First published: Mon Nov 15 2010(Updated: )
A security flaw was found in the way systemtap runtime tool (staprun) removed unused modules. A local attacker could use this flaw to conduct various denial of service attacks. References: [1] <a href="http://sources.redhat.com/ml/systemtap/2010-q4/msg00230.html">http://sources.redhat.com/ml/systemtap/2010-q4/msg00230.html</a> Upstream changeset: [2] <a href="http://sources.redhat.com/git/gitweb.cgi?p=systemtap.git;a=commit;h=b7565b41228bea196cefa3a7d43ab67f8f9152e2">http://sources.redhat.com/git/gitweb.cgi?p=systemtap.git;a=commit;h=b7565b41228bea196cefa3a7d43ab67f8f9152e2</a> Acknowledgements: Red Hat would like to thank Tavis Ormandy for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
systemtap systemtap | =1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.