I am not able to configure GUI on Intel 82845 chipset P-4 Motherboard
(VINTRON) with onboard AGP.
On Board AGP is Intel 845. I am able to boot with CD then at the time of
Installation I am able to see graphics very well.
But after installation When ever I try to start KDE or GNOME by giving
command Startx it gives some error
I have already tried to install Mandrake 8.1 and Mandrake 8.2 same problem
is there.
Is there any problem with Onboard AGP or does Mandrake Linux 8.2  Supports
it.

Rakesh

----- Original Message -----
From: "Raju Mathur" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Thursday, October 17, 2002 9:36 PM
Subject: [ilugd]: (fwd) [RHSA-2002:206-12] New kernel fixes local security
issues


> [Many stock pre-2.4.19 kernels have various levels of problems.
> Please upgrade to 2.4.19, or to a kernel with backported patches
> supplied by your distribution vendor -- Raju]
>
> This is an RFC 1153 digest.
> (1 message)
> ----------------------------------------------------------------------
>
> Message-Id: <[EMAIL PROTECTED]>
> From: [EMAIL PROTECTED]
> To: [EMAIL PROTECTED], [EMAIL PROTECTED]
> Subject: [RHSA-2002:206-12] New kernel fixes local security issues
> Date: Thu, 17 Oct 2002 06:11 -0400
>
> ---------------------------------------------------------------------
>                    Red Hat, Inc. Red Hat Security Advisory
>
> Synopsis:          New kernel fixes local security issues
> Advisory ID:       RHSA-2002:206-12
> Issue date:        2002-09-23
> Updated on:        2002-10-15
> Product:           Red Hat Linux
> Keywords:
> Cross references:
> Obsoletes:         RHBA-2002:110
> ---------------------------------------------------------------------
>
> 1. Topic:
>
> Updated kernel fixes local security issues and provides several updated
> drivers to support newer hardware and fix bugs under Red Hat Linux 7.3.
>
> 2. Relevant releases/architectures:
>
> Red Hat Linux 7.3 - athlon, i386, i586, i686, noarch
> Red Hat Linux 8.0 - athlon, i386, i586, i686, noarch
>
> 3. Problem description:
>
> The Linux kernel handles the basic functions of the operating system. A
> security code audit of the 2.4 kernel found a number of possible local
> security vulnerabilities which could allow a local user to obtain elevated
> (root) privileges. The vulnerabilities were found in the ixj telephony
card
> driver, the pcilynx firewire driver, and the bttv video capture card
driver.
>
> In addition, several drivers (e100, e1000, tg3n and IDE) have been updated
> to support newer hardware for Red Hat Linux 7.3, and a number of bugs have
> been fixed in IDE tapestreamer driver.
>
> All Red Hat Linux 7.3 and 8.0 users should upgrade to this errata kernel
> which is not vulnerable to these security issues.
>
> NOTE: As with the 8.0 release, IDE DMA on CD-ROM drives is disabled by
> default. If you are sure that your CD-ROM drive is capable of IDE
> DMA, place the following line in the /etc/modules.conf file:
>
> options ide-cd dma=1
>
> Thanks to Silvio Cesare for finding the local security issues.
>
> 4. Solution:
>
> Before applying this update, make sure all previously released errata
> relevant to your system have been applied.
>
> The procedure for upgrading the kernel manually is documented at:
>
> http://www.redhat.com/support/docs/howto/kernel-upgrade/
>
> Please read the directions for your architecture carefully before
> proceeding with the kernel upgrade.
>
> Please note that this update is also available via Red Hat Network. Many
> people find this to be an easier way to apply updates. To use Red Hat
> Network, launch the Red Hat Update Agent with the following command:
