Linux Today: Linux News On Internet Time.
Search Linux Today
Linux News Sections:  Developer -  High Performance -  Infrastructure -  IT Management -  Security -  Storage -
Linux Today Navigation
LT Home
Contribute
Contribute
Link to Us
Linux Jobs


More on LinuxToday


Red Hat Linux Advisories: Kernels 2.2, 2.4

Oct 17, 2002, 15:50 (0 Talkback[s])

---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Security Advisory

Synopsis:          New kernel fixes local security issues
Advisory ID:       RHSA-2002:206-12
Issue date:        2002-09-23
Updated on:        2002-10-15
Product:           Red Hat Linux
Keywords:          
Cross references:  
Obsoletes:         RHBA-2002:110
---------------------------------------------------------------------

1. Topic:

Updated kernel fixes local security issues and provides several updated
drivers to support newer hardware and fix bugs under Red Hat Linux 7.3.

2. Relevant releases/architectures:

Red Hat Linux 7.3 - athlon, i386, i586, i686, noarch
Red Hat Linux 8.0 - athlon, i386, i586, i686, noarch

3. Problem description:

The Linux kernel handles the basic functions of the operating system. A
security code audit of the 2.4 kernel found a number of possible local
security vulnerabilities which could allow a local user to obtain elevated
(root) privileges. The vulnerabilities were found in the ixj telephony card
driver, the pcilynx firewire driver, and the bttv video capture card driver.

In addition, several drivers (e100, e1000, tg3n and IDE) have been updated
to support newer hardware for Red Hat Linux 7.3, and a number of bugs have
been fixed in IDE tapestreamer driver.

All Red Hat Linux 7.3 and 8.0 users should upgrade to this errata kernel
which is not vulnerable to these security issues.

NOTE: As with the 8.0 release, IDE DMA on CD-ROM drives is disabled by
default. If you are sure that your CD-ROM drive is capable of IDE
DMA, place the following line in the /etc/modules.conf file:

options ide-cd dma=1

Thanks to Silvio Cesare for finding the local security issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

The procedure for upgrading the kernel manually is documented at:

http://www.redhat.com/support/docs/howto/kernel-upgrade/

Please read the directions for your architecture carefully before
proceeding with the kernel upgrade.

Please note that this update is also available via Red Hat Network. Many
people find this to be an easier way to apply updates. To use Red Hat
Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system. Note that you need to select the kernel
explicitly on default configurations of up2date.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

73339 - apm locks up Asus A7N266VM (nForce chipset)
74879 - aha152x driver broken
71622 - cs4232 module is not auto-loaded on use
75107 - boot time in /proc/stat is incorrect
75113 - /proc/uptime shows wrong uptime (slightly) and idle time (totally)
74589 - speedstep doesn't work on IBM ThinkPad T30 (pentium 4)

6. RPMs required:

Red Hat Linux 7.3:

SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/kernel-2.4.18-17.7.x.src.rpm
ftp://updates.redhat.com/7.3/en/os/SRPMS/hwdata-0.14.1-1.src.rpm
ftp://updates.redhat.com/7.3/en/os/SRPMS/modutils-2.4.18-3.7x.src.rpm

athlon:
ftp://updates.redhat.com/7.3/en/os/athlon/kernel-2.4.18-17.7.x.athlon.rpm
ftp://updates.redhat.com/7.3/en/os/athlon/kernel-smp-2.4.18-17.7.x.athlon.rpm

i386:
ftp://updates.redhat.com/7.3/en/os/i386/kernel-2.4.18-17.7.x.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/kernel-source-2.4.18-17.7.x.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/kernel-doc-2.4.18-17.7.x.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/kernel-BOOT-2.4.18-17.7.x.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/modutils-2.4.18-3.7x.i386.rpm

i586:
ftp://updates.redhat.com/7.3/en/os/i586/kernel-2.4.18-17.7.x.i586.rpm
ftp://updates.redhat.com/7.3/en/os/i586/kernel-smp-2.4.18-17.7.x.i586.rpm

i686:
ftp://updates.redhat.com/7.3/en/os/i686/kernel-2.4.18-17.7.x.i686.rpm
ftp://updates.redhat.com/7.3/en/os/i686/kernel-smp-2.4.18-17.7.x.i686.rpm
ftp://updates.redhat.com/7.3/en/os/i686/kernel-bigmem-2.4.18-17.7.x.i686.rpm
ftp://updates.redhat.com/7.3/en/os/i686/kernel-debug-2.4.18-17.7.x.i686.rpm

noarch:
ftp://updates.redhat.com/7.3/en/os/noarch/hwdata-0.14.1-1.noarch.rpm

Red Hat Linux 8.0:

SRPMS:
ftp://updates.redhat.com/8.0/en/os/SRPMS/kernel-2.4.18-17.8.0.src.rpm
ftp://updates.redhat.com/8.0/en/os/SRPMS/hwdata-0.48-1.src.rpm

athlon:
ftp://updates.redhat.com/8.0/en/os/athlon/kernel-2.4.18-17.8.0.athlon.rpm
ftp://updates.redhat.com/8.0/en/os/athlon/kernel-smp-2.4.18-17.8.0.athlon.rpm

i386:
ftp://updates.redhat.com/8.0/en/os/i386/kernel-2.4.18-17.8.0.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/kernel-source-2.4.18-17.8.0.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/kernel-doc-2.4.18-17.8.0.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/kernel-BOOT-2.4.18-17.8.0.i386.rpm

i586:
ftp://updates.redhat.com/8.0/en/os/i586/kernel-2.4.18-17.8.0.i586.rpm
ftp://updates.redhat.com/8.0/en/os/i586/kernel-smp-2.4.18-17.8.0.i586.rpm

