Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4DC9A887.4030309@redhat.com>
Date: Tue, 10 May 2011 17:05:11 -0400
From: William Cohen <wcohen@...hat.com>
To: Huzaifa Sidhpurwala <huzaifas@...hat.com>
CC: oss-security@...ts.openwall.com, Jan Lieskovsky <jlieskov@...hat.com>,
        "Steven M. Christey" <coley@...us.mitre.org>,
        Stephane Chauveau <stephane.chauveau@...s-entreprise.com>,
        Maynard Johnson <maynardj@...ibm.com>,
        Robert Richter <robert.richter@....com>
Subject: Re: Re: CVE Request -- oprofile -- Local privilege
 escalation via crafted opcontrol event parameter when authorized by sudo

On 05/03/2011 05:36 AM, Huzaifa Sidhpurwala wrote:
> Hi William,
> On 05/01/2011 07:30 AM, William Cohen wrote:
>>
>> I don't know if this is the best way to fix this issue, but attached is a patch that filters out all but alpha numeric characters and '_'. Feedback on the patch would be appreciated.
>>
> 
> It appears from the debian bug, that there may be others way to exploit
> this issue as well. hence i think we need a revised patch?
> 
> 
> 

The patches mentioned in the previous email.

-Will

View attachment "0001-Sanitize-Event-Names.patch" of type "text/x-patch" (911 bytes)

View attachment "0002-Ensure-that-save-only-saves-things-in-SESSION_DIR.patch" of type "text/x-patch" (1092 bytes)

View attachment "0003-Avoid-blindly-source-SETUP_FILE-with.patch" of type "text/x-patch" (1482 bytes)

View attachment "0004-Do-additional-checks-on-user-supplied-arguments.patch" of type "text/x-patch" (4241 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.