I am not able to configure GUI on Intel 82845 chipset P-4 Motherboard (VINTRON) with onboard AGP. On Board AGP is Intel 845. I am able to boot with CD then at the time of Installation I am able to see graphics very well. But after installation When ever I try to start KDE or GNOME by giving command Startx it gives some error I have already tried to install Mandrake 8.1 and Mandrake 8.2 same problem is there. Is there any problem with Onboard AGP or does Mandrake Linux 8.2 Supports it.
Rakesh ----- Original Message ----- From: "Raju Mathur" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]> Sent: Thursday, October 17, 2002 9:36 PM Subject: [ilugd]: (fwd) [RHSA-2002:206-12] New kernel fixes local security issues > [Many stock pre-2.4.19 kernels have various levels of problems. > Please upgrade to 2.4.19, or to a kernel with backported patches > supplied by your distribution vendor -- Raju] > > This is an RFC 1153 digest. > (1 message) > ---------------------------------------------------------------------- > > Message-Id: <[EMAIL PROTECTED]> > From: [EMAIL PROTECTED] > To: [EMAIL PROTECTED], [EMAIL PROTECTED] > Subject: [RHSA-2002:206-12] New kernel fixes local security issues > Date: Thu, 17 Oct 2002 06:11 -0400 > > --------------------------------------------------------------------- > Red Hat, Inc. Red Hat Security Advisory > > Synopsis: New kernel fixes local security issues > Advisory ID: RHSA-2002:206-12 > Issue date: 2002-09-23 > Updated on: 2002-10-15 > Product: Red Hat Linux > Keywords: > Cross references: > Obsoletes: RHBA-2002:110 > --------------------------------------------------------------------- > > 1. Topic: > > Updated kernel fixes local security issues and provides several updated > drivers to support newer hardware and fix bugs under Red Hat Linux 7.3. > > 2. Relevant releases/architectures: > > Red Hat Linux 7.3 - athlon, i386, i586, i686, noarch > Red Hat Linux 8.0 - athlon, i386, i586, i686, noarch > > 3. Problem description: > > The Linux kernel handles the basic functions of the operating system. A > security code audit of the 2.4 kernel found a number of possible local > security vulnerabilities which could allow a local user to obtain elevated > (root) privileges. The vulnerabilities were found in the ixj telephony card > driver, the pcilynx firewire driver, and the bttv video capture card driver. > > In addition, several drivers (e100, e1000, tg3n and IDE) have been updated > to support newer hardware for Red Hat Linux 7.3, and a number of bugs have > been fixed in IDE tapestreamer driver. > > All Red Hat Linux 7.3 and 8.0 users should upgrade to this errata kernel > which is not vulnerable to these security issues. > > NOTE: As with the 8.0 release, IDE DMA on CD-ROM drives is disabled by > default. If you are sure that your CD-ROM drive is capable of IDE > DMA, place the following line in the /etc/modules.conf file: > > options ide-cd dma=1 > > Thanks to Silvio Cesare for finding the local security issues. > > 4. Solution: > > Before applying this update, make sure all previously released errata > relevant to your system have been applied. > > The procedure for upgrading the kernel manually is documented at: > > http://www.redhat.com/support/docs/howto/kernel-upgrade/ > > Please read the directions for your architecture carefully before > proceeding with the kernel upgrade. > > Please note that this update is also available via Red Hat Network. Many > people find this to be an easier way to apply updates. To use Red Hat > Network, launch the Red Hat Update