First published: Mon Mar 01 2010(Updated: )
SystemTap is an instrumentation system for systems running the Linux<br>kernel, version 2.6. Developers can write scripts to collect data on the<br>operation of the system.<br>A buffer overflow flaw was found in SystemTap's tapset __get_argv()<br>function. If a privileged user ran a SystemTap script that called this<br>function, a local, unprivileged user could, while that script is still<br>running, trigger this flaw and cause memory corruption by running a command<br>with a large argument list, which may lead to a system crash or,<br>potentially, arbitrary code execution with root privileges. (CVE-2010-0411)<br>Note: SystemTap scripts that call __get_argv(), being a privileged<br>function, can only be executed by the root user or users in the stapdev<br>group. As well, if such a script was compiled and installed by root, users<br>in the stapusr group would also be able to execute it.<br>SystemTap users should upgrade to these updated packages, which contain a<br>backported patch to correct this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/systemtap | <0.6.2-2.el4_8.1 | 0.6.2-2.el4_8.1 |
redhat/systemtap | <0.6.2-2.el4_8.1 | 0.6.2-2.el4_8.1 |
redhat/systemtap-runtime | <0.6.2-2.el4_8.1 | 0.6.2-2.el4_8.1 |
redhat/systemtap-testsuite | <0.6.2-2.el4_8.1 | 0.6.2-2.el4_8.1 |
redhat/systemtap-runtime | <0.6.2-2.el4_8.1 | 0.6.2-2.el4_8.1 |
redhat/systemtap-testsuite | <0.6.2-2.el4_8.1 | 0.6.2-2.el4_8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.