systemtap is vulnerable to denial of service (DoS). The vulnerability exists as a buffer overflow flaw was found in SystemTap’s tapset __get_argv()
function. If a privileged user ran a SystemTap script that called this function, a local, unprivileged user could, while that script is still running, trigger this flaw and cause memory corruption by running a command with a large argument list, which may lead to a system crash or, potentially, arbitrary code execution with root privileges.
lists.fedoraproject.org/pipermail/package-announce/2010-February/035201.html
lists.fedoraproject.org/pipermail/package-announce/2010-February/035261.html
lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html
marc.info/?l=oss-security&m=126530657715364&w=2
secunia.com/advisories/38426
secunia.com/advisories/38680
secunia.com/advisories/38765
secunia.com/advisories/38817
secunia.com/advisories/39656
securitytracker.com/id?1023664
sourceware.org/bugzilla/show_bug.cgi?id=11234
sourceware.org/git/gitweb.cgi?p=systemtap.git%3Ba=commit%3Bh=a2d399c87a642190f08ede63dc6fc434a5a8363a
sourceware.org/git/gitweb.cgi?p=systemtap.git;a=commit;h=a2d399c87a642190f08ede63dc6fc434a5a8363a
www.redhat.com/security/updates/classification/#important
www.redhat.com/support/errata/RHSA-2010-0124.html
www.redhat.com/support/errata/RHSA-2010-0125.html
www.securityfocus.com/bid/38120
www.vupen.com/english/advisories/2010/1001
access.redhat.com/errata/RHSA-2010:0124
bugzilla.redhat.com/show_bug.cgi?id=559719
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9675