Medium: systemtap

2012-03-15T19:21:00
ID ALAS-2012-54
Type amazon
Reporter Amazon
Modified 2014-09-14T15:40:00

Description

Issue Overview:

An invalid pointer read flaw was found in the way SystemTap handled malformed debugging information in DWARF format. When SystemTap unprivileged mode was enabled, an unprivileged user in the stapusr group could use this flaw to crash the system or, potentially, read arbitrary kernel memory. Additionally, a privileged user (root, or a member of the stapdev group) could trigger this flaw when tricked into instrumenting a specially-crafted ELF binary, even when unprivileged mode was not enabled. (CVE-2012-0875 __)

Affected Packages:

systemtap

Issue Correction:
Run yum update systemtap to update your system.

New Packages:

i686:  
    systemtap-debuginfo-1.6-5.12.amzn1.i686  
    systemtap-1.6-5.12.amzn1.i686  
    systemtap-server-1.6-5.12.amzn1.i686  
    systemtap-sdt-devel-1.6-5.12.amzn1.i686  
    systemtap-testsuite-1.6-5.12.amzn1.i686  
    systemtap-initscript-1.6-5.12.amzn1.i686  
    systemtap-runtime-1.6-5.12.amzn1.i686

src:  
    systemtap-1.6-5.12.amzn1.src

x86_64:  
    systemtap-sdt-devel-1.6-5.12.amzn1.x86_64  
    systemtap-testsuite-1.6-5.12.amzn1.x86_64  
    systemtap-runtime-1.6-5.12.amzn1.x86_64  
    systemtap-debuginfo-1.6-5.12.amzn1.x86_64  
    systemtap-1.6-5.12.amzn1.x86_64  
    systemtap-server-1.6-5.12.amzn1.x86_64  
    systemtap-initscript-1.6-5.12.amzn1.x86_64