Bug 1085465 - (CVE-2010-4170) VUL-0: systemtap: CVE-2010-4170 Systemtap: Insecure loading of modules
(CVE-2010-4170)
VUL-0: systemtap: CVE-2010-4170 Systemtap: Insecure loading of modules
Status: RESOLVED INVALID
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P5 - None : Major
: ---
Assigned To: Tony Jones
Security Team bot
https://smash.suse.de/issue/66401/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2018-03-15 12:38 UTC by Karol Babioch
Modified: 2018-03-15 23:35 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Karol Babioch 2018-03-15 12:38:15 UTC
rh#653604

The staprun runtime tool in SystemTap 1.3 does not properly clear the
environment before executing modprobe, which allows local users to gain
privileges by setting the MODPROBE_OPTIONS environment variable to specify a
malicious configuration file.

References:
https://bugzilla.redhat.com/show_bug.cgi?id=653604
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4170
http://www.debian.org/security/2011/dsa-2348
http://people.canonical.com/~ubuntu-security/cve/2010/CVE-2010-4170.html
https://rhn.redhat.com/errata/RHSA-2010-0894.html
https://rhn.redhat.com/errata/RHSA-2010-0895.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4170
http://secunia.com/advisories/46920
http://secunia.com/advisories/42318
http://secunia.com/advisories/42306
http://secunia.com/advisories/42263
http://secunia.com/advisories/42256
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051127.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051122.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051115.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/63344
http://sources.redhat.com/git/gitweb.cgi?p=systemtap.git;a=commit;h=b7565b41228bea196cefa3a7d43ab67f8f9152e2
http://xforce.iss.net/xforce/xfdb/63344
http://www.securitytracker.com/id?1024754
http://www.securityfocus.com/bid/44914
http://www.exploit-db.com/exploits/15620
http://sources.redhat.com/ml/systemtap/2010-q4/msg00230.html
Comment 3 Karol Babioch 2018-03-15 14:07:48 UTC
Not shipping setuid wrapper in question.