Subject: | |
From: | |
Reply To: | |
Date: | Wed, 17 Nov 2010 15:47:20 -0600 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Synopsis: Important: systemtap security update
Issue date: 2010-11-17
CVE Names: CVE-2010-4170 CVE-2010-4171
It was discovered that staprun did not properly sanitize the environment
before executing the modprobe command to load an additional kernel
module. A local, unprivileged user could use this flaw to escalate their
privileges. (CVE-2010-4170)
It was discovered that staprun did not check if the module to be
unloaded was previously loaded by SystemTap. A local, unprivileged user
could use this flaw to unload an arbitrary kernel module that was not in
use. (CVE-2010-4171)
Note: After installing this update, users already in the stapdev group
must be added to the stapusr group in order to be able to run the
staprun tool.
SL 5.x
SRPMS:
systemtap-1.1-3.el5_5.3.src.rpm
i386:
systemtap-1.1-3.el5_5.3.i386.rpm
systemtap-client-1.1-3.el5_5.3.i386.rpm
systemtap-initscript-1.1-3.el5_5.3.i386.rpm
systemtap-runtime-1.1-3.el5_5.3.i386.rpm
systemtap-sdt-devel-1.1-3.el5_5.3.i386.rpm
systemtap-server-1.1-3.el5_5.3.i386.rpm
systemtap-testsuite-1.1-3.el5_5.3.i386.rpm
x86_64:
systemtap-1.1-3.el5_5.3.x86_64.rpm
systemtap-client-1.1-3.el5_5.3.x86_64.rpm
systemtap-initscript-1.1-3.el5_5.3.x86_64.rpm
systemtap-runtime-1.1-3.el5_5.3.x86_64.rpm
systemtap-sdt-devel-1.1-3.el5_5.3.i386.rpm
systemtap-sdt-devel-1.1-3.el5_5.3.x86_64.rpm
systemtap-server-1.1-3.el5_5.3.x86_64.rpm
systemtap-testsuite-1.1-3.el5_5.3.x86_64.rpm
-Connie Sieh
-Troy Dawson
|
|
|