Skip to navigation

Security Advisory Moderate: systemtap security update

Advisory: RHSA-2010:0125-1
Type: Security Advisory
Severity: Moderate
Issued on: 2010-03-01
Last updated on: 2010-03-01
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.8.z)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.8.z)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2010-0411

Details

Updated systemtap packages that fix a security issue are now available for
Red Hat Enterprise Linux 4.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

SystemTap is an instrumentation system for systems running the Linux
kernel, version 2.6. Developers can write scripts to collect data on the
operation of the system.

A buffer overflow flaw was found in SystemTap's tapset __get_argv()
function. If a privileged user ran a SystemTap script that called this
function, a local, unprivileged user could, while that script is still
running, trigger this flaw and cause memory corruption by running a command
with a large argument list, which may lead to a system crash or,
potentially, arbitrary code execution with root privileges. (CVE-2010-0411)

Note: SystemTap scripts that call __get_argv(), being a privileged
function, can only be executed by the root user or users in the stapdev
group. As well, if such a script was compiled and installed by root, users
in the stapusr group would also be able to execute it.

SystemTap users should upgrade to these updated packages, which contain a
backported patch to correct this issue.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Desktop (v. 4)

SRPMS:
systemtap-0.6.2-2.el4_8.1.src.rpm
File outdated by:  RHBA-2011:0929
    MD5: 9d96cb055ba094af5f58988ddca758fc
 
IA-32:
systemtap-0.6.2-2.el4_8.1.i386.rpm
File outdated by:  RHBA-2011:0929
    MD5: 3f73de619f502916348d58de8ad8a49d
systemtap-runtime-0.6.2-2.el4_8.1.i386.rpm
File outdated by:  RHBA-2011:0929
    MD5: f97feaec47fb55b87b96cb04c1fb34c7
systemtap-testsuite-0.6.2-2.el4_8.1.i386.rpm
File outdated by:  RHBA-2011:0929
    MD5: f9fe499b7417f791db4d5fdeb766fe3b
 
x86_64:
systemtap-0.6.2-2.el4_8.1.x86_64.rpm
File outdated by:  RHBA-2011:0929
    MD5: f2ecaa3c5bc2683985f4c292b157077c
systemtap-runtime-0.6.2-2.el4_8.1.x86_64.rpm
File outdated by:  RHBA-2011:0929
    MD5: c3d94d16b814a02e6edf331c89fd03ac
systemtap-testsuite-0.6.2-2.el4_8.1.x86_64.rpm
File outdated by:  RHBA-2011:0929
    MD5: a504f447c961006b94fe28a06334d7e0
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
systemtap-0.6.2-2.el4_8.1.src.rpm
File outdated by:  RHBA-2011:0929
    MD5: 9d96cb055ba094af5f58988ddca758fc
 
IA-32:
systemtap-0.6.2-2.el4_8.1.i386.rpm
File outdated by:  RHBA-2011:0929
    MD5: 3f73de619f502916348d58de8ad8a49d
systemtap-runtime-0.6.2-2.el4_8.1.i386.rpm
File outdated by:  RHBA-2011:0929
    MD5: f97feaec47fb55b87b96cb04c1fb34c7
systemtap-testsuite-0.6.2-2.el4_8.1.i386.rpm
File outdated by:  RHBA-2011:0929
    MD5: f9fe499b7417f791db4d5fdeb766fe3b
 
IA-64:
systemtap-0.6.2-2.el4_8.1.ia64.rpm
File outdated by:  RHBA-2011:0929
    MD5: 6bf07c2a880a690a01631fe0e93d2eda
systemtap-runtime-0.6.2-2.el4_8.1.ia64.rpm
File outdated by:  RHBA-2011:0929
    MD5: 5fa105100cea2fe1e5a9302c7e432313
systemtap-testsuite-0.6.2-2.el4_8.1.ia64.rpm
File outdated by:  RHBA-2011:0929
    MD5: 90341f49de4b0d3326b1313c509e4b28
 
PPC:
systemtap-0.6.2-2.el4_8.1.ppc64.rpm
File outdated by:  RHBA-2011:0929
    MD5: b2faa5d6fd5598cbebcfed1b09ee6033
systemtap-runtime-0.6.2-2.el4_8.1.ppc64.rpm
File outdated by:  RHBA-2011:0929
    MD5: b31617c692b4c97ee7c1f183d2c2a358
systemtap-testsuite-0.6.2-2.el4_8.1.ppc64.rpm
File outdated by:  RHBA-2011:0929
    MD5: e9b31330594954a723dfa472ce552edb
 
x86_64:
systemtap-0.6.2-2.el4_8.1.x86_64.rpm
File outdated by:  RHBA-2011:0929
    MD5: f2ecaa3c5bc2683985f4c292b157077c
systemtap-runtime-0.6.2-2.el4_8.1.x86_64.rpm
File outdated by:  RHBA-2011:0929
    MD5: c3d94d16b814a02e6edf331c89fd03ac
systemtap-testsuite-0.6.2-2.el4_8.1.x86_64.rpm
File outdated by:  RHBA-2011:0929
    MD5: a504f447c961006b94fe28a06334d7e0
 
