Summary: | app-crypt/truecrypt <= 4.3 Local Privilege Escalation Exploit and DoS (CVE-2007-{1738|1589}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Timothy Redaelli (RETIRED) <drizzt> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED INVALID | ||
Severity: | major | CC: | crypto+disabled |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1738 | ||
Whiteboard: | C1? [] jaervosz | ||
Package list: | Runtime testing required: | --- |
Description
Timothy Redaelli (RETIRED)
![]() Thx Timothy. Any reason to keep this restricted? There seems to be another issue as well: CVE-2007-1589 TrueCrypt before 4.3, when set-euid mode is used on Linux, allows local users to cause a denial of service (filesystem unavailability) by dismounting a volume mounted by a different user. Initial report is puclib here: http://www.securityfocus.com/archive/1/464064 Crypto please advise. Hmmm... What can I say? I can remove the setuid from binaries... Alon would be a fine workaround but if upstream plans to fix this soonish we could wait for that. Do you know of any upstream plans to fix this? Upstream is very unresponsive to any modification/request. For example, as a policy they don't support new kernel versions... And they won't accept simple fixes to their building system. So I really don't know what they are planning and when. I think removing the setuid and putting a note in the ebuild about the security implications of making it setuid, would be sufficient. Security any other opinions? Hmmm... After looking at the output, Gentoo ebuilds never put the suid... So we have never had this issue... :) Hmm normally we would issue an advisory even though we're not vulnerable in the default configuration as I take it some users might have made it setuid themselves. However as there is no upstream fix for this one I think we have two possibilities: - Releasing a GLSA with only a workaround. - Put an enote saying that ppl should be careful with making it setuid (as per comment #6). Security what do you say? If the users manually set it setuid, they must know what they are doing. I vote noglsa. I would have voted Yes if setuid was the default configuration. I vote no - we're not vulnerable in the default config. Ok, closing as INVALID. Alon feel free to add an enote if you want. |