You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa trousers

Sigurnosni nedostaci programskog paketa trousers

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2020-ab3dace708
2020-11-05 01:02:23.473495
——————————————————————————–

Name : trousers
Product : Fedora 33
Version : 0.3.14
Release : 4.fc33
URL : http://trousers.sourceforge.net
Summary : TCG’s Software Stack v1.2
Description :
TrouSerS is an implementation of the Trusted Computing Group’s Software Stack
(TSS) specification. You can use TrouSerS to write applications that make use
of your TPM hardware. TPM hardware can create, store and use RSA keys
securely (without ever being exposed in memory), verify a platform’s software
state using cryptographic hashes and more.

——————————————————————————–
Update Information:

Security update for trousers. Fixes for the following CVEs, plus a fix for
an annocheck warning. – Fix for CVE-2020-24330 (RHBZ#1874824) – Fix for
CVE-2020-24331 (RHBZ#1870057) – Fix for CVE-2020-24332 (RHBZ#1870053)
——————————————————————————–
ChangeLog:

* Thu Oct 29 2020 Jerry Snitselaar <jsnitsel@redhat.com> – 0.3.14-4
– Fix for CVE-2020-24330 (RHBZ#1874824)
– Fix for CVE-2020-24331 (RHBZ#1870057)
– Fix for CVE-2020-24332 (RHBZ#1870053)
——————————————————————————–
References:

[ 1 ] Bug #1870053 – CVE-2020-24332 trousers: tss user can be used to create or corrupt existing files, this could lead to DoS [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1870053
[ 2 ] Bug #1870057 – CVE-2020-24331 trousers: tss user still has read and write access to the /etc/tcsd.conf file if tcsd is started as root [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1870057
[ 3 ] Bug #1874824 – CVE-2020-24330 trousers: fails to drop the root gid privilege when no longer needed [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1874824
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2020-ab3dace708’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

AutorBruno Varga
Cert idNCERT-REF-2020-11-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programske biblioteke libX11

Otkriven je sigurnosni nedostatak u programskoj biblioteci libX11 za operacijski sustav RHEL. Otkriveni nedostatak potencijalnim udaljenim napadačima omogućuje izazivanje DoS...

Close