vulnerability
Red Hat: CVE-2020-24331: tss user still has read and write access to the /etc/tcsd.conf file if tcsd is started as root (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Aug 13, 2020 | May 21, 2021 | Aug 11, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Aug 13, 2020
Added
May 21, 2021
Modified
Aug 11, 2025
Description
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the tss user still has read and write access to the /etc/tcsd.conf file (which contains various settings related to this daemon).
Solutions
no-fix-redhat-rpm-packageredhat-upgrade-trousersredhat-upgrade-trousers-debuginforedhat-upgrade-trousers-debugsourceredhat-upgrade-trousers-develredhat-upgrade-trousers-libredhat-upgrade-trousers-lib-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.