Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email hr@neohapsis.com
Subject: Trustix Security Advisory
From: Oystein Viggen (oysteiviTRUSTIX.COM)
Date: Fri Jun 09 2000 - 10:11:41 CDT


The now fairly well known capability bug in the Linux kernel, also
indirectly affects Trustix Secure Linux 1.00 and 1.01.

While it has not been proven that any software shipped with TSL 1.0x can
be used to exploit this bug, we know that many of our users add their
own packages to their servers, making us indirectly susceptible to

We have therefore chosen to release packages for TSL 1.01 containing
version 2.2.16 of the kernel, in which the hole is fixed. These files
can be found at:


The md5 sums for the new packages are:

43b6ed5d67cee161f4cabc10eb2da89c kernel-2.2.16-1tr_1.01.i586.rpm
5a8752eee9274e1f2f3aa528573e6ccd kernel-BOOT-2.2.16-1tr_1.01.i586.rpm
009b6010b2040838558e517e38025cd2 kernel-doc-2.2.16-1tr_1.01.i586.rpm
8521eaea2aff56b3c264e43190a82e42 kernel-headers-2.2.16-1tr_1.01.i586.rpm
f1434dee12ff347c2287de6d0ff22258 kernel-smp-2.2.16-1tr_1.01.i586.rpm
6cbf9f025a214cac3adbfb7dfb7a5d7f kernel-source-2.2.16-1tr_1.01.i586.rpm
56891d3e630148d4e93df8ca188cef9e kernel-utils-2.2.16-1tr_1.01.i586.rpm

A short howto on installing the packages can be found at:


Users of TSL 1.00 should use the 1.01 packages, as the two versions of
the distribution are fairly similar.

It should also be added that the newest beta release, TSL 1.0.96,
already contains the upgraded kernel, and is therefore not vulnerable.

Oystein Viggen

TSL developer