[LWN Logo]
[Timeline]
Date:         Fri, 9 Jun 2000 17:11:41 +0200
From: Oystein Viggen <oysteivi@TRUSTIX.COM>
Subject:      Trustix Security Advisory
To: BUGTRAQ@SECURITYFOCUS.COM

Hi

The now fairly well known capability bug in the Linux kernel, also
indirectly affects Trustix Secure Linux 1.00 and 1.01.

While it has not been proven that any software shipped with TSL 1.0x can
be used to exploit this bug, we know that many of our users add their
own packages to their servers, making us indirectly susceptible to
exploits.

We have therefore chosen to release packages for TSL 1.01 containing
version 2.2.16 of the kernel, in which the hole is fixed. These files
can be found at:

ftp://ftp.trustix.com/pub/Trustix/updates/1.01/RPMS.

The md5 sums for the new packages are:

43b6ed5d67cee161f4cabc10eb2da89c  kernel-2.2.16-1tr_1.01.i586.rpm
5a8752eee9274e1f2f3aa528573e6ccd  kernel-BOOT-2.2.16-1tr_1.01.i586.rpm
009b6010b2040838558e517e38025cd2  kernel-doc-2.2.16-1tr_1.01.i586.rpm
8521eaea2aff56b3c264e43190a82e42  kernel-headers-2.2.16-1tr_1.01.i586.rpm
f1434dee12ff347c2287de6d0ff22258  kernel-smp-2.2.16-1tr_1.01.i586.rpm
6cbf9f025a214cac3adbfb7dfb7a5d7f  kernel-source-2.2.16-1tr_1.01.i586.rpm
56891d3e630148d4e93df8ca188cef9e  kernel-utils-2.2.16-1tr_1.01.i586.rpm

A short howto on installing the packages can be found at:

http://www.trustix.net/doc/kernel-upgrade/kernel-upgrade.html

Users of TSL 1.00 should use the 1.01 packages, as the two versions of
the distribution are fairly similar.

It should also be added that the newest beta release, TSL 1.0.96,
already contains the upgraded kernel, and is therefore not vulnerable.

Oystein Viggen
--
TSL developer