--------------------------------------------------------------------- Red Hat, Inc. Red Hat Security Advisory Synopsis: New kernel fixes local security issues Advisory ID: RHSA-2002:206-12 Issue date: 2002-09-23 Updated on: 2002-10-15 Product: Red Hat Linux Keywords: Cross references: Obsoletes: RHBA-2002:110 --------------------------------------------------------------------- 1. Topic: Updated kernel fixes local security issues and provides several updated drivers to support newer hardware and fix bugs under Red Hat Linux 7.3. 2. Relevant releases/architectures: Red Hat Linux 7.3 - athlon, i386, i586, i686, noarch Red Hat Linux 8.0 - athlon, i386, i586, i686, noarch 3. Problem description: The Linux kernel handles the basic functions of the operating system. A security code audit of the 2.4 kernel found a number of possible local security vulnerabilities which could allow a local user to obtain elevated (root) privileges. The vulnerabilities were found in the ixj telephony card driver, the pcilynx firewire driver, and the bttv video capture card driver. In addition, several drivers (e100, e1000, tg3n and IDE) have been updated to support newer hardware for Red Hat Linux 7.3, and a number of bugs have been fixed in IDE tapestreamer driver. All Red Hat Linux 7.3 and 8.0 users should upgrade to this errata kernel which is not vulnerable to these security issues. NOTE: As with the 8.0 release, IDE DMA on CD-ROM drives is disabled by default. If you are sure that your CD-ROM drive is capable of IDE DMA, place the following line in the /etc/modules.conf file: options ide-cd dma=1 Thanks to Silvio Cesare for finding the local security issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. The procedure for upgrading the kernel manually is documented at: http://www.redhat.com/support/docs/howto/kernel-upgrade/ Please read the directions for your architecture carefully before proceeding with the kernel upgrade. Please note that this update is also available via Red Hat Network. Many people find this to be an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. Note that you need to select the kernel explicitly on default configurations of up2date. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 73339 - apm locks up Asus A7N266VM (nForce chipset) 74879 - aha152x driver broken 71622 - cs4232 module is not auto-loaded on use 75107 - boot time in /proc/stat is incorrect 75113 - /proc/uptime shows wrong uptime (slightly) and idle time (totally) 74589 - speedstep doesn't work on IBM ThinkPad T30 (pentium 4) 6. RPMs required: Red Hat Linux 7.3: SRPMS: ftp://updates.redhat.com/7.3/en/os/SRPMS/kernel-2.4.18-17.7.x.src.rpm ftp://updates.redhat.com/7.3/en/os/SRPMS/hwdata-0.14.1-1.src.rpm ftp://updates.redhat.com/7.3/en/os/SRPMS/modutils-2.4.18-3.7x.src.rpm athlon: ftp://updates.redhat.com/7.3/en/os/athlon/kernel-2.4.18-17.7.x.athlon.rpm ftp://updates.redhat.com/7.3/en/os/athlon/kernel-smp-2.4.18-17.7.x.athlon.rpm i386: ftp://updates.redhat.com/7.3/en/os/i386/kernel-2.4.18-17.7.x.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/kernel-source-2.4.18-17.7.x.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/kernel-doc-2.4.18-17.7.x.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/kernel-BOOT-2.4.18-17.7.x.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/modutils-2.4.18-3.7x.i386.rpm i586: ftp://updates.redhat.com/7.3/en/os/i586/kernel-2.4.18-17.7.x.i586.rpm ftp://updates.redhat.com/7.3/en/os/i586/kernel-smp-2.4.18-17.7.x.i586.rpm i686: ftp://updates.redhat.com/7.3/en/os/i686/kernel-2.4.18-17.7.x.i686.rpm ftp://updates.redhat.com/7.3/en/os/i686/kernel-smp-2.4.18-17.7.x.i686.rpm ftp://updates.redhat.com/7.3/en/os/i686/kernel-bigmem-2.4.18-17.7.x.i686.rpm ftp://updates.redhat.com/7.3/en/os/i686/kernel-debug-2.4.18-17.7.x.i686.rpm noarch: ftp://updates.redhat.com/7.3/en/os/noarch/hwdata-0.14.1-1.noarch.rpm Red Hat Linux 8.0: SRPMS: ftp://updates.redhat.com/8.0/en/os/SRPMS/kernel-2.4.18-17.8.0.src.rpm ftp://updates.redhat.com/8.0/en/os/SRPMS/hwdata-0.48-1.src.rpm athlon: ftp://updates.redhat.com/8.0/en/os/athlon/kernel-2.4.18-17.8.0.athlon.rpm ftp://updates.redhat.com/8.0/en/os/athlon/kernel-smp-2.4.18-17.8.0.athlon.rpm i386: ftp://updates.redhat.com/8.0/en/os/i386/kernel-2.4.18-17.8.0.i386.rpm ftp://updates.redhat.com/8.0/en/os/i386/kernel-source-2.4.18-17.8.0.i386.rpm ftp://updates.redhat.com/8.0/en/os/i386/kernel-doc-2.4.18-17.8.0.i386.rpm ftp://updates.redhat.com/8.0/en/os/i386/kernel-BOOT-2.4.18-17.8.0.i386.rpm i586: ftp://updates.redhat.com/8.0/en/os/i586/kernel-2.4.18-17.8.0.i586.rpm ftp://updates.redhat.com/8.0/en/os/i586/kernel-smp-2.4.18-17.8.0.i586.rpm i686: ftp://updates.redhat.com/8.0/en/os/i686/kernel-2.4.18-17.8.0.i686.rpm ftp://updates.redhat.com/8.0/en/os/i686/kernel-smp-2.4.18-17.8.0.i686.rpm ftp://updates.redhat.com/8.0/en/os/i686/kernel-bigmem-2.4.18-17.8.0.i686.rpm ftp://updates.redhat.com/8.0/en/os/i686/kernel-debug-2.4.18-17.8.0.i686.rpm noarch: ftp://updates.redhat.com/8.0/en/os/noarch/hwdata-0.48-1.noarch.rpm 7. Verification: MD5 sum Package Name -------------------------------------------------------------------------- 5c742d695efa74cce26a070a018561b6 7.3/en/os/SRPMS/hwdata-0.14.1-1.src.rpm d0cf8ef64412c78c9d32da9d0cb9850d 7.3/en/os/SRPMS/kernel-2.4.18-17.7.x.src.rpm 0414620fa83d72ffd9f128be2e4bf430 7.3/en/os/SRPMS/modutils-2.4.18-3.7x.src.rpm 082114a540f7bd692476584e38c6cd5c 7.3/en/os/athlon/kernel-2.4.18-17.7.x.athlon.rpm bd2fa5b6b721caf12dcea357304c008b 7.3/en/os/athlon/kernel-smp-2.4.18-17.7.x.athlon.rpm cfdef58820f5d7701f4221c80a7c821b 7.3/en/os/i386/kernel-2.4.18-17.7.x.i386.rpm 145d063537e3a34723d50e611cbd37a8 7.3/en/os/i386/kernel-BOOT-2.4.18-17.7.x.i386.rpm 8d9a20e2f4d82cc262cab928910377fa 7.3/en/os/i386/kernel-doc-2.4.18-17.7.x.i386.rpm 0344cc1d42651916fb91ed7a700f3f90 7.3/en/os/i386/kernel-source-2.4.18-17.7.x.i386.rpm cddd8196a38dbff1a8e34429415670fb 7.3/en/os/i386/modutils-2.4.18-3.7x.i386.rpm 576ceca80b035a10b942e6feb217c055 7.3/en/os/i586/kernel-2.4.18-17.7.x.i586.rpm d9d2b3fa23ee4733b35fd730e9553625 7.3/en/os/i586/kernel-smp-2.4.18-17.7.x.i586.rpm 3a3afd67620fc36de17876629398dceb 7.3/en/os/i686/kernel-2.4.18-17.7.x.i686.rpm fe9a658e1e22defc3cf5e2134646a6eb 7.3/en/os/i686/kernel-bigmem-2.4.18-17.7.x.i686.rpm 158c941a9b430581a7bcd23ec1398052 7.3/en/os/i686/kernel-debug-2.4.18-17.7.x.i686.rpm f9e11d26c2ca35ef403656be882fb592 7.3/en/os/i686/kernel-smp-2.4.18-17.7.x.i686.rpm 100b8e47ecde440cca8122a08fb59b81 7.3/en/os/noarch/hwdata-0.14.1-1.noarch.rpm eb9d565f55332264a15afadfc2e2b1a6 8.0/en/os/SRPMS/hwdata-0.48-1.src.rpm 11c9a0e4224f20712b24805fd4e5f0be 8.0/en/os/SRPMS/kernel-2.4.18-17.8.0.src.rpm 0ccc7295596f093121f4e2ae9767ebd1 8.0/en/os/athlon/kernel-2.4.18-17.8.0.athlon.rpm e0e77e845a0b2e491150cf4e892d6c24 8.0/en/os/athlon/kernel-smp-2.4.18-17.8.0.athlon.rpm 47870d4e2b646a59c8ade167f38575e6 8.0/en/os/i386/kernel-2.4.18-17.8.0.i386.rpm 9e38f1aeebbc862dcf050b936dcc781e 8.0/en/os/i386/kernel-BOOT-2.4.18-17.8.0.i386.rpm 78734f41ea1ba399f0a7d60f7d46bb8f 8.0/en/os/i386/kernel-doc-2.4.18-17.8.0.i386.rpm c869e31fdd68ae7b1beae942282717b4 8.0/en/os/i386/kernel-source-2.4.18-17.8.0.i386.rpm 49a2d9c5add3431c395574c7456f5596 8.0/en/os/i586/kernel-2.4.18-17.8.0.i586.rpm 69ece85c6df4002f7e071c4b210c204f 8.0/en/os/i586/kernel-smp-2.4.18-17.8.0.i586.rpm f05ebe7ff48fea54ed013018f1133b5e 8.0/en/os/i686/kernel-2.4.18-17.8.0.i686.rpm 9b9a868c08b100dbd5c1f7458fd5331d 8.0/en/os/i686/kernel-bigmem-2.4.18-17.8.0.i686.rpm c8e06fe44752510d49ad227ab01f323c 8.0/en/os/i686/kernel-debug-2.4.18-17.8.0.i686.rpm f5efa4f4d8db58a413a41bc66c13c3da 8.0/en/os/i686/kernel-smp-2.4.18-17.8.0.i686.rpm d160a0e0aa78e76b5c9a7c229d516eb8 8.0/en/os/noarch/hwdata-0.48-1.noarch.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/about/contact/pgpkey.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.18 Copyright(c) 2000, 2001, 2002 Red Hat, Inc. _____________________________________________ --------------------------------------------------------------------- Red Hat, Inc. Red Hat Security Advisory Synopsis: New kernel 2.2 packages fix local vulnerabilities Advisory ID: RHSA-2002:210-06 Issue date: 2002-09-23 Updated on: 2002-10-10 Product: Red Hat Linux Keywords: elevated local root kernel Cross references: Obsoletes: RHSA-2001:142 --------------------------------------------------------------------- 1. Topic: Some potential local security vulnerabilities were found in the kernel during code audits; these have been fixed in the 2.2.22 kernel. 