i686:
ftp://updates.redhat.com/8.0/en/os/i686/kernel-2.4.18-17.8.0.i686.rpm
ftp://updates.redhat.com/8.0/en/os/i686/kernel-smp-2.4.18-17.8.0.i686.rpm
ftp://updates.redhat.com/8.0/en/os/i686/kernel-bigmem-2.4.18-17.8.0.i686.rpm
ftp://updates.redhat.com/8.0/en/os/i686/kernel-debug-2.4.18-17.8.0.i686.rpm

noarch:
ftp://updates.redhat.com/8.0/en/os/noarch/hwdata-0.48-1.noarch.rpm



7. Verification:

MD5 sum                          Package Name
--------------------------------------------------------------------------
5c742d695efa74cce26a070a018561b6 7.3/en/os/SRPMS/hwdata-0.14.1-1.src.rpm
d0cf8ef64412c78c9d32da9d0cb9850d 7.3/en/os/SRPMS/kernel-2.4.18-17.7.x.src.rpm
0414620fa83d72ffd9f128be2e4bf430 7.3/en/os/SRPMS/modutils-2.4.18-3.7x.src.rpm
082114a540f7bd692476584e38c6cd5c 7.3/en/os/athlon/kernel-2.4.18-17.7.x.athlon.rpm
bd2fa5b6b721caf12dcea357304c008b 7.3/en/os/athlon/kernel-smp-2.4.18-17.7.x.athlon.rpm
cfdef58820f5d7701f4221c80a7c821b 7.3/en/os/i386/kernel-2.4.18-17.7.x.i386.rpm
145d063537e3a34723d50e611cbd37a8 7.3/en/os/i386/kernel-BOOT-2.4.18-17.7.x.i386.rpm
8d9a20e2f4d82cc262cab928910377fa 7.3/en/os/i386/kernel-doc-2.4.18-17.7.x.i386.rpm
0344cc1d42651916fb91ed7a700f3f90 7.3/en/os/i386/kernel-source-2.4.18-17.7.x.i386.rpm
cddd8196a38dbff1a8e34429415670fb 7.3/en/os/i386/modutils-2.4.18-3.7x.i386.rpm
576ceca80b035a10b942e6feb217c055 7.3/en/os/i586/kernel-2.4.18-17.7.x.i586.rpm
d9d2b3fa23ee4733b35fd730e9553625 7.3/en/os/i586/kernel-smp-2.4.18-17.7.x.i586.rpm
3a3afd67620fc36de17876629398dceb 7.3/en/os/i686/kernel-2.4.18-17.7.x.i686.rpm
fe9a658e1e22defc3cf5e2134646a6eb 7.3/en/os/i686/kernel-bigmem-2.4.18-17.7.x.i686.rpm
158c941a9b430581a7bcd23ec1398052 7.3/en/os/i686/kernel-debug-2.4.18-17.7.x.i686.rpm
f9e11d26c2ca35ef403656be882fb592 7.3/en/os/i686/kernel-smp-2.4.18-17.7.x.i686.rpm
100b8e47ecde440cca8122a08fb59b81 7.3/en/os/noarch/hwdata-0.14.1-1.noarch.rpm
eb9d565f55332264a15afadfc2e2b1a6 8.0/en/os/SRPMS/hwdata-0.48-1.src.rpm
11c9a0e4224f20712b24805fd4e5f0be 8.0/en/os/SRPMS/kernel-2.4.18-17.8.0.src.rpm
0ccc7295596f093121f4e2ae9767ebd1 8.0/en/os/athlon/kernel-2.4.18-17.8.0.athlon.rpm
e0e77e845a0b2e491150cf4e892d6c24 8.0/en/os/athlon/kernel-smp-2.4.18-17.8.0.athlon.rpm
47870d4e2b646a59c8ade167f38575e6 8.0/en/os/i386/kernel-2.4.18-17.8.0.i386.rpm
9e38f1aeebbc862dcf050b936dcc781e 8.0/en/os/i386/kernel-BOOT-2.4.18-17.8.0.i386.rpm
78734f41ea1ba399f0a7d60f7d46bb8f 8.0/en/os/i386/kernel-doc-2.4.18-17.8.0.i386.rpm
c869e31fdd68ae7b1beae942282717b4 8.0/en/os/i386/kernel-source-2.4.18-17.8.0.i386.rpm
49a2d9c5add3431c395574c7456f5596 8.0/en/os/i586/kernel-2.4.18-17.8.0.i586.rpm
69ece85c6df4002f7e071c4b210c204f 8.0/en/os/i586/kernel-smp-2.4.18-17.8.0.i586.rpm
f05ebe7ff48fea54ed013018f1133b5e 8.0/en/os/i686/kernel-2.4.18-17.8.0.i686.rpm
9b9a868c08b100dbd5c1f7458fd5331d 8.0/en/os/i686/kernel-bigmem-2.4.18-17.8.0.i686.rpm
c8e06fe44752510d49ad227ab01f323c 8.0/en/os/i686/kernel-debug-2.4.18-17.8.0.i686.rpm
f5efa4f4d8db58a413a41bc66c13c3da 8.0/en/os/i686/kernel-smp-2.4.18-17.8.0.i686.rpm
d160a0e0aa78e76b5c9a7c229d516eb8 8.0/en/os/noarch/hwdata-0.48-1.noarch.rpm


These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
    http://www.redhat.com/about/contact/pgpkey.html

You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>


8. References:

http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.18


Copyright(c) 2000, 2001, 2002 Red Hat, Inc.



