First published: Tue Feb 04 2014(Updated: )
SystemTap 1.7, 1.6.7, and probably other versions, when unprivileged mode is enabled, allows local users to obtain sensitive information from kernel memory or cause a denial of service (kernel panic and crash) via vectors related to crafted DWARF data, which triggers a read of an invalid pointer.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Systemtap-sdt-devel | =1.6.7 | |
Red Hat Systemtap-sdt-devel | =1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0875 has a medium severity rating as it allows local users to access sensitive kernel memory and potentially crash the system.
To fix CVE-2012-0875, update SystemTap to the latest version or apply the appropriate patches provided by your vendor.
CVE-2012-0875 affects SystemTap versions 1.6.7 and 1.7, as well as potentially other versions.
Yes, CVE-2012-0875 can lead to a denial of service through kernel panic and crashes triggered by unprivileged users.
Local users on systems running vulnerable versions of SystemTap are at risk from CVE-2012-0875.