>
> up2date
>
> This will start an interactive process that will result in the appropriate
> RPMs being upgraded on your system. Note that you need to select the
kernel
> explicitly on default configurations of up2date.
>
> 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
>
> 73339 - apm locks up Asus A7N266VM (nForce chipset)
> 74879 - aha152x driver broken
> 71622 - cs4232 module is not auto-loaded on use
> 75107 - boot time in /proc/stat is incorrect
> 75113 - /proc/uptime shows wrong uptime (slightly) and idle time (totally)
> 74589 - speedstep doesn't work on IBM ThinkPad T30 (pentium 4)
>
> 6. RPMs required:
>
> Red Hat Linux 7.3:
>
> SRPMS:
> ftp://updates.redhat.com/7.3/en/os/SRPMS/kernel-2.4.18-17.7.x.src.rpm
> ftp://updates.redhat.com/7.3/en/os/SRPMS/hwdata-0.14.1-1.src.rpm
> ftp://updates.redhat.com/7.3/en/os/SRPMS/modutils-2.4.18-3.7x.src.rpm
>
> athlon:
> ftp://updates.redhat.com/7.3/en/os/athlon/kernel-2.4.18-17.7.x.athlon.rpm
>
ftp://updates.redhat.com/7.3/en/os/athlon/kernel-smp-2.4.18-17.7.x.athlon.rp
m
>
> i386:
> ftp://updates.redhat.com/7.3/en/os/i386/kernel-2.4.18-17.7.x.i386.rpm
>
ftp://updates.redhat.com/7.3/en/os/i386/kernel-source-2.4.18-17.7.x.i386.rpm
> ftp://updates.redhat.com/7.3/en/os/i386/kernel-doc-2.4.18-17.7.x.i386.rpm
> ftp://updates.redhat.com/7.3/en/os/i386/kernel-BOOT-2.4.18-17.7.x.i386.rpm
> ftp://updates.redhat.com/7.3/en/os/i386/modutils-2.4.18-3.7x.i386.rpm
>
> i586:
> ftp://updates.redhat.com/7.3/en/os/i586/kernel-2.4.18-17.7.x.i586.rpm
> ftp://updates.redhat.com/7.3/en/os/i586/kernel-smp-2.4.18-17.7.x.i586.rpm
>
> i686:
> ftp://updates.redhat.com/7.3/en/os/i686/kernel-2.4.18-17.7.x.i686.rpm
> ftp://updates.redhat.com/7.3/en/os/i686/kernel-smp-2.4.18-17.7.x.i686.rpm
>
ftp://updates.redhat.com/7.3/en/os/i686/kernel-bigmem-2.4.18-17.7.x.i686.rpm
>
ftp://updates.redhat.com/7.3/en/os/i686/kernel-debug-2.4.18-17.7.x.i686.rpm
>
> noarch:
> ftp://updates.redhat.com/7.3/en/os/noarch/hwdata-0.14.1-1.noarch.rpm
>
> Red Hat Linux 8.0:
>
> SRPMS:
> ftp://updates.redhat.com/8.0/en/os/SRPMS/kernel-2.4.18-17.8.0.src.rpm
> ftp://updates.redhat.com/8.0/en/os/SRPMS/hwdata-0.48-1.src.rpm
>
> athlon:
> ftp://updates.redhat.com/8.0/en/os/athlon/kernel-2.4.18-17.8.0.athlon.rpm
>
ftp://updates.redhat.com/8.0/en/os/athlon/kernel-smp-2.4.18-17.8.0.athlon.rp
m
>
> i386:
> ftp://updates.redhat.com/8.0/en/os/i386/kernel-2.4.18-17.8.0.i386.rpm
>
ftp://updates.redhat.com/8.0/en/os/i386/kernel-source-2.4.18-17.8.0.i386.rpm
> ftp://updates.redhat.com/8.0/en/os/i386/kernel-doc-2.4.18-17.8.0.i386.rpm
> ftp://updates.redhat.com/8.0/en/os/i386/kernel-BOOT-2.4.18-17.8.0.i386.rpm
>
> i586:
> ftp://updates.redhat.com/8.0/en/os/i586/kernel-2.4.18-17.8.0.i586.rpm
> ftp://updates.redhat.com/8.0/en/os/i586/kernel-smp-2.4.18-17.8.0.i586.rpm
>
> i686:
> ftp://updates.redhat.com/8.0/en/os/i686/kernel-2.4.18-17.8.0.i686.rpm
> ftp://updates.redhat.com/8.0/en/os/i686/kernel-smp-2.4.18-17.8.0.i686.rpm
>
ftp://updates.redhat.com/8.0/en/os/i686/kernel-bigmem-2.4.18-17.8.0.i686.rpm
>
ftp://updates.redhat.com/8.0/en/os/i686/kernel-debug-2.4.18-17.8.0.i686.rpm
>
> noarch:
> ftp://updates.redhat.com/8.0/en/os/noarch/hwdata-0.48-1.noarch.rpm
>
>
>
> 7. Verification:
>
> MD5 sum                          Package Name
> --------------------------------------------------------------------------
> 5c742d695efa74cce26a070a018561b6 7.3/en/os/SRPMS/hwdata-0.14.1-1.src.rpm
> d0cf8ef64412c78c9d32da9d0cb9850d
7.3/en/os/SRPMS/kernel-2.4.18-17.7.x.src.rpm
> 0414620fa83d72ffd9f128be2e4bf430
7.3/en/os/SRPMS/modutils-2.4.18-3.7x.src.rpm
