Date:         Tue, 2 Mar 2010 12:18:30 -0600
Reply-To:     Troy Dawson 
Sender:       Security Errata for Scientific Linux
              
From:         Troy Dawson 
Subject:      Security ERRATA Moderate: systemtap on SL4.x i386/x86_64
Comments: To: "scientific-linux-errata@fnal.gov"
          

Synopsis:	Moderate: systemtap security update
Issue date:	2010-03-01
CVE Names:	CVE-2010-0411

CVE-2010-0411 systemtap: Crash with systemtap script using __get_argv()

A buffer overflow flaw was found in SystemTap's tapset __get_argv()
function. If a privileged user ran a SystemTap script that called this
function, a local, unprivileged user could, while that script is still
running, trigger this flaw and cause memory corruption by running a 
command with a large argument list, which may lead to a system crash or,
potentially, arbitrary code execution with root privileges. (CVE-2010-0411)

Note: SystemTap scripts that call __get_argv(), being a privileged
function, can only be executed by the root user or users in the stapdev
group. As well, if such a script was compiled and installed by root, 
users in the stapusr group would also be able to execute it.

SL 4.x

     SRPMS:
systemtap-0.6.2-2.el4_8.1.src.rpm
     i386:
systemtap-0.6.2-2.el4_8.1.i386.rpm
systemtap-runtime-0.6.2-2.el4_8.1.i386.rpm
systemtap-testsuite-0.6.2-2.el4_8.1.i386.rpm
     x86_64:
systemtap-0.6.2-2.el4_8.1.x86_64.rpm
systemtap-runtime-0.6.2-2.el4_8.1.x86_64.rpm
systemtap-testsuite-0.6.2-2.el4_8.1.x86_64.rpm

-Connie Sieh
-Troy Dawson

SciLinux: CVE-2010-0411 Moderate: systemtap SL4.x i386/x86_64

Moderate: systemtap security update

Summary

A buffer overflow flaw was found in SystemTap's tapset __get_argv()function. If a privileged user ran a SystemTap script that called thisfunction, a local, unprivileged user could, while that script is stillrunning, trigger this flaw and cause memory corruption by running acommand with a large argument list, which may lead to a system crash or,potentially, arbitrary code execution with root privileges. (CVE-2010-0411)Note: SystemTap scripts that call __get_argv(), being a privilegedfunction, can only be executed by the root user or users in the stapdevgroup. As well, if such a script was compiled and installed by root,users in the stapusr group would also be able to execute it.



Security Fixes

Severity
Issued Date: : 2010-03-01
CVE Names: CVE-2010-0411
CVE-2010-0411 systemtap: Crash with systemtap script using __get_argv()

Related News