CVE-2011-2502

runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate modules when a module path is specified by a user for user-space probing, which allows local users in the stapusr group to gain privileges via a crafted module in the search path in the -u argument.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.4 UNKNOWN
LOCAL
MEDIUM
AV:L/AC:M/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 23%
VendorProductVersion
systemtapsystemtap
𝑥
≤ 1.5
systemtapsystemtap
0.2.2
systemtapsystemtap
0.3
systemtapsystemtap
0.4
systemtapsystemtap
0.5
systemtapsystemtap
0.5.3
systemtapsystemtap
0.5.4
systemtapsystemtap
0.5.5
systemtapsystemtap
0.5.7
systemtapsystemtap
0.5.8
systemtapsystemtap
0.5.9
systemtapsystemtap
0.5.10
systemtapsystemtap
0.5.12
systemtapsystemtap
0.5.13
systemtapsystemtap
0.5.14
systemtapsystemtap
0.6
systemtapsystemtap
0.6.2
systemtapsystemtap
0.7
systemtapsystemtap
0.7.2
systemtapsystemtap
0.8
systemtapsystemtap
0.9
systemtapsystemtap
0.9.5
systemtapsystemtap
0.9.7
systemtapsystemtap
0.9.8
systemtapsystemtap
0.9.9
systemtapsystemtap
1.0
systemtapsystemtap
1.1
systemtapsystemtap
1.2
systemtapsystemtap
1.3
systemtapsystemtap
1.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
systemtap
bullseye
4.4-2
fixed
lenny
not-affected
squeeze
not-affected
bookworm
4.8-2
fixed
sid
5.1-4
fixed
trixie
5.1-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
systemtap
raring
not-affected
quantal
not-affected
precise
not-affected
oneiric
ignored
natty
ignored
maverick
ignored
lucid
not-affected
hardy
ignored