openSUSE Security Update: systemtap: fix for remote code execution and denial of service ______________________________________________________________________________ Announcement ID: openSUSE-SU-2010:0166-1 Rating: important References: #574243 Cross-References: CVE-2009-4273 CVE-2010-0411 Affected Products: openSUSE 11.2 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. It includes one version update. Description: This updates systemtap to version 1.0. The version update was required to fix two issues; a shell meta.character injection vulnerability that allowed remote users to execute arbitrary commands () with the privileges of the stap-server. (CVE-2009-4273: CVSS v2 Base Score: 7.9 (important) (AV:A/AC:M/Au:N/C:C/I:C/A:C)) and a remote denial of service bug in the __get_argv() function (CVE-2010-0411: CVSS v2 Base Score: 4.9 (MEDIUM) (AV:L/AC:L/Au:N/C:N/I:N/A:C)). Version 1.0 is also subject to advisory CVE-2009-2911 fixing three denial of service issues when using unprivileged mode. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.2: zypper in -t patch systemtap-2088 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 11.2 (i586 src x86_64) [New Version: 1.0]: systemtap-1.0-1.1.1 - openSUSE 11.2 (i586 x86_64) [New Version: 1.0]: systemtap-client-1.0-1.1.1 systemtap-runtime-1.0-1.1.1 systemtap-sdt-devel-1.0-1.1.1 systemtap-server-1.0-1.1.1 References: http://support.novell.com/security/cve/CVE-2009-4273.html http://support.novell.com/security/cve/CVE-2010-0411.html https://bugzilla.novell.com/574243