SB2020111098 - openEuler 20.03 LTS update for trousers



SB2020111098 - openEuler 20.03 LTS update for trousers

Published: November 10, 2020

Security Bulletin ID SB2020111098
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Improper Privilege Management (CVE-ID: CVE-2020-24330)

The vulnerability allows a local user to escalate privileges.

The vulnerability exists due to the tcsd daemon is started with root privileges instead of tss user and fails to drop them after successful start. A local user can abuse such behavior and escalate privileges on the system.


2) Improper Privilege Management (CVE-ID: CVE-2020-24331)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper privilege management if the tcsd daemon is started with root privileges. A local user can get read and write access to the /etc/tcsd.conf file and escalate privileges on the system.


3) Link following (CVE-ID: CVE-2020-24332)

The vulnerability allows a local user to perform a denial of service attack.

The vulnerability exists due to creation of the system.data file is prone to symlink attacks if the tcsd daemon is started with root privileges. A local user can create or corrupt existing files, which could possibly lead to a DoS attack


Remediation

Install update from vendor's website.