2. Relevant releases/architectures: Red Hat Linux 6.2 - alpha, i386, i586, i686, sparc, sparc64 Red Hat Linux 7.0 - alpha, i386, i586, i686 3. Problem description: The Linux kernel handles the basic functions of the operating system. A security code audit of the 2.2 kernel found a number of possible local security vulnerabilities. These vulnerabilities could allow a local user to obtain elevated (root) privileges. Red Hat Linux 6.2 and 7.0 shipped with the 2.2 kernel and are both vulnerable to these issues. All Red Hat Linux users using the 2.2 kernel should upgrade to the errata pacakages contaning the 2.2.22 kernel which are not vulnerable to these issues. Many thanks to Silvio Cesare and Solar Designer for their work in discovering these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. The procedure for upgrading the kernel is documented at: http://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html Please read the directions for your architecture carefully before proceeding with the kernel upgrade. Please note that this update is also available via Red Hat Network. Many people find this to be an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. Note that you need to select the kernel explicitly on default configurations of up2date. 5. RPMs required: Red Hat Linux 6.2: SRPMS: ftp://updates.redhat.com/6.2/en/os/SRPMS/kernel-2.2.22-6.2.2.src.rpm alpha: ftp://updates.redhat.com/6.2/en/os/alpha/kernel-enterprise-2.2.22-6.2.2.alpha.rpm ftp://updates.redhat.com/6.2/en/os/alpha/kernel-smp-2.2.22-6.2.2.alpha.rpm ftp://updates.redhat.com/6.2/en/os/alpha/kernel-2.2.22-6.2.2.alpha.rpm ftp://updates.redhat.com/6.2/en/os/alpha/kernel-BOOT-2.2.22-6.2.2.alpha.rpm ftp://updates.redhat.com/6.2/en/os/alpha/kernel-utils-2.2.22-6.2.2.alpha.rpm ftp://updates.redhat.com/6.2/en/os/alpha/kernel-doc-2.2.22-6.2.2.alpha.rpm ftp://updates.redhat.com/6.2/en/os/alpha/kernel-headers-2.2.22-6.2.2.alpha.rpm ftp://updates.redhat.com/6.2/en/os/alpha/kernel-source-2.2.22-6.2.2.alpha.rpm ftp://updates.redhat.com/6.2/en/os/alpha/kernel-jensen-2.2.22-6.2.2.alpha.rpm i386: ftp://updates.redhat.com/6.2/en/os/i386/kernel-smp-2.2.22-6.2.2.i386.rpm ftp://updates.redhat.com/6.2/en/os/i386/kernel-2.2.22-6.2.2.i386.rpm ftp://updates.redhat.com/6.2/en/os/i386/kernel-BOOT-2.2.22-6.2.2.i386.rpm ftp://updates.redhat.com/6.2/en/os/i386/kernel-ibcs-2.2.22-6.2.2.i386.rpm ftp://updates.redhat.com/6.2/en/os/i386/kernel-utils-2.2.22-6.2.2.i386.rpm ftp://updates.redhat.com/6.2/en/os/i386/kernel-pcmcia-cs-2.2.22-6.2.2.i386.rpm ftp://updates.redhat.com/6.2/en/os/i386/kernel-doc-2.2.22-6.2.2.i386.rpm ftp://updates.redhat.com/6.2/en/os/i386/kernel-headers-2.2.22-6.2.2.i386.rpm ftp://updates.redhat.com/6.2/en/os/i386/kernel-source-2.2.22-6.2.2.i386.rpm i586: ftp://updates.redhat.com/6.2/en/os/i586/kernel-smp-2.2.22-6.2.2.i586.rpm ftp://updates.redhat.com/6.2/en/os/i586/kernel-2.2.22-6.2.2.i586.rpm i686: ftp://updates.redhat.com/6.2/en/os/i686/kernel-enterprise-2.2.22-6.2.2.i686.rpm ftp://updates.redhat.com/6.2/en/os/i686/kernel-smp-2.2.22-6.2.2.i686.rpm ftp://updates.redhat.com/6.2/en/os/i686/kernel-2.2.22-6.2.2.i686.rpm Red Hat Linux 7.0: SRPMS: ftp://updates.redhat.com/7.0/en/os/SRPMS/kernel-2.2.22-7.0.2.src.rpm alpha: ftp://updates.redhat.com/7.0/en/os/alpha/kernel-enterprise-2.2.22-7.0.2.alpha.rpm ftp://updates.redhat.com/7.0/en/os/alpha/kernel-smp-2.2.22-7.0.2.alpha.rpm ftp://updates.redhat.com/7.0/en/os/alpha/kernel-2.2.22-7.0.2.alpha.rpm ftp://updates.redhat.com/7.0/en/os/alpha/kernel-BOOT-2.2.22-7.0.2.alpha.rpm ftp://updates.redhat.com/7.0/en/os/alpha/kernel-utils-2.2.22-7.0.2.alpha.rpm ftp://updates.redhat.com/7.0/en/os/alpha/kernel-doc-2.2.22-7.0.2.alpha.rpm ftp://updates.redhat.com/7.0/en/os/alpha/kernel-source-2.2.22-7.0.2.alpha.rpm ftp://updates.redhat.com/7.0/en/os/alpha/kernel-jensen-2.2.22-7.0.2.alpha.rpm i386: ftp://updates.redhat.com/7.0/en/os/i386/kernel-smp-2.2.22-7.0.2.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/kernel-2.2.22-7.0.2.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/kernel-BOOT-2.2.22-7.0.2.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/kernel-ibcs-2.2.22-7.0.2.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/kernel-utils-2.2.22-7.0.2.