trousers-0.3.15-1.el8
エラータID: AXSA:2021-1817:01
TrouSerS is an implementation of the Trusted Computing Group's Software Stack (TSS) specification. TrouSerS enables the user to write applications that make use of the Trusted Platform Module (TPM) hardware.
The following packages have been upgraded to a later upstream version: trousers (0.3.15).
Security Fix(es):
* trousers: tss user still has read and write access to the /etc/tcsd.conf file if tcsd is started as root (CVE-2020-24331)
* trousers: tss user can be used to create or corrupt existing files, this could lead to DoS (CVE-2020-24332)
* trousers: fails to drop the root gid privilege when no longer needed (CVE-2020-24330)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
Update to version 0.3.15-1
CVE-2020-24330
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges instead of by the tss user, it fails to drop the root gid privilege when no longer needed.
CVE-2020-24331
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the tss user still has read and write access to the /etc/tcsd.conf file (which contains various settings related to this daemon).
CVE-2020-24332
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the creation of the system.data file is prone to symlink attacks. The tss user can be used to create or corrupt existing files, which could possibly lead to a DoS attack.
Update packages.
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges instead of by the tss user, it fails to drop the root gid privilege when no longer needed.
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the tss user still has read and write access to the /etc/tcsd.conf file (which contains various settings related to this daemon).
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the creation of the system.data file is prone to symlink attacks. The tss user can be used to create or corrupt existing files, which could possibly lead to a DoS attack.
N/A
SRPMS
- trousers-0.3.15-1.el8.src.rpm
MD5: 417875bf5e62be73b22943df9ae2bef9
SHA-256: d29bbe76353a30095330466939d5570e06a5fa4e89211ec7a26f26f5bab85a1d
Size: 4.50 MB
Asianux Server 8 for x86_64
- trousers-0.3.15-1.el8.x86_64.rpm
MD5: 300a42990c315b562b0b27b422f4e88c
SHA-256: ee34a0f4d184d727ffa1ad6bd59323facaefb2f77d75158fb7c43b359f0b6bff
Size: 151.42 kB - trousers-lib-0.3.15-1.el8.x86_64.rpm
MD5: f5ae254edd33480ba75a0e1d1ec69a31
SHA-256: ca969e146e61bc5ac723dfce529fc53fdae756e105229a04e5fd5e0da4b96cde
Size: 166.46 kB - trousers-lib-0.3.15-1.el8.i686.rpm
MD5: ec798326514f02353146943ef952451b
SHA-256: eaa9e986964d84fc148fa7ace69380d1a31314f6dc2ef44d039d14dd7267b99a
Size: 187.41 kB