First published: Thu Oct 15 2009(Updated: )
Multiple denial of service flaws were found in the SystemTap instrumentation system, when the --unprivileged mode was activated: a, Kernel stack overflow allows local attackers to cause denial of service or execute arbitrary code via long number of parameters, provided to the print* call. b, Kernel stack frame overflow allows local attackers to cause denial of service via specially-crafted user-provided DWARF information. c, Absent check(s) for the upper bound of the size of the unwind table and for the upper bound of the size of each of the CIE/CFI records, could allow an attacker to cause a denial of service (infinite loop). References: ----------- <a href="http://sources.redhat.com/bugzilla/show_bug.cgi?id=10750">http://sources.redhat.com/bugzilla/show_bug.cgi?id=10750</a> <a href="http://gcc.gnu.org/bugzilla/show_bug.cgi?id=41633">http://gcc.gnu.org/bugzilla/show_bug.cgi?id=41633</a> Issue severity note: -------------------- The --unprivileged mode needs to be activated by the privileged user prior the unprivileged user could exploit these flaws. SystemTap 1.0 in the default configuration is not shipped with the --unprivileged mode activated, this is NOT vulnerable to these flaws. Information about vulnerable versions: -------------------------------------- These issues do NOT affect the versions of SystemTap instrumentation system, as shipped with Red Hat Enterprise Linux 4 and 5. These issues affect the versions of SystemTap instrumentation system, as shipped with Fedora releases of 10 and 11. See also above severity note.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Systemtap Systemtap | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.