Lucene search

K
amazonAmazonALAS-2012-054
HistoryMar 15, 2012 - 7:21 p.m.

Medium: systemtap

2012-03-1519:21:00
alas.aws.amazon.com
14

CVSS2

5.4

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:P/I:N/A:C

EPSS

0

Percentile

5.1%

Issue Overview:

An invalid pointer read flaw was found in the way SystemTap handled malformed debugging information in DWARF format. When SystemTap unprivileged mode was enabled, an unprivileged user in the stapusr group could use this flaw to crash the system or, potentially, read arbitrary kernel memory. Additionally, a privileged user (root, or a member of the stapdev group) could trigger this flaw when tricked into instrumenting a specially-crafted ELF binary, even when unprivileged mode was not enabled. (CVE-2012-0875)

Affected Packages:

systemtap

Issue Correction:
Run yum update systemtap to update your system.

New Packages:

i686:  
    systemtap-debuginfo-1.6-5.12.amzn1.i686  
    systemtap-1.6-5.12.amzn1.i686  
    systemtap-server-1.6-5.12.amzn1.i686  
    systemtap-sdt-devel-1.6-5.12.amzn1.i686  
    systemtap-testsuite-1.6-5.12.amzn1.i686  
    systemtap-initscript-1.6-5.12.amzn1.i686  
    systemtap-runtime-1.6-5.12.amzn1.i686  
  
src:  
    systemtap-1.6-5.12.amzn1.src  
  
x86_64:  
    systemtap-sdt-devel-1.6-5.12.amzn1.x86_64  
    systemtap-testsuite-1.6-5.12.amzn1.x86_64  
    systemtap-runtime-1.6-5.12.amzn1.x86_64  
    systemtap-debuginfo-1.6-5.12.amzn1.x86_64  
    systemtap-1.6-5.12.amzn1.x86_64  
    systemtap-server-1.6-5.12.amzn1.x86_64  
    systemtap-initscript-1.6-5.12.amzn1.x86_64  

Additional References

Red Hat: CVE-2012-0875

Mitre: CVE-2012-0875

CVSS2

5.4

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:P/I:N/A:C

EPSS

0

Percentile

5.1%