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/kernel-pcmcia-cs-2.2.22-7.0.2.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/kernel-doc-2.2.22-7.0.2.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/kernel-source-2.2.22-7.0.2.i386.rpm i586: ftp://updates.redhat.com/7.0/en/os/i586/kernel-smp-2.2.22-7.0.2.i586.rpm ftp://updates.redhat.com/7.0/en/os/i586/kernel-2.2.22-7.0.2.i586.rpm i686: ftp://updates.redhat.com/7.0/en/os/i686/kernel-enterprise-2.2.22-7.0.2.i686.rpm ftp://updates.redhat.com/7.0/en/os/i686/kernel-smp-2.2.22-7.0.2.i686.rpm ftp://updates.redhat.com/7.0/en/os/i686/kernel-2.2.22-7.0.2.i686.rpm 6. Verification: MD5 sum Package Name -------------------------------------------------------------------------- 17d2896d2f7fb9b6fb63128593e44cf7 6.2/en/os/SRPMS/kernel-2.2.22-6.2.2.src.rpm 934a473b6149c31aab29ffeb55d1bb33 6.2/en/os/alpha/kernel-2.2.22-6.2.2.alpha.rpm 3078540160bbcb03a9b087b8d3f02797 6.2/en/os/alpha/kernel-BOOT-2.2.22-6.2.2.alpha.rpm 78ad15c3d6e79f40906f660f337a41cf 6.2/en/os/alpha/kernel-doc-2.2.22-6.2.2.alpha.rpm df17f26a164abb1cc432a1601553c32c 6.2/en/os/alpha/kernel-enterprise-2.2.22-6.2.2.alpha.rpm 87d00fcd2b047605c3e6b2fcb2ed3550 6.2/en/os/alpha/kernel-headers-2.2.22-6.2.2.alpha.rpm f1357fd71e421012e86d57f5b8403b49 6.2/en/os/alpha/kernel-jensen-2.2.22-6.2.2.alpha.rpm d9848588d5b399e2e46dabef9dfa56a2 6.2/en/os/alpha/kernel-smp-2.2.22-6.2.2.alpha.rpm 2492a5eafc3a5369ee021f31acddc161 6.2/en/os/alpha/kernel-source-2.2.22-6.2.2.alpha.rpm f7866cc49775c8cc041a99630a8ccd8f 6.2/en/os/alpha/kernel-utils-2.2.22-6.2.2.alpha.rpm a8ed8ef5a2ab223ae3686b6c9332979d 6.2/en/os/i386/kernel-2.2.22-6.2.2.i386.rpm 415ee4e472766ff19818aa8f93959e06 6.2/en/os/i386/kernel-BOOT-2.2.22-6.2.2.i386.rpm f08d05768682829b67a96837135f5b3e 6.2/en/os/i386/kernel-doc-2.2.22-6.2.2.i386.rpm e0e5f8eaaa90337287056ecdf61a1b85 6.2/en/os/i386/kernel-headers-2.2.22-6.2.2.i386.rpm 6f1c7eee03bdce33b41c45882786a90c 6.2/en/os/i386/kernel-ibcs-2.2.22-6.2.2.i386.rpm 7fbb23912a3fff7d67bfff2fbb0e28af 6.2/en/os/i386/kernel-pcmcia-cs-2.2.22-6.2.2.i386.rpm d64f7291e28cbeef5606d66f33deb741 6.2/en/os/i386/kernel-smp-2.2.22-6.2.2.i386.rpm a1daa9363e733e772e3d14821cc39379 6.2/en/os/i386/kernel-source-2.2.22-6.2.2.i386.rpm 265b166a208ad120483e90b0ddb1e150 6.2/en/os/i386/kernel-utils-2.2.22-6.2.2.i386.rpm 0b7f92ce29dff3dc44cef4cf5e7b739a 6.2/en/os/i586/kernel-2.2.22-6.2.2.i586.rpm ddc59fcecc7d8c78f072bcb24cc81cc9 6.2/en/os/i586/kernel-smp-2.2.22-6.2.2.i586.rpm 256c8301d5ee1ddfe1835f52106fc8ae 6.2/en/os/i686/kernel-2.2.22-6.2.2.i686.rpm 9c5e0a7ef930677409e17b6874b0a64c 6.2/en/os/i686/kernel-enterprise-2.2.22-6.2.2.i686.rpm aa50bde6dbcfdccd105b094fb2a64b3e 6.2/en/os/i686/kernel-smp-2.2.22-6.2.2.i686.rpm 14c7af0e8c0d2eb4459e53457c711f6d 7.0/en/os/SRPMS/kernel-2.2.22-7.0.2.src.rpm 33b15c03cedaf29c677c11a4014c6fe0 7.0/en/os/alpha/kernel-2.2.22-7.0.2.alpha.rpm d0384d7a4b6537aad8f998e121fdc413 7.0/en/os/alpha/kernel-BOOT-2.2.22-7.0.2.alpha.rpm e1efc88a783d30235ee9772ec09e65da 7.0/en/os/alpha/kernel-doc-2.2.22-7.0.2.alpha.rpm bacb622d69236a51609495cb6613ff37 7.0/en/os/alpha/kernel-enterprise-2.2.22-7.0.2.alpha.rpm 836ffa5d2975669d1e81e66586d48733 7.0/en/os/alpha/kernel-jensen-2.2.22-7.0.2.alpha.rpm fc0ebba88dbbdf0af7ac00fda9f6dc64 7.0/en/os/alpha/kernel-smp-2.2.22-7.0.2.alpha.rpm 8bc6b2708e152fec14e9b1a1de0adfe1 7.0/en/os/alpha/kernel-source-2.2.22-7.0.2.alpha.rpm fdb3a29828d1f7b5a2592940a11f2cb6 7.0/en/os/alpha/kernel-utils-2.2.22-7.0.2.alpha.rpm c561988f01540db372bc01b8ae0c77d2 7.0/en/os/i386/kernel-2.2.22-7.0.2.i386.rpm 9d045b22d45c579b7482f6d748bc840a 7.0/en/os/i386/kernel-BOOT-2.2.22-7.0.2.i386.rpm 1865fbcf74b3f91c0d2d57f1753b4a47 7.0/en/os/i386/kernel-doc-2.2.22-7.0.2.i386.rpm 3d3c946eba48ced9b4b652335e674786 7.0/en/os/i386/kernel-ibcs-2.2.22-7.0.2.i386.rpm e840ba8a42aabb575b5be7f76d03315f 7.0/en/os/i386/kernel-pcmcia-cs-2.2.22-7.0.2.i386.rpm 179b363e1de74a4fc221efa8c65eb756 7.0/en/os/i386/kernel-smp-2.2.22-7.0.2.i386.rpm 24f087e27a87b1023bde1095e7319207 7.0/en/os/i386/kernel-source-2.2.22-7.0.2.i386.rpm fb444ec4b89b911f08da0560d779836a 7.0/en/os/i386/kernel-utils-2.2.22-7.0.2.i386.rpm 3c5b3eb12bafd6b17763822194d662b6 7.0/en/os/i586/kernel-2.2.22-7.0.2.i586.rpm d6ec7ae5f3f2b08df563c26f8143ec16 7.0/en/os/i586/kernel-smp-2.2.22-7.0.2.i586.rpm 815ea0a611884d4285d3e60ec64b689b 7.0/en/os/i686/kernel-2.2.22-7.0.2.i686.rpm 16d4f5bbc2360d2fdb6a662d0cf9b9cb 7.0/en/os/i686/kernel-enterprise-2.2.22-7.0.2.i686.rpm bc678bf0ce41901831fc585387a6d4d1 7.0/en/os/i686/kernel-smp-2.2.22-7.0.2.i686.