SB2020111098 - openEuler 20.03 LTS update for trousers
Published: November 10, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Improper Privilege Management (CVE-ID: CVE-2020-24330)
The vulnerability allows a local user to escalate privileges.
The vulnerability exists due to the tcsd daemon is started with root privileges instead of tss user and fails to drop them after successful start. A local user can abuse such behavior and escalate privileges on the system.
2) Improper Privilege Management (CVE-ID: CVE-2020-24331)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper privilege management if the tcsd daemon is started with root privileges. A local user can get read and write access to the /etc/tcsd.conf file and escalate privileges on the system.
3) Link following (CVE-ID: CVE-2020-24332)
The vulnerability allows a local user to perform a denial of service attack.
The vulnerability exists due to creation of the system.data file is prone to symlink attacks if the tcsd daemon is started with root privileges. A local user can create or corrupt existing files, which could possibly lead to a DoS attack
Remediation
Install update from vendor's website.