_____________________________________________

---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Security Advisory

Synopsis:          New kernel 2.2 packages fix local vulnerabilities
Advisory ID:       RHSA-2002:210-06
Issue date:        2002-09-23
Updated on:        2002-10-10
Product:           Red Hat Linux
Keywords:          elevated local root kernel
Cross references:  
Obsoletes:         RHSA-2001:142
---------------------------------------------------------------------

1. Topic:

Some potential local security vulnerabilities were found in the kernel
during code audits; these have been fixed in the 2.2.22 kernel.

2. Relevant releases/architectures:

Red Hat Linux 6.2 - alpha, i386, i586, i686, sparc, sparc64
Red Hat Linux 7.0 - alpha, i386, i586, i686

3. Problem description:

The Linux kernel handles the basic functions of the operating system. A
security code audit of the 2.2 kernel found a number of possible local
security vulnerabilities. These vulnerabilities could allow a local user
to obtain elevated (root) privileges.  

Red Hat Linux 6.2 and 7.0 shipped with the 2.2 kernel and are both
vulnerable to these issues.

All Red Hat Linux users using the 2.2 kernel should upgrade to the errata
pacakages contaning the 2.2.22 kernel which are not vulnerable to these issues.

Many thanks to Silvio Cesare and Solar Designer for their work in
discovering these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied. 

The procedure for upgrading the kernel is documented at:

http://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html

Please read the directions for your architecture carefully before
proceeding with the kernel upgrade.

Please note that this update is also available via Red Hat Network.  Many
people find this to be an easier way to apply updates.  To use Red Hat
Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system. Note that you need to select the kernel
explicitly on default configurations of up2date.

5. RPMs required:

Red Hat Linux 6.2:

SRPMS:
ftp://updates.redhat.com/6.2/en/os/SRPMS/kernel-2.2.22-6.2.2.src.rpm

alpha:
ftp://updates.redhat.com/6.2/en/os/alpha/kernel-enterprise-2.2.22-6.2.2.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/kernel-smp-2.2.22-6.2.2.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/kernel-2.2.22-6.2.2.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/kernel-BOOT-2.2.22-6.2.2.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/kernel-utils-2.2.22-6.2.2.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/kernel-doc-2.2.22-6.2.2.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/kernel-headers-2.2.22-6.2.2.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/kernel-source-2.2.22-6.2.2.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/kernel-jensen-2.2.22-6.2.2.alpha.rpm

i386:
ftp://updates.redhat.com/6.2/en/os/i386/kernel-smp-2.2.22-6.2.2.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/kernel-2.2.22-6.2.2.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/kernel-BOOT-2.2.22-6.2.2.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/kernel-ibcs-2.2.22-6.2.2.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/kernel-utils-2.2.22-6.2.2.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/kernel-pcmcia-cs-2.2.22-6.2.2.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/kernel-doc-2.2.22-6.2.2.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/kernel-headers-2.2.22-6.2.2.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/kernel-source-2.2.22-6.2.2.i386.rpm

i586:
ftp://updates.redhat.com/6.2/en/os/i586/kernel-smp-2.2.22-6.2.2.i586.rpm
ftp://updates.redhat.com/6.2/en/os/i586/kernel-2.2.22-6.2.2.i586.rpm

i686:
ftp://updates.redhat.com/6.2/en/os/i686/kernel-enterprise-2.2.22-6.2.2.i686.rpm
ftp://updates.redhat.com/6.2/en/os/i686/kernel-smp-2.2.22-6.2.2.i686.rpm
ftp://updates.redhat.com/6.2/en/os/i686/kernel-2.2.22-6.2.2.i686.rpm

Red Hat Linux 7.0:

SRPMS:
ftp://updates.redhat.com/7.0/en/os/SRPMS/kernel-2.2.22-7.0.2.src.rpm

alpha:
ftp://updates.redhat.com/7.0/en/os/alpha/kernel-enterprise-2.2.22-7.0.2.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/kernel-smp-2.2.22-7.0.2.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/kernel-2.2.22-7.0.2.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/kernel-BOOT-2.2.22-7.0.2.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/kernel-utils-2.2.22-7.0.2.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/kernel-doc-2.2.22-7.0.2.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/kernel-source-2.2.22-7.0.2.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/kernel-jensen-2.2.22-7.0.2.alpha.rpm

i386:
ftp://updates.redhat.com/7.0/en/os/i386/kernel-smp-2.2.22-7.0.2.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/kernel-2.2.22-7.0.2.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/kernel-BOOT-2.2.22-7.0.2.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/kernel-ibcs-2.2.22-7.0.2.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/kernel-utils-2.2.22-7.0.2.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/kernel-pcmcia-cs-2.2.22-7.0.2.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/kernel-doc-2.2.22-7.0.2.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/kernel-source-2.2.22-7.0.2.i386.rpm

i586:
ftp://updates.redhat.com/7.0/en/os/i586/kernel-smp-2.2.22-7.0.2.i586.rpm
ftp://updates.redhat.com/7.0/en/os/i586/kernel-2.2.22-7.0.2.i586.rpm

i686:
ftp://updates.redhat.com/7.0/en/os/i686/kernel-enterprise-2.2.22-7.0.2.i686.rpm
ftp://updates.redhat.com/7.0/en/os/i686/kernel-smp-2.2.22-7.0.2.i686.rpm
ftp://updates.redhat.com/7.0/en/os/i686/kernel-2.2.22-7.0.2.i686.rpm



