Amazon Linux 1 Security Advisory: ALAS-2012-54
Advisory Release Date: 2012-03-15 19:21 Pacific
Advisory Updated Date: 2014-09-14 15:40 Pacific
An invalid pointer read flaw was found in the way SystemTap handled malformed debugging information in DWARF format. When SystemTap unprivileged mode was enabled, an unprivileged user in the stapusr group could use this flaw to crash the system or, potentially, read arbitrary kernel memory. Additionally, a privileged user (root, or a member of the stapdev group) could trigger this flaw when tricked into instrumenting a specially-crafted ELF binary, even when unprivileged mode was not enabled. (CVE-2012-0875)
Affected Packages:
systemtap
Issue Correction:
Run yum update systemtap to update your system.
i686:
systemtap-debuginfo-1.6-5.12.amzn1.i686
systemtap-1.6-5.12.amzn1.i686
systemtap-server-1.6-5.12.amzn1.i686
systemtap-sdt-devel-1.6-5.12.amzn1.i686
systemtap-testsuite-1.6-5.12.amzn1.i686
systemtap-initscript-1.6-5.12.amzn1.i686
systemtap-runtime-1.6-5.12.amzn1.i686
src:
systemtap-1.6-5.12.amzn1.src
x86_64:
systemtap-sdt-devel-1.6-5.12.amzn1.x86_64
systemtap-testsuite-1.6-5.12.amzn1.x86_64
systemtap-runtime-1.6-5.12.amzn1.x86_64
systemtap-debuginfo-1.6-5.12.amzn1.x86_64
systemtap-1.6-5.12.amzn1.x86_64
systemtap-server-1.6-5.12.amzn1.x86_64
systemtap-initscript-1.6-5.12.amzn1.x86_64