Gentoo Logo
Gentoo Spaceship




Note: Due to technical difficulties, the Archives are currently not up to date. GMANE provides an alternative service for most mailing lists.
c.f. bug 424647
List Archive: gentoo-security
Navigation:
Lists: gentoo-security: < Prev By Thread Next > < Prev By Date Next >
Headers:
To: gentoo-security@g.o
From: Ryan Voots <simcop2387@...>
Subject: Re: MD5 mismatch for XFree86 patch
Date: Fri, 5 Dec 2003 10:41:05 -0500
On Fri, 5 Dec 2003 09:33:32 -0600
"Russell Adams" <RLAdams@...>  Add to Address Book wrote:

> This is the way HLUG and I caught the trojaned libpcap/tcpdump sources
> on the home site a while back. (http://www.adamsinfoserv.com/trojan.html)
> 
> MD5's were good on the mirrors, but failed when downloading from the
> home site.
> 
> To be thorough, check the validity of the files you download from
> multiple sources. Switch mirrors and then force a download from the
> home site for that package and watch your checksums.
> 
> Russell
> 

you could also do a tar -tv[zj]f /usr/portage/distfiles/<file> to see if the archive is even good, if not you'll get errors from gzip or bzip2 at some point, but just make sure you backed up in case there is some exploit with gzip or bzip2 that its trying to do


-----BEGIN GEEK CODE BLOCK----
Version: 3.1
GCS/CM/E/M/S/O d--(-) s:+>:-
a--->-->->>+>++>+++$ C+++>++++$ UL++++>++++$
P+++>++++$ L++++>++++$ !E-? W++>++$>+++$
N++>* !o? !K? w--->---$ O-- M-@ !V--? PS+++(++(+((-))))
PE Y+(++)@ PGP+++(++) t+++>+++$ 5--(-)@ X++@>+++@
R+(++)@ tv+++@>++@ b+>++ DI++++ D+++@ G+++>++++ 
e>+$>++$>+++$>++++$>+++++$ h+>++ r*(--(++))@ !y+>-->->+++@
-----END GEEK CODE BLOCK-----
Attachment:
pgp4J0hlcjGsh.pgp (PGP signature)
References:
Re: MD5 mismatch for XFree86 patch
-- Ryan Voots
Re: MD5 mismatch for XFree86 patch
-- Russell Adams
Navigation:
Lists: gentoo-security: < Prev By Thread Next > < Prev By Date Next >
Previous by thread:
Re: MD5 mismatch for XFree86 patch
Next by thread:
Re: MD5 mismatch for XFree86 patch
Previous by date:
Re: MD5 mismatch for XFree86 patch
Next by date:
[Fwd: [USSG-Group] [iSEC] Linux kernel do_brk() vulnerability details (fwd)]


Updated Jun 17, 2009

Summary: Archive of the gentoo-security mailing list.

Donate to support our development efforts.

Copyright 2001-2013 Gentoo Foundation, Inc. Questions, Comments? Contact us.