truecrypt

Page content
  • Author: voroskoi
  • Vulnerable: 4.3-1terminus1
  • Unaffected: 4.3-2terminus1

When running without administrator privileges, TrueCrypt automatically attempts to elevate its access rights (if necessary) using the sudo command. The Linux version of TrueCrypt no longer supports the set-euid root mode of execution. These changes also prevent all discovered and undiscovered (if any) security issues related to the set-euid root mode of execution, including an issue affecting all previous Linux versions of TrueCrypt where a local non-administrator user could cause a denial of service or gain administrator privileges.

CVEs:

  • There is no CVE for this issue