I do not have a working example yet but I believe that privileges can also be escalated with the following method.

The problem is the following command in do_dump_data

  echo do_jitconv > $SESSION_DIR/opd_pipe

SESSION_DIR can be controlled by the --session-dir option so a malicious user could very well replace the fifo $SESSION_DIR/opd_pipe by a symbolic link.

In theory it becomes possible to create an arbitrary file containing the text "do_jitconv"

I am not a security expert but I am pretty sure that this is enough to obtain root privileges for example by creating a custom entry in /etc/ld.so.conf.d/

Generally speaking, allowing sudoers to change the oprofile session directory without any controls is probably a very bad idea. The feature is probably needed to avoid disk quota issues so an etc configuration file listing all possible session directories could be the solution.





--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to