6. Verification:

MD5 sum                          Package Name
--------------------------------------------------------------------------
17d2896d2f7fb9b6fb63128593e44cf7 6.2/en/os/SRPMS/kernel-2.2.22-6.2.2.src.rpm
934a473b6149c31aab29ffeb55d1bb33 6.2/en/os/alpha/kernel-2.2.22-6.2.2.alpha.rpm
3078540160bbcb03a9b087b8d3f02797 6.2/en/os/alpha/kernel-BOOT-2.2.22-6.2.2.alpha.rpm
78ad15c3d6e79f40906f660f337a41cf 6.2/en/os/alpha/kernel-doc-2.2.22-6.2.2.alpha.rpm
df17f26a164abb1cc432a1601553c32c 6.2/en/os/alpha/kernel-enterprise-2.2.22-6.2.2.alpha.rpm
87d00fcd2b047605c3e6b2fcb2ed3550 6.2/en/os/alpha/kernel-headers-2.2.22-6.2.2.alpha.rpm
f1357fd71e421012e86d57f5b8403b49 6.2/en/os/alpha/kernel-jensen-2.2.22-6.2.2.alpha.rpm
d9848588d5b399e2e46dabef9dfa56a2 6.2/en/os/alpha/kernel-smp-2.2.22-6.2.2.alpha.rpm
2492a5eafc3a5369ee021f31acddc161 6.2/en/os/alpha/kernel-source-2.2.22-6.2.2.alpha.rpm
f7866cc49775c8cc041a99630a8ccd8f 6.2/en/os/alpha/kernel-utils-2.2.22-6.2.2.alpha.rpm
a8ed8ef5a2ab223ae3686b6c9332979d 6.2/en/os/i386/kernel-2.2.22-6.2.2.i386.rpm
415ee4e472766ff19818aa8f93959e06 6.2/en/os/i386/kernel-BOOT-2.2.22-6.2.2.i386.rpm
f08d05768682829b67a96837135f5b3e 6.2/en/os/i386/kernel-doc-2.2.22-6.2.2.i386.rpm
e0e5f8eaaa90337287056ecdf61a1b85 6.2/en/os/i386/kernel-headers-2.2.22-6.2.2.i386.rpm
6f1c7eee03bdce33b41c45882786a90c 6.2/en/os/i386/kernel-ibcs-2.2.22-6.2.2.i386.rpm
7fbb23912a3fff7d67bfff2fbb0e28af 6.2/en/os/i386/kernel-pcmcia-cs-2.2.22-6.2.2.i386.rpm
d64f7291e28cbeef5606d66f33deb741 6.2/en/os/i386/kernel-smp-2.2.22-6.2.2.i386.rpm
a1daa9363e733e772e3d14821cc39379 6.2/en/os/i386/kernel-source-2.2.22-6.2.2.i386.rpm
265b166a208ad120483e90b0ddb1e150 6.2/en/os/i386/kernel-utils-2.2.22-6.2.2.i386.rpm
0b7f92ce29dff3dc44cef4cf5e7b739a 6.2/en/os/i586/kernel-2.2.22-6.2.2.i586.rpm
ddc59fcecc7d8c78f072bcb24cc81cc9 6.2/en/os/i586/kernel-smp-2.2.22-6.2.2.i586.rpm
256c8301d5ee1ddfe1835f52106fc8ae 6.2/en/os/i686/kernel-2.2.22-6.2.2.i686.rpm
9c5e0a7ef930677409e17b6874b0a64c 6.2/en/os/i686/kernel-enterprise-2.2.22-6.2.2.i686.rpm
aa50bde6dbcfdccd105b094fb2a64b3e 6.2/en/os/i686/kernel-smp-2.2.22-6.2.2.i686.rpm
14c7af0e8c0d2eb4459e53457c711f6d 7.0/en/os/SRPMS/kernel-2.2.22-7.0.2.src.rpm
33b15c03cedaf29c677c11a4014c6fe0 7.0/en/os/alpha/kernel-2.2.22-7.0.2.alpha.rpm
d0384d7a4b6537aad8f998e121fdc413 7.0/en/os/alpha/kernel-BOOT-2.2.22-7.0.2.alpha.rpm
e1efc88a783d30235ee9772ec09e65da 7.0/en/os/alpha/kernel-doc-2.2.22-7.0.2.alpha.rpm
bacb622d69236a51609495cb6613ff37 7.0/en/os/alpha/kernel-enterprise-2.2.22-7.0.2.alpha.rpm
836ffa5d2975669d1e81e66586d48733 7.0/en/os/alpha/kernel-jensen-2.2.22-7.0.2.alpha.rpm
fc0ebba88dbbdf0af7ac00fda9f6dc64 7.0/en/os/alpha/kernel-smp-2.2.22-7.0.2.alpha.rpm
8bc6b2708e152fec14e9b1a1de0adfe1 7.0/en/os/alpha/kernel-source-2.2.22-7.0.2.alpha.rpm
fdb3a29828d1f7b5a2592940a11f2cb6 7.0/en/os/alpha/kernel-utils-2.2.22-7.0.2.alpha.rpm
c561988f01540db372bc01b8ae0c77d2 7.0/en/os/i386/kernel-2.2.22-7.0.2.i386.rpm
9d045b22d45c579b7482f6d748bc840a 7.0/en/os/i386/kernel-BOOT-2.2.22-7.0.2.i386.rpm
1865fbcf74b3f91c0d2d57f1753b4a47 7.0/en/os/i386/kernel-doc-2.2.22-7.0.2.i386.rpm
3d3c946eba48ced9b4b652335e674786 7.0/en/os/i386/kernel-ibcs-2.2.22-7.0.2.i386.rpm
e840ba8a42aabb575b5be7f76d03315f 7.0/en/os/i386/kernel-pcmcia-cs-2.2.22-7.0.2.i386.rpm
179b363e1de74a4fc221efa8c65eb756 7.0/en/os/i386/kernel-smp-2.2.22-7.0.2.i386.rpm
24f087e27a87b1023bde1095e7319207 7.0/en/os/i386/kernel-source-2.2.22-7.0.2.i386.rpm
fb444ec4b89b911f08da0560d779836a 7.0/en/os/i386/kernel-utils-2.2.22-7.0.2.i386.rpm
3c5b3eb12bafd6b17763822194d662b6 7.0/en/os/i586/kernel-2.2.22-7.0.2.i586.rpm
d6ec7ae5f3f2b08df563c26f8143ec16 7.0/en/os/i586/kernel-smp-2.2.22-7.0.2.i586.rpm
815ea0a611884d4285d3e60ec64b689b 7.0/en/os/i686/kernel-2.2.22-7.0.2.i686.rpm
16d4f5bbc2360d2fdb6a662d0cf9b9cb 7.0/en/os/i686/kernel-enterprise-2.2.22-7.0.2.i686.rpm
bc678bf0ce41901831fc585387a6d4d1 7.0/en/os/i686/kernel-smp-2.2.22-7.0.2.i686.rpm


