|Category:||Debian Local Security Checks|
|Title:||Debian Security Advisory DSA 2348-1 (systemtap)|
|Summary:||The remote host is missing an update to systemtap;announced via advisory DSA 2348-1.|
The remote host is missing an update to systemtap
announced via advisory DSA 2348-1.
Several vulnerabilities were discovered in SystemTap, an instrumentation
system for Linux:
It was discovered that a race condition in staprun could lead to
It was discovered that insufficient validation of environment
variables in staprun could lead to privilege escalation.
It was discovered that insufficient validation of module unloading
could lead to denial of service.
For the stable distribution (squeeze), this problem has been fixed in
For the unstable distribution (sid), this problem has been fixed in
We recommend that you upgrade your systemtap packages.
Common Vulnerability Exposure (CVE) ID: CVE-2010-4170|
BugTraq ID: 44914
Debian Security Information: DSA-2348 (Google Search)
XForce ISS Database: systemtap-staprun-priv-escalation(63344)
Common Vulnerability Exposure (CVE) ID: CVE-2010-4171
BugTraq ID: 44917
XForce ISS Database: systemtap-staprunmod-dos(63345)
Common Vulnerability Exposure (CVE) ID: CVE-2011-2503
|Copyright||Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.