RLSA-2021:1627

Source
https://errata.rockylinux.org/RLSA-2021:1627
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2021:1627.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2021:1627
Related
Published
2021-05-18T05:41:50Z
Modified
2023-02-02T12:51:50.254010Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Moderate: trousers security, bug fix, and enhancement update
Details

TrouSerS is an implementation of the Trusted Computing Group's Software Stack (TSS) specification. TrouSerS enables the user to write applications that make use of the Trusted Platform Module (TPM) hardware.

The following packages have been upgraded to a later upstream version: trousers (0.3.15). (BZ#1725782)

Security Fix(es):

  • trousers: tss user still has read and write access to the /etc/tcsd.conf file if tcsd is started as root (CVE-2020-24331)

  • trousers: tss user can be used to create or corrupt existing files, this could lead to DoS (CVE-2020-24332)

  • trousers: fails to drop the root gid privilege when no longer needed (CVE-2020-24330)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / trousers

Package

Name
trousers
Purl
pkg:rpm/rocky-linux/trousers?distro=rocky-linux-8&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:0.3.15-1.el8