Agent with the following command: > > up2date > > This will start an interactive process that will result in the appropriate > RPMs being upgraded on your system. Note that you need to select the kernel > explicitly on default configurations of up2date. > > 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): > > 73339 - apm locks up Asus A7N266VM (nForce chipset) > 74879 - aha152x driver broken > 71622 - cs4232 module is not auto-loaded on use > 75107 - boot time in /proc/stat is incorrect > 75113 - /proc/uptime shows wrong uptime (slightly) and idle time (totally) > 74589 - speedstep doesn't work on IBM ThinkPad T30 (pentium 4) > > 6. RPMs required: > > Red Hat Linux 7.3: > > SRPMS: > ftp://updates.redhat.com/7.3/en/os/SRPMS/kernel-2.4.18-17.7.x.src.rpm > ftp://updates.redhat.com/7.3/en/os/SRPMS/hwdata-0.14.1-1.src.rpm > ftp://updates.redhat.com/7.3/en/os/SRPMS/modutils-2.4.18-3.7x.src.rpm > > athlon: > ftp://updates.redhat.com/7.3/en/os/athlon/kernel-2.4.18-17.7.x.athlon.rpm > ftp://updates.redhat.com/7.3/en/os/athlon/kernel-smp-2.4.18-17.7.x.athlon.rp m > > i386: > ftp://updates.redhat.com/7.3/en/os/i386/kernel-2.4.18-17.7.x.i386.rpm > ftp://updates.redhat.com/7.3/en/os/i386/kernel-source-2.4.18-17.7.x.i386.rpm > ftp://updates.redhat.com/7.3/en/os/i386/kernel-doc-2.4.18-17.7.x.i386.rpm > ftp://updates.redhat.com/7.3/en/os/i386/kernel-BOOT-2.4.18-17.7.x.i386.rpm > ftp://updates.redhat.com/7.3/en/os/i386/modutils-2.4.18-3.7x.i386.rpm > > i586: > ftp://updates.redhat.com/7.3/en/os/i586/kernel-2.4.18-17.7.x.i586.rpm > ftp://updates.redhat.com/7.3/en/os/i586/kernel-smp-2.4.18-17.7.x.i586.rpm > > i686: > ftp://updates.redhat.com/7.3/en/os/i686/kernel-2.4.18-17.7.x.i686.rpm > ftp://updates.redhat.com/7.3/en/os/i686/kernel-smp-2.4.18-17.7.x.i686.rpm > ftp://updates.redhat.com/7.3/en/os/i686/kernel-bigmem-2.4.18-17.7.x.i686.rpm > ftp://updates.redhat.com/7.3/en/os/i686/kernel-debug-2.4.18-17.7.x.i686.rpm > > noarch: > ftp://updates.redhat.com/7.3/en/os/noarch/hwdata-0.14.1-1.noarch.rpm > > Red Hat Linux 8.0: > > SRPMS: > ftp://updates.redhat.com/8.0/en/os/SRPMS/kernel-2.4.18-17.8.0.src.rpm > ftp://updates.redhat.com/8.0/en/os/SRPMS/hwdata-0.48-1.src.rpm > > athlon: > ftp://updates.redhat.com/8.0/en/os/athlon/kernel-2.4.18-17.8.0.athlon.rpm > ftp://updates.redhat.com/8.0/en/os/athlon/kernel-smp-2.4.18-17.8.0.athlon.rp m > > i386: > ftp://updates.redhat.com/8.0/en/os/i386/kernel-2.4.18-17.8.0.i386.rpm > ftp://updates.redhat.com/8.0/en/os/i386/kernel-source-2.4.18-17.8.0.i386.rpm > ftp://updates.redhat.com/8.0/en/os/i386/kernel-doc-2.4.18-17.8.0.i386.rpm > ftp://updates.redhat.com/8.0/en/os/i386/kernel-BOOT-2.4.18-17.8.0.i386.rpm > > i586: > ftp://updates.redhat.com/8.0/en/os/i586/kernel-2.4.18-17.8.0.i586.rpm > ftp://updates.redhat.com/8.0/en/os/i586/kernel-smp-2.4.18-17.8.0.i586.rpm > > i686: > ftp://updates.redhat.com/8.0/en/os/i686/kernel-2.4.18-17.8.0.i686.rpm > ftp://updates.redhat.com/8.0/en/os/i686/kernel-smp-2.4.18-17.8.0.i686.rpm > ftp://updates.redhat.com/8.0/en/os/i686/kernel-bigmem-2.4.18-17.8.0.i686.rpm > ftp://updates.redhat.com/8.0/en/os/i686/kernel-debug-2.4.18-17.8.0.i686.rpm > > noarch: > ftp://updates.redhat.com/8.0/en/os/noarch/hwdata-0.48-1.noarch.rpm > > > > 7. Verification: > > MD5 sum Package Name > -------------------------------------------------------------------------- > 5c742d695efa74cce26a070a018561b6 7.3/en/os/SRPMS/hwdata-0.14.1-1.src.rpm > d0cf8ef64412c78c9d32da9d0cb9850d 7.3/en/os/SRPMS/kernel-2.4.18-17.7.x.src.rpm > 0414620fa83d72ffd9f128be2e4bf430 