Описание
ELSA-2011-0842: systemtap security update (MODERATE)
[1.4.6.0.1.el6_1.1]
- remove doc/SystemTap_Beginners_Guide/en-US in tarball
- comment bz683569.patch in specfile
[1.3-4.1]
- bz702687 (patch)
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
systemtap
1.4-6.0.1.el6_1.1
systemtap-client
1.4-6.0.1.el6_1.1
systemtap-grapher
1.4-6.0.1.el6_1.1
systemtap-initscript
1.4-6.0.1.el6_1.1
systemtap-runtime
1.4-6.0.1.el6_1.1
systemtap-sdt-devel
1.4-6.0.1.el6_1.1
systemtap-server
1.4-6.0.1.el6_1.1
systemtap-testsuite
1.4-6.0.1.el6_1.1
Oracle Linux i686
systemtap
1.4-6.0.1.el6_1.1
systemtap-client
1.4-6.0.1.el6_1.1
systemtap-grapher
1.4-6.0.1.el6_1.1
systemtap-initscript
1.4-6.0.1.el6_1.1
systemtap-runtime
1.4-6.0.1.el6_1.1
systemtap-sdt-devel
1.4-6.0.1.el6_1.1
systemtap-server
1.4-6.0.1.el6_1.1
systemtap-testsuite
1.4-6.0.1.el6_1.1
Связанные CVE
Связанные уязвимости
SystemTap 1.4, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs stack unwinding (aka backtracing).
SystemTap 1.4, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs stack unwinding (aka backtracing).
SystemTap 1.4, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs stack unwinding (aka backtracing).
SystemTap 1.4, when unprivileged (aka stapusr) mode is enabled, allows ...
SystemTap 1.4 and earlier, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs context variable access.