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/about/contact/pgpkey.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 7. References: http://www.kernel.org/pub/linux/kernel/v2.2/ChangeLog-2.2.22 Copyright(c) 2000, 2001, 2002 Red Hat, Inc. _____________________________________________ --------------------------------------------------------------------- Red Hat, Inc. Red Hat Security Advisory Synopsis: New kernel fixes local security issues Advisory ID: RHSA-2002:205-15 Issue date: 2002-09-20 Updated on: 2002-10-15 Product: Red Hat Linux Keywords: Cross references: Obsoletes: RHEA-2002:082 --------------------------------------------------------------------- 1. Topic: A new errata kernel based on the 2.4.18 kernel is available for Red Hat Linux 7.1 and Red Hat Linux 7.2 users. This is a major version change compared to the previous errata kernel for these releases (2.4.9-34). 2. Relevant releases/architectures: Red Hat Linux 7.1 - alpha, athlon, i386, i586, i686, ia64 Red Hat Linux 7.2 - athlon, i386, i586, i686, ia64 3. Problem description: The Linux kernel handles the basic functions of the operating system. A security code audit of the 2.4 kernel found a number of possible local security vulnerabilities. These vulnerabilities may allow a local user to obtain elevated (root) privileges, however no exploits are known to exist at the time of this errata release. Changes in the errata 2.4.18 kernel include the addition of the intermezzo file system, the ComX serial port driver, the PC bit ISDN driver, and the generic ISDN layer. Also, several USB drivers and firewire drivers have been added and many other device drivers have been updated. Other features of the 2.4.18 errata kernel include a much-improved VM subsystem, better interactive performance, and support for new hardware, such as USB2 devices and large IDE disks. A full description of the updated kernel can be found in the kernel changelogs at http://www.kernelnewbies.org/changelogs. IMPORTANT: For alpha and ia64 architectures, kernel version 2.4.9-40 is provided instead of 2.4.18. This errata kernel contains important backported security fixes. NOTE: As with the 8.0 release, IDE DMA on CD-ROM drives is disabled by default. If you are sure that your CD-ROM drive is capable of IDE DMA, place the following line in the /etc/modules.conf file: options ide-cd dma=1 All users of Red Hat Linux 7.1 and 7.2 should update to these errata packages. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. The procedure for upgrading the kernel manually is documented at: http://www.redhat.com/support/docs/howto/kernel-upgrade/ Please read the directions for your architecture carefully before proceeding with the kernel upgrade. Please note that this update is also available via Red Hat Network. Many people find this to be an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. Note that you need to select the kernel explicitly on default configurations of up2date. 5. RPMs required: Red Hat Linux 7.1: SRPMS: ftp://updates.redhat.com/7.1/en/os/SRPMS/kernel-2.4.18-17.7.x.src.rpm ftp://updates.redhat.com/7.1/en/os/SRPMS/iptables-1.2.5-3.src.rpm ftp://updates.redhat.com/7.1/en/os/SRPMS/MAKEDEV-3.3-4.src.rpm ftp://updates.redhat.com/7.1/en/os/SRPMS/hwcrypto-1.0-3.src.rpm ftp://updates.redhat.com/7.1/en/os/SRPMS/modutils-2.4.18-3.7x.src.rpm ftp://updates.redhat.com/7.1/en/os/SRPMS/kernel-utils-2.4-8.13.7.2.src.rpm ftp://updates.redhat.com/7.1/en/os/SRPMS/kernel-2.4.9-40.src.rpm alpha: ftp://updates.redhat.com/7.1/en/os/alpha/iptables-1.2.5-3.alpha.rpm ftp://updates.redhat.com/7.1/en/os/alpha/iptables-ipv6-1.2.5-3.alpha.rpm ftp://updates.redhat.com/7.1/en/os/alpha/MAKEDEV-3.3-4.alpha.rpm ftp://updates.redhat.com/7.1/en/os/alpha/dev-3.3-4.alpha.rpm ftp://updates.redhat.com/7.1/en/os/alpha/modutils-2.4.18-3.7x.alpha.rpm ftp://updates.redhat.com/7.1/en/os/alpha/modutils-devel-2.4.18-3.7x.alpha.rpm