Re: [ANNOUNCE] 4.19.233-rt105

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, 18 Mar 2022 10:45:35 +0100, Daniel Wagner wrote:
>$ gpg pgpkeys/keys/587C5ECA5D0A306C.asc

Hi,

that's the wrong key:


[rocketmouse@archlinux linux-rt]$ gzip -cd patch-4.19.233-rt105.patch.gz | gpg2 --verify patch-4.19.233-rt105.patch.sign -
gpg: Signature made Fri 11 Mar 2022 09:10:11 CET
gpg:                using EDDSA key 1B45744BE36280CA7D6BD460E072D068B1F5703E
                                                            ^^^^^^^^^^^^^^^^
                                                            587C5ECA5D0A306C.asc


Importing your key from a keyserver (e.g. from
hkp://keyserver.ubuntu.com) isn't an issue at all.

The rt-patch was either signed with another key (E072D068B1F5703E
instead of 587C5ECA5D0A306C) or the uploaded patch is malicious.

The patch was downloaded from
https://www.kernel.org/pub/linux/kernel/projects/rt/ :


[rocketmouse@archlinux ~]$ head -24 /usr/src/linux-rt-rm/PKGBUILD
[snip]
_pkgver=4.19.233
_rtpatchver=105
pkgver="${_pkgver}_rt${_rtpatchver}"
[snip]
source=(
  "https://www.kernel.org/pub/linux/kernel/v${_pkgver%%.*}.x/linux-${_pkgver}.tar.gz";
  "https://www.kernel.org/pub/linux/kernel/v${_pkgver%%.*}.x/linux-${_pkgver}.tar.sign";
  "https://www.kernel.org/pub/linux/kernel/projects/rt/${_pkgver%.*}/older/patch-${_pkgver}-rt${_rtpatchver}.patch.gz";
  "https://www.kernel.org/pub/linux/kernel/projects/rt/${_pkgver%.*}/older/patch-${_pkgver}-rt${_rtpatchver}.patch.sign";


Regards,
Ralf



[Index of Archives]     [RT Stable]     [Kernel Newbies]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Video 4 Linux]     [Device Mapper]

  Powered by Linux