> 082114a540f7bd692476584e38c6cd5c
7.3/en/os/athlon/kernel-2.4.18-17.7.x.athlon.rpm
> bd2fa5b6b721caf12dcea357304c008b
7.3/en/os/athlon/kernel-smp-2.4.18-17.7.x.athlon.rpm
> cfdef58820f5d7701f4221c80a7c821b
7.3/en/os/i386/kernel-2.4.18-17.7.x.i386.rpm
> 145d063537e3a34723d50e611cbd37a8
7.3/en/os/i386/kernel-BOOT-2.4.18-17.7.x.i386.rpm
> 8d9a20e2f4d82cc262cab928910377fa
7.3/en/os/i386/kernel-doc-2.4.18-17.7.x.i386.rpm
> 0344cc1d42651916fb91ed7a700f3f90
7.3/en/os/i386/kernel-source-2.4.18-17.7.x.i386.rpm
> cddd8196a38dbff1a8e34429415670fb
7.3/en/os/i386/modutils-2.4.18-3.7x.i386.rpm
> 576ceca80b035a10b942e6feb217c055
7.3/en/os/i586/kernel-2.4.18-17.7.x.i586.rpm
> d9d2b3fa23ee4733b35fd730e9553625
7.3/en/os/i586/kernel-smp-2.4.18-17.7.x.i586.rpm
> 3a3afd67620fc36de17876629398dceb
7.3/en/os/i686/kernel-2.4.18-17.7.x.i686.rpm
> fe9a658e1e22defc3cf5e2134646a6eb
7.3/en/os/i686/kernel-bigmem-2.4.18-17.7.x.i686.rpm
> 158c941a9b430581a7bcd23ec1398052
7.3/en/os/i686/kernel-debug-2.4.18-17.7.x.i686.rpm
> f9e11d26c2ca35ef403656be882fb592
7.3/en/os/i686/kernel-smp-2.4.18-17.7.x.i686.rpm
> 100b8e47ecde440cca8122a08fb59b81
7.3/en/os/noarch/hwdata-0.14.1-1.noarch.rpm
> eb9d565f55332264a15afadfc2e2b1a6 8.0/en/os/SRPMS/hwdata-0.48-1.src.rpm
> 11c9a0e4224f20712b24805fd4e5f0be
8.0/en/os/SRPMS/kernel-2.4.18-17.8.0.src.rpm
> 0ccc7295596f093121f4e2ae9767ebd1
8.0/en/os/athlon/kernel-2.4.18-17.8.0.athlon.rpm
> e0e77e845a0b2e491150cf4e892d6c24
8.0/en/os/athlon/kernel-smp-2.4.18-17.8.0.athlon.rpm
> 47870d4e2b646a59c8ade167f38575e6
8.0/en/os/i386/kernel-2.4.18-17.8.0.i386.rpm
> 9e38f1aeebbc862dcf050b936dcc781e
8.0/en/os/i386/kernel-BOOT-2.4.18-17.8.0.i386.rpm
> 78734f41ea1ba399f0a7d60f7d46bb8f
8.0/en/os/i386/kernel-doc-2.4.18-17.8.0.i386.rpm
> c869e31fdd68ae7b1beae942282717b4
8.0/en/os/i386/kernel-source-2.4.18-17.8.0.i386.rpm
> 49a2d9c5add3431c395574c7456f5596
8.0/en/os/i586/kernel-2.4.18-17.8.0.i586.rpm
> 69ece85c6df4002f7e071c4b210c204f
8.0/en/os/i586/kernel-smp-2.4.18-17.8.0.i586.rpm
> f05ebe7ff48fea54ed013018f1133b5e
8.0/en/os/i686/kernel-2.4.18-17.8.0.i686.rpm
> 9b9a868c08b100dbd5c1f7458fd5331d
8.0/en/os/i686/kernel-bigmem-2.4.18-17.8.0.i686.rpm
> c8e06fe44752510d49ad227ab01f323c
8.0/en/os/i686/kernel-debug-2.4.18-17.8.0.i686.rpm
> f5efa4f4d8db58a413a41bc66c13c3da
8.0/en/os/i686/kernel-smp-2.4.18-17.8.0.i686.rpm
> d160a0e0aa78e76b5c9a7c229d516eb8 8.0/en/os/noarch/hwdata-0.48-1.noarch.rpm
>
>
> These packages are GPG signed by Red Hat, Inc. for security.  Our key
> is available at:
>     http://www.redhat.com/about/contact/pgpkey.html
>
> You can verify each package with the following command:
>     rpm --checksig  <filename>
>
> If you only wish to verify that each package has not been corrupted or
> tampered with, examine only the md5sum with the following command:
>     rpm --checksig --nogpg <filename>
>
>
> 8. References:
>
> http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.18
>
>
> Copyright(c) 2000, 2001, 2002 Red Hat, Inc.
>
>
> ------------------------------
>
> End of this Digest
> ******************
>
> --
> Raju Mathur               [EMAIL PROTECTED]      http://kandalaya.org/
>                       It is the mind that moves
>
>           ================================================
> To unsubscribe, send email to [EMAIL PROTECTED] with unsubscribe in
subject header. Check archives at
http://www.mail-archive.com/ilugd%40wpaa.org
>
>


          ================================================
To unsubscribe, send email to [EMAIL PROTECTED] with unsubscribe in subject 
header. Check archives at http://www.mail-archive.com/ilugd%40wpaa.org

Reply via email to