ftp://updates.redhat.com/7.1/en/os/alpha/kernel-utils-2.4-8.13.7.2.alpha.rpm ftp://updates.redhat.com/7.1/en/os/alpha/kernel-2.4.9-40.alpha.rpm ftp://updates.redhat.com/7.1/en/os/alpha/kernel-smp-2.4.9-40.alpha.rpm ftp://updates.redhat.com/7.1/en/os/alpha/kernel-source-2.4.9-40.alpha.rpm ftp://updates.redhat.com/7.1/en/os/alpha/kernel-doc-2.4.9-40.alpha.rpm ftp://updates.redhat.com/7.1/en/os/alpha/kernel-BOOT-2.4.9-40.alpha.rpm athlon: ftp://updates.redhat.com/7.1/en/os/athlon/kernel-2.4.18-17.7.x.athlon.rpm ftp://updates.redhat.com/7.1/en/os/athlon/kernel-smp-2.4.18-17.7.x.athlon.rpm i386: ftp://updates.redhat.com/7.1/en/os/i386/kernel-2.4.18-17.7.x.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/kernel-source-2.4.18-17.7.x.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/kernel-doc-2.4.18-17.7.x.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/kernel-BOOT-2.4.18-17.7.x.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/iptables-1.2.5-3.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/iptables-ipv6-1.2.5-3.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/MAKEDEV-3.3-4.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/hwcrypto-1.0-3.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/dev-3.3-4.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/modutils-2.4.18-3.7x.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/modutils-devel-2.4.18-3.7x.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/kernel-utils-2.4-8.13.7.2.i386.rpm i586: ftp://updates.redhat.com/7.1/en/os/i586/kernel-2.4.18-17.7.x.i586.rpm ftp://updates.redhat.com/7.1/en/os/i586/kernel-smp-2.4.18-17.7.x.i586.rpm i686: ftp://updates.redhat.com/7.1/en/os/i686/kernel-2.4.18-17.7.x.i686.rpm ftp://updates.redhat.com/7.1/en/os/i686/kernel-smp-2.4.18-17.7.x.i686.rpm ftp://updates.redhat.com/7.1/en/os/i686/kernel-bigmem-2.4.18-17.7.x.i686.rpm ftp://updates.redhat.com/7.1/en/os/i686/kernel-debug-2.4.18-17.7.x.i686.rpm ia64: ftp://updates.redhat.com/7.1/en/os/ia64/iptables-1.2.5-3.ia64.rpm ftp://updates.redhat.com/7.1/en/os/ia64/iptables-ipv6-1.2.5-3.ia64.rpm ftp://updates.redhat.com/7.1/en/os/ia64/MAKEDEV-3.3-4.ia64.rpm ftp://updates.redhat.com/7.1/en/os/ia64/dev-3.3-4.ia64.rpm ftp://updates.redhat.com/7.1/en/os/ia64/modutils-2.4.18-3.7x.ia64.rpm ftp://updates.redhat.com/7.1/en/os/ia64/modutils-devel-2.4.18-3.7x.ia64.rpm ftp://updates.redhat.com/7.1/en/os/ia64/kernel-2.4.9-40.ia64.rpm ftp://updates.redhat.com/7.1/en/os/ia64/kernel-smp-2.4.9-40.ia64.rpm ftp://updates.redhat.com/7.1/en/os/ia64/kernel-source-2.4.9-40.ia64.rpm ftp://updates.redhat.com/7.1/en/os/ia64/kernel-doc-2.4.9-40.ia64.rpm Red Hat Linux 7.2: SRPMS: ftp://updates.redhat.com/7.2/en/os/SRPMS/kernel-2.4.18-17.7.x.src.rpm ftp://updates.redhat.com/7.2/en/os/SRPMS/iptables-1.2.5-3.src.rpm ftp://updates.redhat.com/7.2/en/os/SRPMS/MAKEDEV-3.3-4.src.rpm ftp://updates.redhat.com/7.2/en/os/SRPMS/hwcrypto-1.0-3.src.rpm ftp://updates.redhat.com/7.2/en/os/SRPMS/modutils-2.4.18-3.7x.src.rpm ftp://updates.redhat.com/7.2/en/os/SRPMS/kernel-utils-2.4-8.13.7.2.src.rpm ftp://updates.redhat.com/7.2/en/os/SRPMS/kernel-2.4.9-40.src.rpm athlon: ftp://updates.redhat.com/7.2/en/os/athlon/kernel-2.4.18-17.7.x.athlon.rpm ftp://updates.redhat.com/7.2/en/os/athlon/kernel-smp-2.4.18-17.7.x.athlon.rpm i386: ftp://updates.redhat.com/7.2/en/os/i386/kernel-2.4.18-17.7.x.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/kernel-source-2.4.18-17.7.x.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/kernel-doc-2.4.18-17.7.x.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/kernel-BOOT-2.4.18-17.7.x.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/iptables-1.2.5-3.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/iptables-ipv6-1.2.5-3.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/MAKEDEV-3.3-4.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/hwcrypto-1.0-3.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/dev-3.3-4.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/modutils-2.4.18-3.7x.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/modutils-devel-2.4.18-3.7x.