Description
A flaw was found in the SystemTap compile server, stap-server, an optional
component of SystemTap. This server did not adequately sanitize input
provided by the stap-client program, which may allow a remote user to
execute arbitrary shell code with the privileges of the compile server
process, which could possibly be running as the root user. (CVE-2009-4273)
A buffer overflow flaw was found in SystemTap's tapset __get_argv()
function. If a privileged user ran a SystemTap script that called this
function, a local, unprivileged user could, while that script is still
running, trigger this flaw and cause memory corruption by running a command
with a large argument list, which may lead to a system crash or,
potentially, arbitrary code execution with root privileges. (CVE-2010-0411)