Bug 15085 - kernel update rpm md5 not OK
Summary: kernel update rpm md5 not OK
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Red Hat Linux
Classification: Retired
Component: kernel
Version: 6.1
Hardware: i586
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Michael K. Johnson
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2000-08-01 23:27 UTC by dbruno1
Modified: 2008-05-01 15:37 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2000-08-03 00:42:37 UTC
Embargoed:


Attachments (Terms of Use)

Description dbruno1 2000-08-01 23:27:36 UTC
I curently run RedHat 6.1.   I downloaded the security update under
RHSA-2000:037-05 from your  errata site.  This  included the kernel rpm
(for i586), source, header, etc.

Before I began the upgrade, I ran an integrity check (rpm -K --nopgp
kernel*  etc.) of the downloaded files.   The rpms report out: md5 GPG NOT
OK.  I downloaded the files several times (and used a mirror for the
kernel), andthe failures are consistent.

For the heck of it, I tried to upgrade the kernel source and headers
anyway, and got a segmentation fault.  I run rpm-3.0.4-0.48.

Is this a problem with the files at your site, or am I doing something very
wrong?  This isn't my first kernel upgrade, and I followed your kernel
upgrade instructions. 

Dennis Bruno

Comment 1 Bill Nottingham 2000-08-02 16:53:21 UTC
Do you have the Red Hat GPG key in your key ring?

Comment 2 dbruno1 2000-08-03 00:42:36 UTC
I ran --nopgp.  I was  doing md5 checking only.  

In any event, I imported the keys into my ring, and ithe rpm -K ran clean.

I guess I'm confused.  I thought that running --nopgp bypassed the key check,
and just checked the md5 checksum.

Any idea on the segmentation fault when upgrading the headers and source?

Comment 3 Michael K. Johnson 2000-08-04 20:24:22 UTC
You need   --nogpg
as well as --nopgp
if you do not want to check any public keys.


Note You need to log in before you can comment on or make changes to this bug.