These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
    http://www.redhat.com/about/contact/pgpkey.html

You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>


7. References:

http://www.kernel.org/pub/linux/kernel/v2.2/ChangeLog-2.2.22


Copyright(c) 2000, 2001, 2002 Red Hat, Inc.



_____________________________________________


---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Security Advisory

Synopsis:          New kernel fixes local security issues
Advisory ID:       RHSA-2002:205-15
Issue date:        2002-09-20
Updated on:        2002-10-15
Product:           Red Hat Linux
Keywords:          
Cross references:  
Obsoletes:         RHEA-2002:082
---------------------------------------------------------------------

1. Topic:

A new errata kernel based on the 2.4.18 kernel is available for Red Hat
Linux 7.1 and Red Hat Linux 7.2 users. This is a major version change
compared to the previous errata kernel for these releases (2.4.9-34).

2. Relevant releases/architectures:

Red Hat Linux 7.1 - alpha, athlon, i386, i586, i686, ia64
Red Hat Linux 7.2 - athlon, i386, i586, i686, ia64

3. Problem description:

The Linux kernel handles the basic functions of the operating system. A
security code audit of the 2.4 kernel found a number of possible local
security vulnerabilities. These vulnerabilities may allow a local user
to obtain elevated (root) privileges, however no exploits are known to
exist at the time of this errata release.

Changes in the errata 2.4.18 kernel include the addition of the intermezzo
file system, the ComX serial port driver, the PC bit ISDN driver, and the
generic ISDN layer. Also, several USB drivers and firewire drivers have
been added and many other device drivers have been updated.

Other features of the 2.4.18 errata kernel include a much-improved VM
subsystem, better interactive performance, and support for new hardware,
such as USB2 devices and large IDE disks.

A full description of the updated kernel can be found in the kernel
changelogs at http://www.kernelnewbies.org/changelogs.

IMPORTANT: For alpha and ia64 architectures, kernel version 2.4.9-40 is
provided instead of 2.4.18. This errata kernel contains important
backported security fixes.

NOTE: As with the 8.0 release, IDE DMA on CD-ROM drives is disabled by
default. If you are sure that your CD-ROM drive is capable of IDE
DMA, place the following line in the /etc/modules.conf file:

options ide-cd dma=1

All users of Red Hat Linux 7.1 and 7.2 should update to these errata packages.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

The procedure for upgrading the kernel manually is documented at:

http://www.redhat.com/support/docs/howto/kernel-upgrade/

Please read the directions for your architecture carefully before
proceeding with the kernel upgrade.

Please note that this update is also available via Red Hat Network. Many
people find this to be an easier way to apply updates. To use Red Hat
Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system. Note that you need to select the kernel
explicitly on default configurations of up2date.

5. RPMs required:

Red Hat Linux 7.1:

SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/kernel-2.4.18-17.7.x.src.rpm
ftp://updates.redhat.com/7.1/en/os/SRPMS/iptables-1.2.5-3.src.rpm
ftp://updates.redhat.com/7.1/en/os/SRPMS/MAKEDEV-3.3-4.src.rpm
ftp://updates.redhat.com/7.1/en/os/SRPMS/hwcrypto-1.0-3.src.rpm
ftp://updates.redhat.com/7.1/en/os/SRPMS/modutils-2.4.18-3.7x.src.rpm
ftp://updates.redhat.com/7.1/en/os/SRPMS/kernel-utils-2.4-8.13.7.2.src.rpm
ftp://updates.redhat.com/7.1/en/os/SRPMS/kernel-2.4.9-40.src.rpm

alpha:
ftp://updates.redhat.com/7.1/en/os/alpha/iptables-1.2.5-3.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/iptables-ipv6-1.2.5-3.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/MAKEDEV-3.3-4.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/dev-3.3-4.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/modutils-2.4.18-3.7x.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/modutils-devel-2.4.18-3.7x.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/kernel-utils-2.4-8.13.7.2.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/kernel-2.4.9-40.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/kernel-smp-2.4.9-40.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/kernel-source-2.4.9-40.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/kernel-doc-2.4.9-40.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/kernel-BOOT-2.4.9-40.alpha.rpm

athlon:
ftp://updates.redhat.com/7.1/en/os/athlon/kernel-2.4.18-17.7.x.athlon.rpm
ftp://updates.redhat.com/7.1/en/os/athlon/kernel-smp-2.4.18-17.7.x.athlon.rpm

i386:
ftp://updates.redhat.com/7.1/en/os/i386/kernel-2.4.18-17.7.x.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/kernel-source-2.4.18-17.7.x.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/kernel-doc-2.4.18-17.7.x.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/kernel-BOOT-2.4.18-17.7.x.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/iptables-1.2.5-3.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/iptables-ipv6-1.2.5-3.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/MAKEDEV-3.3-4.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/hwcrypto-1.0-3.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/dev-3.3-4.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/modutils-2.4.18-3.7x.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/modutils-devel-2.4.18-3.7x.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/kernel-utils-2.4-8.13.7.2.i386.rpm

