truecrypt
Page content
- Author: voroskoi
- Vulnerable: 4.3-1terminus1
- Unaffected: 4.3-2terminus1
When running without administrator privileges, TrueCrypt automatically attempts to elevate its access rights (if necessary) using the sudo command. The Linux version of TrueCrypt no longer supports the set-euid root mode of execution. These changes also prevent all discovered and undiscovered (if any) security issues related to the set-euid root mode of execution, including an issue affecting all previous Linux versions of TrueCrypt where a local non-administrator user could cause a denial of service or gain administrator privileges.
- Bug Tracker URL: http://bugs.frugalware.org/task/2024
CVEs:
- There is no CVE for this issue