On Wed, 2006-02-15 at 00:04 -0500, Micah Anderson wrote:
> Package: oprofile
> Severity: normal
> 
> CVE-2006-0576 reads:
> 
> Untrusted search path vulnerability in opcontrol in OProfile 0.9.1 and
> earlier allows local users to execute arbitrary commands via a modified 
> PATH that references malicious (1) which or (2) dirname programs. 
> NOTE: while opcontrol normally is not run setuid, a common configuration 
> suggests accessing opcontrol using sudo. In such a context, this is a
> vulnerability.                                                                
>                                             

Thanks for the report; a patch has been suggested upstream and
appears to be acceptable.  I'll get that incorporated and uploaded
quickly.

-- 
Ciao,
al
----------------------------------------------------------------------
Al Stone                                      Alter Ego:
Open Source and Linux R&D                     Debian Developer
Hewlett-Packard Company                       http://www.debian.org
E-mail: [EMAIL PROTECTED]                        [EMAIL PROTECTED]
----------------------------------------------------------------------



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to