Red Hat Enterprise Linux AS (v. 4.8.z)

SRPMS:
systemtap-0.6.2-2.el4_8.1.src.rpm
File outdated by:  RHBA-2011:0929
    MD5: 9d96cb055ba094af5f58988ddca758fc
 
IA-32:
systemtap-0.6.2-2.el4_8.1.i386.rpm
File outdated by:  RHBA-2011:0929
    MD5: 3f73de619f502916348d58de8ad8a49d
systemtap-runtime-0.6.2-2.el4_8.1.i386.rpm
File outdated by:  RHBA-2011:0929
    MD5: f97feaec47fb55b87b96cb04c1fb34c7
systemtap-testsuite-0.6.2-2.el4_8.1.i386.rpm
File outdated by:  RHBA-2011:0929
    MD5: f9fe499b7417f791db4d5fdeb766fe3b
 
IA-64:
systemtap-0.6.2-2.el4_8.1.ia64.rpm
File outdated by:  RHBA-2011:0929
    MD5: 6bf07c2a880a690a01631fe0e93d2eda
systemtap-runtime-0.6.2-2.el4_8.1.ia64.rpm
File outdated by:  RHBA-2011:0929
    MD5: 5fa105100cea2fe1e5a9302c7e432313
systemtap-testsuite-0.6.2-2.el4_8.1.ia64.rpm
File outdated by:  RHBA-2011:0929
    MD5: 90341f49de4b0d3326b1313c509e4b28
 
PPC:
systemtap-0.6.2-2.el4_8.1.ppc64.rpm
File outdated by:  RHBA-2011:0929
    MD5: b2faa5d6fd5598cbebcfed1b09ee6033
systemtap-runtime-0.6.2-2.el4_8.1.ppc64.rpm
File outdated by:  RHBA-2011:0929
    MD5: b31617c692b4c97ee7c1f183d2c2a358
systemtap-testsuite-0.6.2-2.el4_8.1.ppc64.rpm
File outdated by:  RHBA-2011:0929
    MD5: e9b31330594954a723dfa472ce552edb
 
x86_64:
systemtap-0.6.2-2.el4_8.1.x86_64.rpm
File outdated by:  RHBA-2011:0929
    MD5: f2ecaa3c5bc2683985f4c292b157077c
systemtap-runtime-0.6.2-2.el4_8.1.x86_64.rpm
File outdated by:  RHBA-2011:0929
    MD5: c3d94d16b814a02e6edf331c89fd03ac
systemtap-testsuite-0.6.2-2.el4_8.1.x86_64.rpm
File outdated by:  RHBA-2011:0929
    MD5: a504f447c961006b94fe28a06334d7e0
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
systemtap-0.6.2-2.el4_8.1.src.rpm
File outdated by:  RHBA-2011:0929
    MD5: 9d96cb055ba094af5f58988ddca758fc
 
IA-32:
systemtap-0.6.2-2.el4_8.1.i386.rpm
File outdated by:  RHBA-2011:0929
    MD5: 3f73de619f502916348d58de8ad8a49d
systemtap-runtime-0.6.2-2.el4_8.1.i386.rpm
File outdated by:  RHBA-2011:0929
    MD5: f97feaec47fb55b87b96cb04c1fb34c7
systemtap-testsuite-0.6.2-2.el4_8.1.i386.rpm
File outdated by:  RHBA-2011:0929
    MD5: f9fe499b7417f791db4d5fdeb766fe3b
 
IA-64:
systemtap-0.6.2-2.el4_8.1.ia64.rpm
File outdated by:  RHBA-2011:0929
    MD5: 6bf07c2a880a690a01631fe0e93d2eda
systemtap-runtime-0.6.2-2.el4_8.1.ia64.rpm
File outdated by:  RHBA-2011:0929
    MD5: 5fa105100cea2fe1e5a9302c7e432313
systemtap-testsuite-0.6.2-2.el4_8.1.ia64.rpm
File outdated by:  RHBA-2011:0929
    MD5: 90341f49de4b0d3326b1313c509e4b28
 
x86_64:
systemtap-0.6.2-2.el4_8.1.x86_64.rpm
File outdated by:  RHBA-2011:0929
    MD5: f2ecaa3c5bc2683985f4c292b157077c
systemtap-runtime-0.6.2-2.el4_8.1.x86_64.rpm
File outdated by:  RHBA-2011:0929
    MD5: c3d94d16b814a02e6edf331c89fd03ac
systemtap-testsuite-0.6.2-2.el4_8.1.x86_64.rpm
File outdated by:  RHBA-2011:0929
    MD5: a504f447c961006b94fe28a06334d7e0
 
