Lucene search

K
redhatRedHatRHSA-2010:0125
HistoryMar 01, 2010 - 12:00 a.m.

(RHSA-2010:0125) Moderate: systemtap security update

2010-03-0100:00:00
access.redhat.com
11

EPSS

0.001

Percentile

26.5%

SystemTap is an instrumentation system for systems running the Linux
kernel, version 2.6. Developers can write scripts to collect data on the
operation of the system.

A buffer overflow flaw was found in SystemTap’s tapset __get_argv()
function. If a privileged user ran a SystemTap script that called this
function, a local, unprivileged user could, while that script is still
running, trigger this flaw and cause memory corruption by running a command
with a large argument list, which may lead to a system crash or,
potentially, arbitrary code execution with root privileges. (CVE-2010-0411)

Note: SystemTap scripts that call __get_argv(), being a privileged
function, can only be executed by the root user or users in the stapdev
group. As well, if such a script was compiled and installed by root, users
in the stapusr group would also be able to execute it.

SystemTap users should upgrade to these updated packages, which contain a
backported patch to correct this issue.