Lucene search

K
centosCentOS ProjectCESA-2012:0376
HistoryMar 08, 2012 - 11:35 p.m.

systemtap security update

2012-03-0823:35:54
CentOS Project
lists.centos.org
64

CVSS2

5.4

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:P/I:N/A:C

EPSS

0

Percentile

5.1%

CentOS Errata and Security Advisory CESA-2012:0376

SystemTap is an instrumentation system for systems running the Linux
kernel. The system allows developers to write scripts to collect data on
the operation of the system.

An invalid pointer read flaw was found in the way SystemTap handled
malformed debugging information in DWARF format. When SystemTap
unprivileged mode was enabled, an unprivileged user in the stapusr group
could use this flaw to crash the system or, potentially, read arbitrary
kernel memory. Additionally, a privileged user (root, or a member of the
stapdev group) could trigger this flaw when tricked into instrumenting a
specially-crafted ELF binary, even when unprivileged mode was not enabled.
(CVE-2012-0875)

SystemTap users should upgrade to these updated packages, which contain a
backported patch to correct this issue.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2012-March/080647.html
https://lists.centos.org/pipermail/centos-announce/2012-March/080649.html

Affected packages:
systemtap
systemtap-grapher
systemtap-initscript
systemtap-runtime
systemtap-sdt-devel
systemtap-server
systemtap-testsuite

Upstream details at:
https://access.redhat.com/errata/RHSA-2012:0376

CVSS2

5.4

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:P/I:N/A:C

EPSS

0

Percentile

5.1%