Rapid7 Vulnerability & Exploit Database

RHSA-2011:1088: systemtap security update

Back to Search

RHSA-2011:1088: systemtap security update

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
07/25/2011
Created
07/25/2018
Added
07/29/2011
Modified
07/04/2017

Description

SystemTap is an instrumentation system for systems running the Linuxkernel. The system allows developers to write scripts to collect data onthe operation of the system.It was found that SystemTap did not perform proper module path sanitychecking if a user specified a custom path to the uprobes module, usedwhen performing user-space probing ("staprun -u"). A local user who is amember of the stapusr group could use this flaw to bypass intendedmodule-loading restrictions, allowing them to escalate their privileges byloading an arbitrary, unsigned module. (CVE-2011-2502)A race condition flaw was found in the way the staprun utility performedmodule loading. A local user who is a member of the stapusr group coulduse this flaw to modify a signed module while it is being loaded,allowing them to escalate their privileges. (CVE-2011-2503)SystemTap users should upgrade to these updated packages, which containbackported patches to correct these issues.

Solution(s)

  • redhat-upgrade-systemtap
  • redhat-upgrade-systemtap-client
  • redhat-upgrade-systemtap-debuginfo
  • redhat-upgrade-systemtap-grapher
  • redhat-upgrade-systemtap-initscript
  • redhat-upgrade-systemtap-runtime
  • redhat-upgrade-systemtap-sdt-devel
  • redhat-upgrade-systemtap-server
  • redhat-upgrade-systemtap-testsuite

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;