7.3/en/os/SRPMS/modutils-2.4.18-3.7x.src.rpm > 082114a540f7bd692476584e38c6cd5c 7.3/en/os/athlon/kernel-2.4.18-17.7.x.athlon.rpm > bd2fa5b6b721caf12dcea357304c008b 7.3/en/os/athlon/kernel-smp-2.4.18-17.7.x.athlon.rpm > cfdef58820f5d7701f4221c80a7c821b 7.3/en/os/i386/kernel-2.4.18-17.7.x.i386.rpm > 145d063537e3a34723d50e611cbd37a8 7.3/en/os/i386/kernel-BOOT-2.4.18-17.7.x.i386.rpm > 8d9a20e2f4d82cc262cab928910377fa 7.3/en/os/i386/kernel-doc-2.4.18-17.7.x.i386.rpm > 0344cc1d42651916fb91ed7a700f3f90 7.3/en/os/i386/kernel-source-2.4.18-17.7.x.i386.rpm > cddd8196a38dbff1a8e34429415670fb 7.3/en/os/i386/modutils-2.4.18-3.7x.i386.rpm > 576ceca80b035a10b942e6feb217c055 7.3/en/os/i586/kernel-2.4.18-17.7.x.i586.rpm > d9d2b3fa23ee4733b35fd730e9553625 7.3/en/os/i586/kernel-smp-2.4.18-17.7.x.i586.rpm > 3a3afd67620fc36de17876629398dceb 7.3/en/os/i686/kernel-2.4.18-17.7.x.i686.rpm > fe9a658e1e22defc3cf5e2134646a6eb 7.3/en/os/i686/kernel-bigmem-2.4.18-17.7.x.i686.rpm > 158c941a9b430581a7bcd23ec1398052 7.3/en/os/i686/kernel-debug-2.4.18-17.7.x.i686.rpm > f9e11d26c2ca35ef403656be882fb592 7.3/en/os/i686/kernel-smp-2.4.18-17.7.x.i686.rpm > 100b8e47ecde440cca8122a08fb59b81 7.3/en/os/noarch/hwdata-0.14.1-1.noarch.rpm > eb9d565f55332264a15afadfc2e2b1a6 8.0/en/os/SRPMS/hwdata-0.48-1.src.rpm > 11c9a0e4224f20712b24805fd4e5f0be 8.0/en/os/SRPMS/kernel-2.4.18-17.8.0.src.rpm > 0ccc7295596f093121f4e2ae9767ebd1 8.0/en/os/athlon/kernel-2.4.18-17.8.0.athlon.rpm > e0e77e845a0b2e491150cf4e892d6c24 8.0/en/os/athlon/kernel-smp-2.4.18-17.8.0.athlon.rpm > 47870d4e2b646a59c8ade167f38575e6 8.0/en/os/i386/kernel-2.4.18-17.8.0.i386.rpm > 9e38f1aeebbc862dcf050b936dcc781e 8.0/en/os/i386/kernel-BOOT-2.4.18-17.8.0.i386.rpm > 78734f41ea1ba399f0a7d60f7d46bb8f 8.0/en/os/i386/kernel-doc-2.4.18-17.8.0.i386.rpm > c869e31fdd68ae7b1beae942282717b4 8.0/en/os/i386/kernel-source-2.4.18-17.8.0.i386.rpm > 49a2d9c5add3431c395574c7456f5596 8.0/en/os/i586/kernel-2.4.18-17.8.0.i586.rpm > 69ece85c6df4002f7e071c4b210c204f 8.0/en/os/i586/kernel-smp-2.4.18-17.8.0.i586.rpm > f05ebe7ff48fea54ed013018f1133b5e 8.0/en/os/i686/kernel-2.4.18-17.8.0.i686.rpm > 9b9a868c08b100dbd5c1f7458fd5331d 8.0/en/os/i686/kernel-bigmem-2.4.18-17.8.0.i686.rpm > c8e06fe44752510d49ad227ab01f323c 8.0/en/os/i686/kernel-debug-2.4.18-17.8.0.i686.rpm > f5efa4f4d8db58a413a41bc66c13c3da 8.0/en/os/i686/kernel-smp-2.4.18-17.8.0.i686.rpm > d160a0e0aa78e76b5c9a7c229d516eb8 8.0/en/os/noarch/hwdata-0.48-1.noarch.rpm > > > These packages are GPG signed by Red Hat, Inc. for security. Our key > is available at: > http://www.redhat.com/about/contact/pgpkey.html > > You can verify each package with the following command: > rpm --checksig <filename> > > If you only wish to verify that each package has not been corrupted or > tampered with, examine only the md5sum with the following command: > rpm --checksig --nogpg <filename> > > > 8. References: > > http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.18 > > > Copyright(c) 2000, 2001, 2002 Red Hat, Inc. > > > ------------------------------ > > End of this Digest > ****************** > > -- > Raju Mathur [EMAIL PROTECTED] http://kandalaya.org/ > It is the mind that moves > > ================================================ > To unsubscribe, send email to [EMAIL PROTECTED] with unsubscribe in subject header. Check archives at http://www.mail-archive.com/ilugd%40wpaa.org > > ================================================ To unsubscribe, send email to [EMAIL PROTECTED] with unsubscribe in subject header. Check archives at http://www.mail-archive.com/ilugd%40wpaa.org