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/kernel-utils-2.4-8.13.7.2.i386.rpm i586: ftp://updates.redhat.com/7.2/en/os/i586/kernel-2.4.18-17.7.x.i586.rpm ftp://updates.redhat.com/7.2/en/os/i586/kernel-smp-2.4.18-17.7.x.i586.rpm i686: ftp://updates.redhat.com/7.2/en/os/i686/kernel-2.4.18-17.7.x.i686.rpm ftp://updates.redhat.com/7.2/en/os/i686/kernel-smp-2.4.18-17.7.x.i686.rpm ftp://updates.redhat.com/7.2/en/os/i686/kernel-bigmem-2.4.18-17.7.x.i686.rpm ftp://updates.redhat.com/7.2/en/os/i686/kernel-debug-2.4.18-17.7.x.i686.rpm ia64: ftp://updates.redhat.com/7.2/en/os/ia64/iptables-1.2.5-3.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/iptables-ipv6-1.2.5-3.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/MAKEDEV-3.3-4.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/dev-3.3-4.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/modutils-2.4.18-3.7x.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/modutils-devel-2.4.18-3.7x.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/kernel-2.4.9-40.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/kernel-smp-2.4.9-40.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/kernel-source-2.4.9-40.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/kernel-doc-2.4.9-40.ia64.rpm 6. Verification: MD5 sum Package Name -------------------------------------------------------------------------- 7a3d80b481167ce07aeddb64e65bff3e 7.1/en/os/SRPMS/MAKEDEV-3.3-4.src.rpm 49189033d3aabafd23eba5439e3b0f97 7.1/en/os/SRPMS/hwcrypto-1.0-3.src.rpm 75f0a1cd65f95580239f88e03ab04623 7.1/en/os/SRPMS/iptables-1.2.5-3.src.rpm d0cf8ef64412c78c9d32da9d0cb9850d 7.1/en/os/SRPMS/kernel-2.4.18-17.7.x.src.rpm 7ae973d14afd4d1fa480cd5652651a8a 7.1/en/os/SRPMS/kernel-2.4.9-40.src.rpm 5390115158168e5e8e5d6fd90e3d1344 7.1/en/os/SRPMS/kernel-utils-2.4-8.13.7.2.src.rpm 0414620fa83d72ffd9f128be2e4bf430 7.1/en/os/SRPMS/modutils-2.4.18-3.7x.src.rpm 29d0771474e2ae9f877ed890b0e7c730 7.1/en/os/alpha/MAKEDEV-3.3-4.alpha.rpm 769b1f8cf0ec3e404ba8c055cb9e2e64 7.1/en/os/alpha/dev-3.3-4.alpha.rpm faa55a585ae9e84eb5b2407f91a5aefd 7.1/en/os/alpha/iptables-1.2.5-3.alpha.rpm 4e51115bc4dbab708c6084678423e634 7.1/en/os/alpha/iptables-ipv6-1.2.5-3.alpha.rpm 24265eb70cf408b132d787de7beb23bc 7.1/en/os/alpha/kernel-2.4.9-40.alpha.rpm bba867d5e20c1d39f6d4d8a1dcde427b 7.1/en/os/alpha/kernel-BOOT-2.4.9-40.alpha.rpm de2b64811e68e30bd99d5d6912131e1f 7.1/en/os/alpha/kernel-doc-2.4.9-40.alpha.rpm 324c1df33969fe4eef80e11ad2279258 7.1/en/os/alpha/kernel-smp-2.4.9-40.alpha.rpm acc0468afb4769887f300ead030b9653 7.1/en/os/alpha/kernel-source-2.4.9-40.alpha.rpm 1bdd50916955e8215758db837c4138b0 7.1/en/os/alpha/kernel-utils-2.4-8.13.7.2.alpha.rpm db71f242273729a201e01aa1d7c55e6b 7.1/en/os/alpha/modutils-2.4.18-3.7x.alpha.rpm 6f477cc811f9930b1b418621401a0e7d 7.1/en/os/alpha/modutils-devel-2.4.18-3.7x.alpha.rpm 082114a540f7bd692476584e38c6cd5c 7.1/en/os/athlon/kernel-2.4.18-17.7.x.athlon.rpm bd2fa5b6b721caf12dcea357304c008b 7.1/en/os/athlon/kernel-smp-2.4.18-17.7.x.athlon.rpm b5bdf89f6810239c8074f135339c372b 7.1/en/os/i386/MAKEDEV-3.3-4.i386.rpm e1c9bf91a11b6eddb9df51edf5af63cb 7.1/en/os/i386/dev-3.3-4.i386.rpm 92f18477c6b3dd5da4e3babe19a57c13 7.1/en/os/i386/hwcrypto-1.0-3.i386.rpm 11df2613702a118e43564d2ff077621a 7.1/en/os/i386/iptables-1.2.5-3.i386.rpm e31d27e142c6fd23ea8508de07258f5e 7.1/en/os/i386/iptables-ipv6-1.2.5-3.i386.rpm cfdef58820f5d7701f4221c80a7c821b 7.1/en/os/i386/kernel-2.4.18-17.7.x.i386.rpm 145d063537e3a34723d50e611cbd37a8 7.1/en/os/i386/kernel-BOOT-2.4.18-17.7.x.i386.rpm 8d9a20e2f4d82cc262cab928910377fa 7.1/en/os/i386/kernel-doc-2.4.18-17.7.x.i386.rpm 0344cc1d42651916fb91ed7a700f3f90 7.1/en/os/i386/kernel-source-2.4.18-17.7.x.i386.rpm 9d8fcfd1dcb2a3efed1519c56498cd71 7.1/en/os/i386/kernel-utils-2.4-8.13.7.2.i386.rpm cddd8196a38dbff1a8e34429415670fb 7.1/en/os/i386/modutils-2.4.18-3.7x.i386.rpm 8c663b5015ba81b2ebef80307a37885f 7.1/en/os/i386/modutils-devel-2.4.18-3.7x.i386.rpm 576ceca80b035a10b942e6feb217c055 7.1/en/os/i586/kernel-2.4.18-17.7.x.i586.rpm d9d2b3fa23ee4733b35fd730e9553625 7.1/en/os/i586/kernel-smp-2.4.18-17.7.x.i586.rpm 3a3afd67620fc36de17876629398dceb 7.1/en/os/i686/kernel-2.4.18-17.7.x.i686.rpm fe9a658e1e22defc3cf5e2134646a6eb 7.1/en/os/i686/kernel-bigmem-2.4.18-17.7.x.i686.rpm 158c941a9b430581a7bcd23ec1398052 7.1/en/os/i686/kernel-debug-2.4.18-17.7.x.i686.rpm