systemtap-1.6-7.AXS3
エラータID: AXSA:2012-344:01
SystemTap is an instrumentation system for systems running Linux 2.6. Developers can write instrumentation to collect data on the operation of the system.
Security issues fixed with this release:
• CVE-2012-0875
No information available at the time of writing, please refer to the CVE links below.
Fixed bugs:
• Upgraded to upstream version 1.6.
• For the with server portion of the SystemTap buildok test suite, the server needs an authorized certificate for signing the code built by the compiler server. Sometimes, a client running the test suite never obtained the authorized certificate and additional failures were reported by the test suite compared to the self-hosted buildok test runs. This has been fixed: results for the with server portion of test suite match those for the self-hosted test suite.
• To prevent data corruption, the systemtap data structure to track address accesses requires a locking mechanism. If excessive contention for reading the data structure occured, the spinlocks that were used could cause kernel panics. The locking mechanism has been changed to rwlock, which fixes this bug.
• The debugfs directory associated with a systemtap script could remain in the system after the script exited, preventing subsequent scripts from creating their own debugfs directories unless the system was rebooted. This has been fixed: debugfs directories are removed every time a systemtap script exits.
• The tracepoint names for older kernels' so probe points and newer kernels' irq.stp tapset did not match. As a result, the softirq.* probe points were not found on kernels in Asianux Server 3. This has been fixed.
• The operands in the newest version of user-space markers could sometimes not be parsed, and some tests failed. The updated systemtap handles those operands as expected now.
• The memory.stp tapset's vm.write_shared_copy probe used by the memory-write_shared_copy.stp test in systemtap earlier versions was a dummy: it let the test case falsely pass. It later became a real probe but cannot be resolved on Asianux Server 3 kernel because of incomplete debug information generated by the gcc compiler and the test would fail and appear as regression. This test case is now designated as a known failure (KFAIL) and does not appear as a regression any longer.
Update packages.
SystemTap 1.7, 1.6.7, and probably other versions, when unprivileged mode is enabled, allows local users to obtain sensitive information from kernel memory or cause a denial of service (kernel panic and crash) via vectors related to crafted DWARF data, which triggers a read of an invalid pointer.
N/A
SRPMS
- systemtap-1.6-7.AXS3.src.rpm
MD5: 3e7071c46a3446ddea0a876768f7df67
SHA-256: db4a2edd3fc62cf62e630060810d5b5cf3642d6949aa1f529a10417fee4c0f69
Size: 3.87 MB
Asianux Server 3 for x86
- systemtap-1.6-7.AXS3.i386.rpm
MD5: 1995b6cbd2418aea7e626cfac4e93feb
SHA-256: 7308d8928a83956c247d0dba908bc8538ae30506fbf40b0db831d556f25f36bc
Size: 2.84 MB - systemtap-runtime-1.6-7.AXS3.i386.rpm
MD5: f343d087f2d6929f474654acd252bffd
SHA-256: 8d4c6a2f2c54714a5c1cbf9038a9a02f558996bd2972dd6cddf966e2bcbbe82d
Size: 211.23 kB
Asianux Server 3 for x86_64
- systemtap-1.6-7.AXS3.x86_64.rpm
MD5: 1c586b0f9241d486d9356875a767d31b
SHA-256: 344dec231f09f95390a781bd9613c4f05b0edbfe8d1536d4ff9f43c2995173f1
Size: 2.77 MB - systemtap-runtime-1.6-7.AXS3.x86_64.rpm
MD5: 716993e18729ccbf6118bc5569ed98ce
SHA-256: 8439e5bb5a80ea41b00a412e5b9c3f3324f70a4179abe8972dbc81722dfb513a
Size: 215.88 kB