|
Message-ID: <4DC9A887.4030309@redhat.com> Date: Tue, 10 May 2011 17:05:11 -0400 From: William Cohen <wcohen@...hat.com> To: Huzaifa Sidhpurwala <huzaifas@...hat.com> CC: oss-security@...ts.openwall.com, Jan Lieskovsky <jlieskov@...hat.com>, "Steven M. Christey" <coley@...us.mitre.org>, Stephane Chauveau <stephane.chauveau@...s-entreprise.com>, Maynard Johnson <maynardj@...ibm.com>, Robert Richter <robert.richter@....com> Subject: Re: Re: CVE Request -- oprofile -- Local privilege escalation via crafted opcontrol event parameter when authorized by sudo On 05/03/2011 05:36 AM, Huzaifa Sidhpurwala wrote: > Hi William, > On 05/01/2011 07:30 AM, William Cohen wrote: >> >> I don't know if this is the best way to fix this issue, but attached is a patch that filters out all but alpha numeric characters and '_'. Feedback on the patch would be appreciated. >> > > It appears from the debian bug, that there may be others way to exploit > this issue as well. hence i think we need a revised patch? > > > The patches mentioned in the previous email. -Will View attachment "0001-Sanitize-Event-Names.patch" of type "text/x-patch" (911 bytes) View attachment "0002-Ensure-that-save-only-saves-things-in-SESSION_DIR.patch" of type "text/x-patch" (1092 bytes) View attachment "0003-Avoid-blindly-source-SETUP_FILE-with.patch" of type "text/x-patch" (1482 bytes) View attachment "0004-Do-additional-checks-on-user-supplied-arguments.patch" of type "text/x-patch" (4241 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.