Race condition in the SystemTap stap tool 0.0.20080705 and 0.0.20090314 allows local users in the stapusr group to insert arbitrary SystemTap kernel modules and gain privileges via unknown vectors.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
http://www.debian.org/security/2009/dsa-1755 | third party advisory patch vendor advisory |
http://secunia.com/advisories/34479 | third party advisory |
http://support.avaya.com/elmodocs2/security/ASA-2009-110.htm | third party advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11613 | vdb entry third party advisory signature |
http://www.redhat.com/support/errata/RHSA-2009-0373.html | third party advisory vendor advisory |
http://secunia.com/advisories/34548 | third party advisory |
http://www.vupen.com/english/advisories/2009/0907 | vdb entry third party advisory |
http://secunia.com/advisories/34441 | third party advisory |