DSA-1755-1 systemtap -- race condition

Related Vulnerabilities: CVE-2009-0784  

Erik Sjoelund discovered that a race condition in the stap tool shipped by Systemtap, an instrumentation system for Linux 2.6, allows local privilege escalation for members of the stapusr group. The old stable distribution (etch) isn't affected. For the stable distribution (lenny), this problem has been fixed in version 0.0.20080705-1+lenny1. For the unstable distribution (sid), this problem has been fixed in version 0.0.20090314-2. We recommend that you upgrade your systemtap package.

Debian Security Advisory

DSA-1755-1 systemtap -- race condition

Date Reported:
25 Mar 2009
Affected Packages:
systemtap
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2009-0784.
More information:

Erik Sjoelund discovered that a race condition in the stap tool shipped by Systemtap, an instrumentation system for Linux 2.6, allows local privilege escalation for members of the stapusr group.

The old stable distribution (etch) isn't affected.

For the stable distribution (lenny), this problem has been fixed in version 0.0.20080705-1+lenny1.

For the unstable distribution (sid), this problem has been fixed in version 0.0.20090314-2.

We recommend that you upgrade your systemtap package.

Fixed in:

Debian GNU/Linux 5.0 (lenny)

Source:
http://security.debian.org/pool/updates/main/s/systemtap/systemtap_0.0.20080705.orig.tar.gz
http://security.debian.org/pool/updates/main/s/systemtap/systemtap_0.0.20080705-1+lenny1.diff.gz
http://security.debian.org/pool/updates/main/s/systemtap/systemtap_0.0.20080705-1+lenny1.dsc
AMD64:
http://security.debian.org/pool/updates/main/s/systemtap/systemtap_0.0.20080705-1+lenny1_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/s/systemtap/systemtap_0.0.20080705-1+lenny1_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/s/systemtap/systemtap_0.0.20080705-1+lenny1_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/s/systemtap/systemtap_0.0.20080705-1+lenny1_ia64.deb
PowerPC:
http://security.debian.org/pool/updates/main/s/systemtap/systemtap_0.0.20080705-1+lenny1_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/s/systemtap/systemtap_0.0.20080705-1+lenny1_s390.deb

MD5 checksums of the listed files are available in the original advisory.