ALAS-2012-054


Amazon Linux AMI Security Advisory: ALAS-2012-54
Advisory Release Date: 2014-09-14 15:40 Pacific
Severity: Medium

Issue Overview:

An invalid pointer read flaw was found in the way SystemTap handled malformed debugging information in DWARF format. When SystemTap unprivileged mode was enabled, an unprivileged user in the stapusr group could use this flaw to crash the system or, potentially, read arbitrary kernel memory. Additionally, a privileged user (root, or a member of the stapdev group) could trigger this flaw when tricked into instrumenting a specially-crafted ELF binary, even when unprivileged mode was not enabled. (CVE-2012-0875 )


Affected Packages:

systemtap


Issue Correction:
Run yum update systemtap to update your system.

New Packages:
i686:
    systemtap-debuginfo-1.6-5.12.amzn1.i686
    systemtap-1.6-5.12.amzn1.i686
    systemtap-server-1.6-5.12.amzn1.i686
    systemtap-sdt-devel-1.6-5.12.amzn1.i686
    systemtap-testsuite-1.6-5.12.amzn1.i686
    systemtap-initscript-1.6-5.12.amzn1.i686
    systemtap-runtime-1.6-5.12.amzn1.i686

src:
    systemtap-1.6-5.12.amzn1.src

x86_64:
    systemtap-sdt-devel-1.6-5.12.amzn1.x86_64
    systemtap-testsuite-1.6-5.12.amzn1.x86_64
    systemtap-runtime-1.6-5.12.amzn1.x86_64
    systemtap-debuginfo-1.6-5.12.amzn1.x86_64
    systemtap-1.6-5.12.amzn1.x86_64
    systemtap-server-1.6-5.12.amzn1.x86_64
    systemtap-initscript-1.6-5.12.amzn1.x86_64