First published: Fri May 06 2011(Updated: )
A flaw was discovered in systemtap's handling of DWARF expressions where it did not guard against two cases of divide by zero. This can result in a kernel div-by-zero message and possible busywait during stap module shutdown. A div-by-zero could cause the kernel to panic and if the kernel reboot on panic flag was set (panic_on_oops), it would cause the system to reboot. In order to trigger this flaw, it would require a user with staprun or stapdev group membership (or root privileges) to run a particular stap script operation on a hand-corrupted elf program.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Systemtap-sdt-devel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-702687 has been classified as a significant issue due to its potential to cause a kernel panic.
To fix REDHAT-BUG-702687, update your systemtap to the latest version that addresses this vulnerability.
Symptoms of REDHAT-BUG-702687 may include kernel divide-by-zero messages or system hangs during stap module shutdown.
Administrators running systemtap on affected versions are at risk from REDHAT-BUG-702687.
Disabling systemtap on affected systems can serve as a temporary workaround for REDHAT-BUG-702687.