Lucene search

K
centosCentOS ProjectCESA-2011:0841
HistoryMay 31, 2011 - 5:05 p.m.

systemtap security update

2011-05-3117:05:06
CentOS Project
lists.centos.org
53

CVSS2

1.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:N/I:N/A:P

EPSS

0

Percentile

5.1%

CentOS Errata and Security Advisory CESA-2011:0841

SystemTap is an instrumentation system for systems running the Linux
kernel, version 2.6. Developers can write scripts to collect data on the
operation of the system.

A divide-by-zero flaw was found in the way SystemTap handled malformed
debugging information in DWARF format. When SystemTap unprivileged mode was
enabled, an unprivileged user in the stapusr group could use this flaw to
crash the system. Additionally, a privileged user (root, or a member of the
stapdev group) could trigger this flaw when tricked into instrumenting a
specially-crafted ELF binary, even when unprivileged mode was not enabled.
(CVE-2011-1769)

SystemTap users should upgrade to these updated packages, which contain a
backported patch to correct this issue.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2011-May/079763.html
https://lists.centos.org/pipermail/centos-announce/2011-May/079764.html

Affected packages:
systemtap
systemtap-client
systemtap-initscript
systemtap-runtime
systemtap-sdt-devel
systemtap-server
systemtap-testsuite

Upstream details at:
https://access.redhat.com/errata/RHSA-2011:0841

CVSS2

1.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:N/I:N/A:P

EPSS

0

Percentile

5.1%