CVE-2011-2502

EUVD-2011-2489
runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate modules when a module path is specified by a user for user-space probing, which allows local users in the stapusr group to gain privileges via a crafted module in the search path in the -u argument.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.4 UNKNOWN
LOCAL
MEDIUM
AV:L/AC:M/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 22%
Affected Products (NVD)
VendorProductVersion
systemtapsystemtap
𝑥
≤ 1.5
systemtapsystemtap
0.2.2
systemtapsystemtap
0.3
systemtapsystemtap
0.4
systemtapsystemtap
0.5
systemtapsystemtap
0.5.3
systemtapsystemtap
0.5.4
systemtapsystemtap
0.5.5
systemtapsystemtap
0.5.7
systemtapsystemtap
0.5.8
systemtapsystemtap
0.5.9
systemtapsystemtap
0.5.10
systemtapsystemtap
0.5.12
systemtapsystemtap
0.5.13
systemtapsystemtap
0.5.14
systemtapsystemtap
0.6
systemtapsystemtap
0.6.2
systemtapsystemtap
0.7
systemtapsystemtap
0.7.2
systemtapsystemtap
0.8
systemtapsystemtap
0.9
systemtapsystemtap
0.9.5
systemtapsystemtap
0.9.7
systemtapsystemtap
0.9.8
systemtapsystemtap
0.9.9
systemtapsystemtap
1.0
systemtapsystemtap
1.1
systemtapsystemtap
1.2
systemtapsystemtap
1.3
systemtapsystemtap
1.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
systemtap
bookworm
4.8-2
fixed
bullseye
4.4-2
fixed
lenny
not-affected
sid
5.1-4
fixed
squeeze
not-affected
trixie
5.1-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
systemtap
hardy
ignored
lucid
not-affected
maverick
ignored
natty
ignored
oneiric
ignored
precise
not-affected
quantal
not-affected
raring
not-affected