i586:
ftp://updates.redhat.com/7.1/en/os/i586/kernel-2.4.18-17.7.x.i586.rpm
ftp://updates.redhat.com/7.1/en/os/i586/kernel-smp-2.4.18-17.7.x.i586.rpm

i686:
ftp://updates.redhat.com/7.1/en/os/i686/kernel-2.4.18-17.7.x.i686.rpm
ftp://updates.redhat.com/7.1/en/os/i686/kernel-smp-2.4.18-17.7.x.i686.rpm
ftp://updates.redhat.com/7.1/en/os/i686/kernel-bigmem-2.4.18-17.7.x.i686.rpm
ftp://updates.redhat.com/7.1/en/os/i686/kernel-debug-2.4.18-17.7.x.i686.rpm

ia64:
ftp://updates.redhat.com/7.1/en/os/ia64/iptables-1.2.5-3.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/iptables-ipv6-1.2.5-3.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/MAKEDEV-3.3-4.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/dev-3.3-4.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/modutils-2.4.18-3.7x.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/modutils-devel-2.4.18-3.7x.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/kernel-2.4.9-40.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/kernel-smp-2.4.9-40.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/kernel-source-2.4.9-40.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/kernel-doc-2.4.9-40.ia64.rpm

Red Hat Linux 7.2:

SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/kernel-2.4.18-17.7.x.src.rpm
ftp://updates.redhat.com/7.2/en/os/SRPMS/iptables-1.2.5-3.src.rpm
ftp://updates.redhat.com/7.2/en/os/SRPMS/MAKEDEV-3.3-4.src.rpm
ftp://updates.redhat.com/7.2/en/os/SRPMS/hwcrypto-1.0-3.src.rpm
ftp://updates.redhat.com/7.2/en/os/SRPMS/modutils-2.4.18-3.7x.src.rpm
ftp://updates.redhat.com/7.2/en/os/SRPMS/kernel-utils-2.4-8.13.7.2.src.rpm
ftp://updates.redhat.com/7.2/en/os/SRPMS/kernel-2.4.9-40.src.rpm

athlon:
ftp://updates.redhat.com/7.2/en/os/athlon/kernel-2.4.18-17.7.x.athlon.rpm
ftp://updates.redhat.com/7.2/en/os/athlon/kernel-smp-2.4.18-17.7.x.athlon.rpm

i386:
ftp://updates.redhat.com/7.2/en/os/i386/kernel-2.4.18-17.7.x.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/kernel-source-2.4.18-17.7.x.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/kernel-doc-2.4.18-17.7.x.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/kernel-BOOT-2.4.18-17.7.x.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/iptables-1.2.5-3.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/iptables-ipv6-1.2.5-3.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/MAKEDEV-3.3-4.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/hwcrypto-1.0-3.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/dev-3.3-4.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/modutils-2.4.18-3.7x.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/modutils-devel-2.4.18-3.7x.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/kernel-utils-2.4-8.13.7.2.i386.rpm

i586:
ftp://updates.redhat.com/7.2/en/os/i586/kernel-2.4.18-17.7.x.i586.rpm
ftp://updates.redhat.com/7.2/en/os/i586/kernel-smp-2.4.18-17.7.x.i586.rpm

i686:
ftp://updates.redhat.com/7.2/en/os/i686/kernel-2.4.18-17.7.x.i686.rpm
ftp://updates.redhat.com/7.2/en/os/i686/kernel-smp-2.4.18-17.7.x.i686.rpm
ftp://updates.redhat.com/7.2/en/os/i686/kernel-bigmem-2.4.18-17.7.x.i686.rpm
ftp://updates.redhat.com/7.2/en/os/i686/kernel-debug-2.4.18-17.7.x.i686.rpm

ia64:
ftp://updates.redhat.com/7.2/en/os/ia64/iptables-1.2.5-3.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/iptables-ipv6-1.2.5-3.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/MAKEDEV-3.3-4.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/dev-3.3-4.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/modutils-2.4.18-3.7x.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/modutils-devel-2.4.18-3.7x.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/kernel-2.4.9-40.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/kernel-smp-2.4.9-40.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/kernel-source-2.4.9-40.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/kernel-doc-2.4.9-40.ia64.rpm



