

Thread Tools




All times are GMT. The time now is 10:56 PM.

VBulletin, Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
Content Relevant URLs by vBSEO ©2007, Crawlability, Inc.
Copyright 2007 - 2008, www.linux-archive.org