CVE-2020-24332

Priority
Description
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is
started with root privileges, the creation of the system.data file is prone
to symlink attacks. The tss user can be used to create or corrupt existing
files, which could possibly lead to a DoS attack.
Notes
mdeslaurthe Debian/Ubuntu package starts tcsd as the tss user, not as
root, so this issue doesn't affect default configurations
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 20.04 LTS (Focal Fossa):needs-triage
Ubuntu 20.10 (Groovy Gorilla):needs-triage
More Information

Updated: 2020-10-24 07:04:05 UTC (commit 69e225d81a6ee3e2e014950178db797c5d4e5009)