Mailinglist Archive: opensuse-security (192 mails)

< Previous Next >
Re: [suse-security] kernel exploit update?
  • From: Tor Sigurdsson <tosi@xxxxx>
  • Date: Fri, 19 May 2000 00:04:30 +0000
  • Message-id: <20000519000430.A26408@xxxxxxxxxxxxxxxxx>

Presumably ( at least that's the case with the k_eide.rpm ) the
package overwrites the existing kernel hierarchy. Thus, you'd use

rpm -ihv --force k_laptop.rpm
or
rpm -Uhv --force k_laptop.rpm

( if the latter fails somewhere, you'll have an unbootable system,
so I'd vote for the former. )

Regards,
Tor Sigurdsson
tosi@xxxxxxxxxxxxxxxxxxxx
Network Administrator, Linux Administrator and RHCE


On Thu, May 18, 2000 at 08:13:04PM +0200, Markus Faber wrote:
> Hi List!
>
> This is maybe a silly question, but after the latest mail from suse
> about the new security hole in kernel < 2.2.15 I downloaded the file
> k_laptop.rpm (which isn't mentioned in the mail and there is no md5sum
> either but I wanted to use apm..) and tried to update via yast - install
> packages -> failure. Then I tried to update using rpm (rpm -U
> k_laptop.rpm) -> failure.
>
> Now I suspect I have to recompile my kernel with the provided file, is
> this correct? (using patch)
> I'm using suse 6.3, kernel 2.2.13
>
> thanx in advance
> Markus Faber
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: suse-security-unsubscribe@xxxxxxxx
> For additional commands, e-mail: suse-security-help@xxxxxxxx

--
______
/---------------------------------------\ \
| Þór Sigurðsson | Tor Sigurdsson | t |
| Netmaður | Network Specialist | o |
|-----------------------------------------| s |
| tosi@xxxxx | i |
\---------------------------------------/_____/
\ RHCE / /
\___________________________________/_____/

< Previous Next >
References