[ASA-202011-21] swtpm: privilege escalation

Morten Linderud foxboron at archlinux.org
Sun Nov 29 17:18:46 UTC 2020


Arch Linux Security Advisory ASA-202011-21
==========================================

Severity: Medium
Date    : 2020-11-19
CVE-ID  : CVE-2020-28407
Package : swtpm
Type    : privilege escalation
Remote  : No
Link    : https://security.archlinux.org/AVG-1282

Summary
=======

The package swtpm before version 0.5.1-1 is vulnerable to privilege
escalation.

Resolution
==========

Upgrade to 0.5.1-1.

# pacman -Syu "swtpm>=0.5.1-1"

The problem has been fixed upstream in version 0.5.1.

Workaround
==========

None.

Description
===========

A potential symbolic link following issue has been found in swtpm
before 0.5.1.

Impact
======

A malicious file might trick the program to overwrite files and
escalate priviledges.

References
==========

https://github.com/stefanberger/swtpm/compare/v0.5.0...v0.5.1
https://github.com/stefanberger/swtpm/commit/e9c9778d5c35ef077aed1ec6601b47ac478f8185
https://github.com/stefanberger/swtpm/commit/4cc42c0ba3632a98ef381bda68d0a4eaec4578db
https://github.com/stefanberger/swtpm/commit/634b6294000fb785b9f12e13b852c18a0888b01e
https://github.com/stefanberger/swtpm/commit/a03cbadd087b2602412823f254ac75a9a12d97e3
https://github.com/stefanberger/swtpm/commit/526300236dc8a7664acdc265b6fc5d767289ac39
https://github.com/stefanberger/swtpm/commit/e621b21d4c31029ebe794350fcff2bcd4b0f13a0
https://security.archlinux.org/CVE-2020-28407
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20201129/da660542/attachment.sig>


More information about the arch-security mailing list