f9e11d26c2ca35ef403656be882fb592 7.1/en/os/i686/kernel-smp-2.4.18-17.7.x.i686.rpm 31d745681c9e53b81147f5fc968a11c4 7.1/en/os/ia64/MAKEDEV-3.3-4.ia64.rpm 647cae518850399228a68da079b0cb7a 7.1/en/os/ia64/dev-3.3-4.ia64.rpm 9c3d09166d9a854028ecf2fe120a0824 7.1/en/os/ia64/iptables-1.2.5-3.ia64.rpm 7a498fd5b5e803ceb6afc65f9da9bd78 7.1/en/os/ia64/iptables-ipv6-1.2.5-3.ia64.rpm 35c17902e921f84e07202bc36c77bcbd 7.1/en/os/ia64/kernel-2.4.9-40.ia64.rpm 71757ded05ea9ec37fc81ce7459df3f3 7.1/en/os/ia64/kernel-doc-2.4.9-40.ia64.rpm cb4a9c26a725e65169e5e82638a6f0be 7.1/en/os/ia64/kernel-smp-2.4.9-40.ia64.rpm 785bafa5b9b56338562f7a7b6f6db991 7.1/en/os/ia64/kernel-source-2.4.9-40.ia64.rpm b2881ce4c011e08d32e817499c813974 7.1/en/os/ia64/modutils-2.4.18-3.7x.ia64.rpm d1fbc32d6d55dad80129e0bef7360168 7.1/en/os/ia64/modutils-devel-2.4.18-3.7x.ia64.rpm 7a3d80b481167ce07aeddb64e65bff3e 7.2/en/os/SRPMS/MAKEDEV-3.3-4.src.rpm 49189033d3aabafd23eba5439e3b0f97 7.2/en/os/SRPMS/hwcrypto-1.0-3.src.rpm 75f0a1cd65f95580239f88e03ab04623 7.2/en/os/SRPMS/iptables-1.2.5-3.src.rpm d0cf8ef64412c78c9d32da9d0cb9850d 7.2/en/os/SRPMS/kernel-2.4.18-17.7.x.src.rpm 7ae973d14afd4d1fa480cd5652651a8a 7.2/en/os/SRPMS/kernel-2.4.9-40.src.rpm 5390115158168e5e8e5d6fd90e3d1344 7.2/en/os/SRPMS/kernel-utils-2.4-8.13.7.2.src.rpm 0414620fa83d72ffd9f128be2e4bf430 7.2/en/os/SRPMS/modutils-2.4.18-3.7x.src.rpm 082114a540f7bd692476584e38c6cd5c 7.2/en/os/athlon/kernel-2.4.18-17.7.x.athlon.rpm bd2fa5b6b721caf12dcea357304c008b 7.2/en/os/athlon/kernel-smp-2.4.18-17.7.x.athlon.rpm b5bdf89f6810239c8074f135339c372b 7.2/en/os/i386/MAKEDEV-3.3-4.i386.rpm e1c9bf91a11b6eddb9df51edf5af63cb 7.2/en/os/i386/dev-3.3-4.i386.rpm 92f18477c6b3dd5da4e3babe19a57c13 7.2/en/os/i386/hwcrypto-1.0-3.i386.rpm 11df2613702a118e43564d2ff077621a 7.2/en/os/i386/iptables-1.2.5-3.i386.rpm e31d27e142c6fd23ea8508de07258f5e 7.2/en/os/i386/iptables-ipv6-1.2.5-3.i386.rpm cfdef58820f5d7701f4221c80a7c821b 7.2/en/os/i386/kernel-2.4.18-17.7.x.i386.rpm 145d063537e3a34723d50e611cbd37a8 7.2/en/os/i386/kernel-BOOT-2.4.18-17.7.x.i386.rpm 8d9a20e2f4d82cc262cab928910377fa 7.2/en/os/i386/kernel-doc-2.4.18-17.7.x.i386.rpm 0344cc1d42651916fb91ed7a700f3f90 7.2/en/os/i386/kernel-source-2.4.18-17.7.x.i386.rpm 9d8fcfd1dcb2a3efed1519c56498cd71 7.2/en/os/i386/kernel-utils-2.4-8.13.7.2.i386.rpm cddd8196a38dbff1a8e34429415670fb 7.2/en/os/i386/modutils-2.4.18-3.7x.i386.rpm 8c663b5015ba81b2ebef80307a37885f 7.2/en/os/i386/modutils-devel-2.4.18-3.7x.i386.rpm 576ceca80b035a10b942e6feb217c055 7.2/en/os/i586/kernel-2.4.18-17.7.x.i586.rpm d9d2b3fa23ee4733b35fd730e9553625 7.2/en/os/i586/kernel-smp-2.4.18-17.7.x.i586.rpm 3a3afd67620fc36de17876629398dceb 7.2/en/os/i686/kernel-2.4.18-17.7.x.i686.rpm fe9a658e1e22defc3cf5e2134646a6eb 7.2/en/os/i686/kernel-bigmem-2.4.18-17.7.x.i686.rpm 158c941a9b430581a7bcd23ec1398052 7.2/en/os/i686/kernel-debug-2.4.18-17.7.x.i686.rpm f9e11d26c2ca35ef403656be882fb592 7.2/en/os/i686/kernel-smp-2.4.18-17.7.x.i686.rpm 31d745681c9e53b81147f5fc968a11c4 7.2/en/os/ia64/MAKEDEV-3.3-4.ia64.rpm 647cae518850399228a68da079b0cb7a 7.2/en/os/ia64/dev-3.3-4.ia64.rpm 9c3d09166d9a854028ecf2fe120a0824 7.2/en/os/ia64/iptables-1.2.5-3.ia64.rpm 7a498fd5b5e803ceb6afc65f9da9bd78 7.2/en/os/ia64/iptables-ipv6-1.2.5-3.ia64.rpm 35c17902e921f84e07202bc36c77bcbd 7.2/en/os/ia64/kernel-2.4.9-40.ia64.rpm 71757ded05ea9ec37fc81ce7459df3f3 7.2/en/os/ia64/kernel-doc-2.4.9-40.ia64.rpm cb4a9c26a725e65169e5e82638a6f0be 7.2/en/os/ia64/kernel-smp-2.4.9-40.ia64.rpm 785bafa5b9b56338562f7a7b6f6db991 7.2/en/os/ia64/kernel-source-2.4.9-40.ia64.rpm b2881ce4c011e08d32e817499c813974 7.2/en/os/ia64/modutils-2.4.18-3.7x.ia64.rpm d1fbc32d6d55dad80129e0bef7360168 7.2/en/os/ia64/modutils-devel-2.4.18-3.7x.ia64.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/about/contact/pgpkey.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 7. References: http://www.kernel.org/pub/linux/kernel/v2.4/ Copyright(c) 2000, 2001, 2002 Red Hat, Inc. _____________________________________________ Redhat-watch-list mailing list To unsubscribe, visit: https://listman.redhat.com/mailman/listinfo/redhat-watch-list
Red Hat Linux Advisories: Kernels 2.2, 2.4
By
Get the Free Newsletter!
Subscribe to Developer Insider for top news, trends, & analysis