oss-sec mailing list archives
Re: CVE request: perf: may parse user-controlled config file
From: dann frazier <dannf () dannf org>
Date: Thu, 11 Aug 2011 00:48:11 -0600
On Tue, Aug 09, 2011 at 09:18:07AM -0400, Steve Grubb wrote:
On Sunday, August 07, 2011 01:34:38 PM dann frazier wrote:This was reported by Christian Ohm at: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=632923 The perf command, provided as part of the Linux kernel source, looks for and honors configuration settings in ./config. A local user could obtain elevated privileges by convincing a superuser to run the perf command from a directory the user controls.And in recent kernels has an executable stack: https://bugzilla.redhat.com/show_bug.cgi?id=704296
fyi, that bug appears to be locked
Current thread:
- CVE request: perf: may parse user-controlled config file dann frazier (Aug 09)
- Re: CVE request: perf: may parse user-controlled config file Steve Grubb (Aug 09)
- Re: CVE request: perf: may parse user-controlled config file Yves-Alexis Perez (Aug 09)
- Re: CVE request: perf: may parse user-controlled config file Steve Grubb (Aug 10)
- Re: CVE request: perf: may parse user-controlled config file dann frazier (Aug 11)
- Re: CVE request: perf: may parse user-controlled config file Yves-Alexis Perez (Aug 09)
- Re: CVE request: perf: may parse user-controlled config file Josh Bressers (Aug 09)
- Re: CVE request: perf: may parse user-controlled config file Steve Grubb (Aug 09)