[Frugalware-bugs] #2024: [sec] truecrypt

Flyspray noreply at frugalware.org
Mon May 7 16:28:41 CEST 2007


THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.

A new Flyspray task has been opened.  Details are below.

User who did this - VMiklos (vmiklos)

Attached to Project - Frugalware
Summary - [sec] truecrypt
Task Type - Bug Report
Category - Applications
Status - Fixed in -current
Assigned To - 
Operating System - i686
Severity - Low
Priority - Normal
Reported Version - 0.6
Due in Version - 
Due Date - Undecided
Details - http://www.truecrypt.org/docs/?s=version-history

4.3a

Linux: When running without administrator privileges, TrueCrypt
automatically attempts to elevate its access rights (if necessary)
using the sudo command. The Linux version of TrueCrypt no longer
supports the set-euid root mode of execution. These changes also
prevent all discovered and undiscovered (if any) security issues
related to the set-euid root mode of execution, including an issue
affecting all previous Linux versions of TrueCrypt where a local
non-administrator user could cause a denial of service or gain
administrator privileges.

More information can be found at the following URL:
http://bugs.frugalware.org/task/2024

You are receiving this message because you have requested it from the
Flyspray bugtracking system.  You can be removed from future
notifications by visiting the URL shown above.



More information about the Frugalware-bugs mailing list