Red Hat Enterprise Linux ES (v. 4.8.z)

SRPMS:
systemtap-0.6.2-2.el4_8.1.src.rpm
File outdated by:  RHBA-2011:0929
    MD5: 9d96cb055ba094af5f58988ddca758fc
 
IA-32:
systemtap-0.6.2-2.el4_8.1.i386.rpm
File outdated by:  RHBA-2011:0929
    MD5: 3f73de619f502916348d58de8ad8a49d
systemtap-runtime-0.6.2-2.el4_8.1.i386.rpm
File outdated by:  RHBA-2011:0929
    MD5: f97feaec47fb55b87b96cb04c1fb34c7
systemtap-testsuite-0.6.2-2.el4_8.1.i386.rpm
File outdated by:  RHBA-2011:0929
    MD5: f9fe499b7417f791db4d5fdeb766fe3b
 
IA-64:
systemtap-0.6.2-2.el4_8.1.ia64.rpm
File outdated by:  RHBA-2011:0929
    MD5: 6bf07c2a880a690a01631fe0e93d2eda
systemtap-runtime-0.6.2-2.el4_8.1.ia64.rpm
File outdated by:  RHBA-2011:0929
    MD5: 5fa105100cea2fe1e5a9302c7e432313
systemtap-testsuite-0.6.2-2.el4_8.1.ia64.rpm
File outdated by:  RHBA-2011:0929
    MD5: 90341f49de4b0d3326b1313c509e4b28
 
x86_64:
systemtap-0.6.2-2.el4_8.1.x86_64.rpm
File outdated by:  RHBA-2011:0929
    MD5: f2ecaa3c5bc2683985f4c292b157077c
systemtap-runtime-0.6.2-2.el4_8.1.x86_64.rpm
File outdated by:  RHBA-2011:0929
    MD5: c3d94d16b814a02e6edf331c89fd03ac
systemtap-testsuite-0.6.2-2.el4_8.1.x86_64.rpm
File outdated by:  RHBA-2011:0929
    MD5: a504f447c961006b94fe28a06334d7e0
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
systemtap-0.6.2-2.el4_8.1.src.rpm
File outdated by:  RHBA-2011:0929
    MD5: 9d96cb055ba094af5f58988ddca758fc
 
IA-32:
systemtap-0.6.2-2.el4_8.1.i386.rpm
File outdated by:  RHBA-2011:0929
    MD5: 3f73de619f502916348d58de8ad8a49d
systemtap-runtime-0.6.2-2.el4_8.1.i386.rpm
File outdated by:  RHBA-2011:0929
    MD5: f97feaec47fb55b87b96cb04c1fb34c7
systemtap-testsuite-0.6.2-2.el4_8.1.i386.rpm
File outdated by:  RHBA-2011:0929
    MD5: f9fe499b7417f791db4d5fdeb766fe3b
 
IA-64:
systemtap-0.6.2-2.el4_8.1.ia64.rpm
File outdated by:  RHBA-2011:0929
    MD5: 6bf07c2a880a690a01631fe0e93d2eda
systemtap-runtime-0.6.2-2.el4_8.1.ia64.rpm
File outdated by:  RHBA-2011:0929
    MD5: 5fa105100cea2fe1e5a9302c7e432313
systemtap-testsuite-0.6.2-2.el4_8.1.ia64.rpm
File outdated by:  RHBA-2011:0929
    MD5: 90341f49de4b0d3326b1313c509e4b28
 
x86_64:
systemtap-0.6.2-2.el4_8.1.x86_64.rpm
File outdated by:  RHBA-2011:0929
    MD5: f2ecaa3c5bc2683985f4c292b157077c
systemtap-runtime-0.6.2-2.el4_8.1.x86_64.rpm
File outdated by:  RHBA-2011:0929
    MD5: c3d94d16b814a02e6edf331c89fd03ac
systemtap-testsuite-0.6.2-2.el4_8.1.x86_64.rpm
File outdated by:  RHBA-2011:0929
    MD5: a504f447c961006b94fe28a06334d7e0
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

559719 - CVE-2010-0411 systemtap: Crash with systemtap script using __get_argv()


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/