6. Verification:

MD5 sum                          Package Name
--------------------------------------------------------------------------
7a3d80b481167ce07aeddb64e65bff3e 7.1/en/os/SRPMS/MAKEDEV-3.3-4.src.rpm
49189033d3aabafd23eba5439e3b0f97 7.1/en/os/SRPMS/hwcrypto-1.0-3.src.rpm
75f0a1cd65f95580239f88e03ab04623 7.1/en/os/SRPMS/iptables-1.2.5-3.src.rpm
d0cf8ef64412c78c9d32da9d0cb9850d 7.1/en/os/SRPMS/kernel-2.4.18-17.7.x.src.rpm
7ae973d14afd4d1fa480cd5652651a8a 7.1/en/os/SRPMS/kernel-2.4.9-40.src.rpm
5390115158168e5e8e5d6fd90e3d1344 7.1/en/os/SRPMS/kernel-utils-2.4-8.13.7.2.src.rpm
0414620fa83d72ffd9f128be2e4bf430 7.1/en/os/SRPMS/modutils-2.4.18-3.7x.src.rpm
29d0771474e2ae9f877ed890b0e7c730 7.1/en/os/alpha/MAKEDEV-3.3-4.alpha.rpm
769b1f8cf0ec3e404ba8c055cb9e2e64 7.1/en/os/alpha/dev-3.3-4.alpha.rpm
faa55a585ae9e84eb5b2407f91a5aefd 7.1/en/os/alpha/iptables-1.2.5-3.alpha.rpm
4e51115bc4dbab708c6084678423e634 7.1/en/os/alpha/iptables-ipv6-1.2.5-3.alpha.rpm
24265eb70cf408b132d787de7beb23bc 7.1/en/os/alpha/kernel-2.4.9-40.alpha.rpm
bba867d5e20c1d39f6d4d8a1dcde427b 7.1/en/os/alpha/kernel-BOOT-2.4.9-40.alpha.rpm
de2b64811e68e30bd99d5d6912131e1f 7.1/en/os/alpha/kernel-doc-2.4.9-40.alpha.rpm
324c1df33969fe4eef80e11ad2279258 7.1/en/os/alpha/kernel-smp-2.4.9-40.alpha.rpm
acc0468afb4769887f300ead030b9653 7.1/en/os/alpha/kernel-source-2.4.9-40.alpha.rpm
1bdd50916955e8215758db837c4138b0 7.1/en/os/alpha/kernel-utils-2.4-8.13.7.2.alpha.rpm
db71f242273729a201e01aa1d7c55e6b 7.1/en/os/alpha/modutils-2.4.18-3.7x.alpha.rpm
6f477cc811f9930b1b418621401a0e7d 7.1/en/os/alpha/modutils-devel-2.4.18-3.7x.alpha.rpm
082114a540f7bd692476584e38c6cd5c 7.1/en/os/athlon/kernel-2.4.18-17.7.x.athlon.rpm
bd2fa5b6b721caf12dcea357304c008b 7.1/en/os/athlon/kernel-smp-2.4.18-17.7.x.athlon.rpm
b5bdf89f6810239c8074f135339c372b 7.1/en/os/i386/MAKEDEV-3.3-4.i386.rpm
e1c9bf91a11b6eddb9df51edf5af63cb 7.1/en/os/i386/dev-3.3-4.i386.rpm
92f18477c6b3dd5da4e3babe19a57c13 7.1/en/os/i386/hwcrypto-1.0-3.i386.rpm
11df2613702a118e43564d2ff077621a 7.1/en/os/i386/iptables-1.2.5-3.i386.rpm
e31d27e142c6fd23ea8508de07258f5e 7.1/en/os/i386/iptables-ipv6-1.2.5-3.i386.rpm
cfdef58820f5d7701f4221c80a7c821b 7.1/en/os/i386/kernel-2.4.18-17.7.x.i386.rpm
145d063537e3a34723d50e611cbd37a8 7.1/en/os/i386/kernel-BOOT-2.4.18-17.7.x.i386.rpm
8d9a20e2f4d82cc262cab928910377fa 7.1/en/os/i386/kernel-doc-2.4.18-17.7.x.i386.rpm
0344cc1d42651916fb91ed7a700f3f90 7.1/en/os/i386/kernel-source-2.4.18-17.7.x.i386.rpm
9d8fcfd1dcb2a3efed1519c56498cd71 7.1/en/os/i386/kernel-utils-2.4-8.13.7.2.i386.rpm
cddd8196a38dbff1a8e34429415670fb 7.1/en/os/i386/modutils-2.4.18-3.7x.i386.rpm
8c663b5015ba81b2ebef80307a37885f 7.1/en/os/i386/modutils-devel-2.4.18-3.7x.i386.rpm
576ceca80b035a10b942e6feb217c055 7.1/en/os/i586/kernel-2.4.18-17.7.x.i586.rpm
d9d2b3fa23ee4733b35fd730e9553625 7.1/en/os/i586/kernel-smp-2.4.18-17.7.x.i586.rpm
3a3afd67620fc36de17876629398dceb 7.1/en/os/i686/kernel-2.4.18-17.7.x.i686.rpm
fe9a658e1e22defc3cf5e2134646a6eb 7.1/en/os/i686/kernel-bigmem-2.4.18-17.7.x.i686.rpm
158c941a9b430581a7bcd23ec1398052 7.1/en/os/i686/kernel-debug-2.4.18-17.7.x.i686.rpm
f9e11d26c2ca35ef403656be882fb592 7.1/en/os/i686/kernel-smp-2.4.18-17.7.x.i686.rpm
31d745681c9e53b81147f5fc968a11c4 7.1/en/os/ia64/MAKEDEV-3.3-4.ia64.rpm
647cae518850399228a68da079b0cb7a 7.1/en/os/ia64/dev-3.3-4.ia64.rpm
9c3d09166d9a854028ecf2fe120a0824 7.1/en/os/ia64/iptables-1.2.5-3.ia64.rpm
7a498fd5b5e803ceb6afc65f9da9bd78 7.1/en/os/ia64/iptables-ipv6-1.2.5-3.ia64.rpm
35c17902e921f84e07202bc36c77bcbd 7.1/en/os/ia64/kernel-2.4.9-40.ia64.rpm
71757ded05ea9ec37fc81ce7459df3f3 7.1/en/os/ia64/kernel-doc-2.4.9-40.ia64.rpm
