Package: oprofile
Version: 0.9.6-1.2
Severity: serious
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for oprofile.

CVE-2011-2473[0]:
| The do_dump_data function in utils/opcontrol in OProfile 0.9.6 and
| earlier might allow local users to create or overwrite arbitrary files
| via a crafted --session-dir argument in conjunction with a symlink
| attack on the opd_pipe file, a different vulnerability than
| CVE-2011-1760.

CVE-2011-2472[1]:
| Directory traversal vulnerability in utils/opcontrol in OProfile 0.9.6
| and earlier might allow local users to overwrite arbitrary files via a
| .. (dot dot) in the --save argument, related to the --session-dir
| argument, a different vulnerability than CVE-2011-1760.

CVE-2011-2471[2]:
| utils/opcontrol in OProfile 0.9.6 and earlier might allow local users
| to gain privileges via shell metacharacters in the (1) --vmlinux, (2)
| --session-dir, or (3) --xen argument, related to the daemonrc file and
| the do_save_setup and do_load_setup functions, a different
| vulnerability than CVE-2011-1760.

If you fix the vulnerabilities please also make sure to include the
CVE ids in your changelog entry.

There are some patches on oss-security[3]. They are not applied in
version 0.9.6-1.2, so I assume it to be vulnerable.

Helmut

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2473
    http://security-tracker.debian.org/tracker/CVE-2011-2473
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2472
    http://security-tracker.debian.org/tracker/CVE-2011-2472
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2471
    http://security-tracker.debian.org/tracker/CVE-2011-2471
[3] http://openwall.com/lists/oss-security/2011/05/10/7



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to