Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 290218 (CVE-2009-2911) - dev-util/systemtap DoS (+privilege escalation?) (CVE-2009-2911)
Summary: dev-util/systemtap DoS (+privilege escalation?) (CVE-2009-2911)
Status: RESOLVED FIXED
Alias: CVE-2009-2911
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High trivial (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: ~3? [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2009-10-23 09:41 UTC by Alex Legler (RETIRED)
Modified: 2009-11-04 04:14 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alex Legler (RETIRED) archtester gentoo-dev Security 2009-10-23 09:41:11 UTC
CVE-2009-2911 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2911):
  SystemTap 1.0, when the --unprivileged option is used, does not
  properly restrict certain data sizes, which allows local users to (1)
  cause a denial of service or gain privileges via a print operation
  with a large number of arguments that trigger a kernel stack
  overflow, (2) cause a denial of service via crafted DWARF expressions
  that trigger a kernel stack frame overflow, or (3) cause a denial of
  service (infinite loop) via vectors that trigger creation of large
  unwind tables, related to Common Information Entry (CIE) and Call
  Frame Instruction (CFI) records.
Comment 1 Sven Wegener gentoo-dev 2009-10-31 15:43:11 UTC
i've commited 1.0-r1 to the tree, grabbing the three patches from redhat.
Comment 2 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-10-31 15:48:58 UTC
Thank you. Closing noglsa.
Comment 3 Samuli Suominen (RETIRED) gentoo-dev 2009-10-31 15:51:15 UTC
Security: 

Please note that >=dev-util/systemtap-1 is hardmasked on selinux/ profiles,
which means this fix will not be available for selinux users.
Comment 4 Robert Buchholz (RETIRED) gentoo-dev 2009-11-04 04:14:46 UTC
Earlier versions (before 1.0) did not suffer from this vulnerability, so it is not an issue for them.