cb4a9c26a725e65169e5e82638a6f0be 7.1/en/os/ia64/kernel-smp-2.4.9-40.ia64.rpm
785bafa5b9b56338562f7a7b6f6db991 7.1/en/os/ia64/kernel-source-2.4.9-40.ia64.rpm
b2881ce4c011e08d32e817499c813974 7.1/en/os/ia64/modutils-2.4.18-3.7x.ia64.rpm
d1fbc32d6d55dad80129e0bef7360168 7.1/en/os/ia64/modutils-devel-2.4.18-3.7x.ia64.rpm
7a3d80b481167ce07aeddb64e65bff3e 7.2/en/os/SRPMS/MAKEDEV-3.3-4.src.rpm
49189033d3aabafd23eba5439e3b0f97 7.2/en/os/SRPMS/hwcrypto-1.0-3.src.rpm
75f0a1cd65f95580239f88e03ab04623 7.2/en/os/SRPMS/iptables-1.2.5-3.src.rpm
d0cf8ef64412c78c9d32da9d0cb9850d 7.2/en/os/SRPMS/kernel-2.4.18-17.7.x.src.rpm
7ae973d14afd4d1fa480cd5652651a8a 7.2/en/os/SRPMS/kernel-2.4.9-40.src.rpm
5390115158168e5e8e5d6fd90e3d1344 7.2/en/os/SRPMS/kernel-utils-2.4-8.13.7.2.src.rpm
0414620fa83d72ffd9f128be2e4bf430 7.2/en/os/SRPMS/modutils-2.4.18-3.7x.src.rpm
082114a540f7bd692476584e38c6cd5c 7.2/en/os/athlon/kernel-2.4.18-17.7.x.athlon.rpm
bd2fa5b6b721caf12dcea357304c008b 7.2/en/os/athlon/kernel-smp-2.4.18-17.7.x.athlon.rpm
b5bdf89f6810239c8074f135339c372b 7.2/en/os/i386/MAKEDEV-3.3-4.i386.rpm
e1c9bf91a11b6eddb9df51edf5af63cb 7.2/en/os/i386/dev-3.3-4.i386.rpm
92f18477c6b3dd5da4e3babe19a57c13 7.2/en/os/i386/hwcrypto-1.0-3.i386.rpm
11df2613702a118e43564d2ff077621a 7.2/en/os/i386/iptables-1.2.5-3.i386.rpm
e31d27e142c6fd23ea8508de07258f5e 7.2/en/os/i386/iptables-ipv6-1.2.5-3.i386.rpm
cfdef58820f5d7701f4221c80a7c821b 7.2/en/os/i386/kernel-2.4.18-17.7.x.i386.rpm
145d063537e3a34723d50e611cbd37a8 7.2/en/os/i386/kernel-BOOT-2.4.18-17.7.x.i386.rpm
8d9a20e2f4d82cc262cab928910377fa 7.2/en/os/i386/kernel-doc-2.4.18-17.7.x.i386.rpm
0344cc1d42651916fb91ed7a700f3f90 7.2/en/os/i386/kernel-source-2.4.18-17.7.x.i386.rpm
9d8fcfd1dcb2a3efed1519c56498cd71 7.2/en/os/i386/kernel-utils-2.4-8.13.7.2.i386.rpm
cddd8196a38dbff1a8e34429415670fb 7.2/en/os/i386/modutils-2.4.18-3.7x.i386.rpm
8c663b5015ba81b2ebef80307a37885f 7.2/en/os/i386/modutils-devel-2.4.18-3.7x.i386.rpm
576ceca80b035a10b942e6feb217c055 7.2/en/os/i586/kernel-2.4.18-17.7.x.i586.rpm
d9d2b3fa23ee4733b35fd730e9553625 7.2/en/os/i586/kernel-smp-2.4.18-17.7.x.i586.rpm
3a3afd67620fc36de17876629398dceb 7.2/en/os/i686/kernel-2.4.18-17.7.x.i686.rpm
fe9a658e1e22defc3cf5e2134646a6eb 7.2/en/os/i686/kernel-bigmem-2.4.18-17.7.x.i686.rpm
158c941a9b430581a7bcd23ec1398052 7.2/en/os/i686/kernel-debug-2.4.18-17.7.x.i686.rpm
f9e11d26c2ca35ef403656be882fb592 7.2/en/os/i686/kernel-smp-2.4.18-17.7.x.i686.rpm
31d745681c9e53b81147f5fc968a11c4 7.2/en/os/ia64/MAKEDEV-3.3-4.ia64.rpm
647cae518850399228a68da079b0cb7a 7.2/en/os/ia64/dev-3.3-4.ia64.rpm
9c3d09166d9a854028ecf2fe120a0824 7.2/en/os/ia64/iptables-1.2.5-3.ia64.rpm
7a498fd5b5e803ceb6afc65f9da9bd78 7.2/en/os/ia64/iptables-ipv6-1.2.5-3.ia64.rpm
35c17902e921f84e07202bc36c77bcbd 7.2/en/os/ia64/kernel-2.4.9-40.ia64.rpm
71757ded05ea9ec37fc81ce7459df3f3 7.2/en/os/ia64/kernel-doc-2.4.9-40.ia64.rpm
cb4a9c26a725e65169e5e82638a6f0be 7.2/en/os/ia64/kernel-smp-2.4.9-40.ia64.rpm
785bafa5b9b56338562f7a7b6f6db991 7.2/en/os/ia64/kernel-source-2.4.9-40.ia64.rpm
b2881ce4c011e08d32e817499c813974 7.2/en/os/ia64/modutils-2.4.18-3.7x.ia64.rpm
d1fbc32d6d55dad80129e0bef7360168 7.2/en/os/ia64/modutils-devel-2.4.18-3.7x.ia64.rpm


These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
    http://www.redhat.com/about/contact/pgpkey.html

You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>


7. References:

http://www.kernel.org/pub/linux/kernel/v2.4/


Copyright(c) 2000, 2001, 2002 Red Hat, Inc.



_____________________________________________
Redhat-watch-list mailing list
To unsubscribe, visit: https://listman.redhat.com/mailman/listinfo/redhat-watch-list