CVE-2011-2502
26.07.2012, 19:55
runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate modules when a module path is specified by a user for user-space probing, which allows local users in the stapusr group to gain privileges via a crafted module in the search path in the -u argument.Enginsight
Vendor | Product | Version |
---|---|---|
systemtap | systemtap | 𝑥 ≤ 1.5 |
systemtap | systemtap | 0.2.2 |
systemtap | systemtap | 0.3 |
systemtap | systemtap | 0.4 |
systemtap | systemtap | 0.5 |
systemtap | systemtap | 0.5.3 |
systemtap | systemtap | 0.5.4 |
systemtap | systemtap | 0.5.5 |
systemtap | systemtap | 0.5.7 |
systemtap | systemtap | 0.5.8 |
systemtap | systemtap | 0.5.9 |
systemtap | systemtap | 0.5.10 |
systemtap | systemtap | 0.5.12 |
systemtap | systemtap | 0.5.13 |
systemtap | systemtap | 0.5.14 |
systemtap | systemtap | 0.6 |
systemtap | systemtap | 0.6.2 |
systemtap | systemtap | 0.7 |
systemtap | systemtap | 0.7.2 |
systemtap | systemtap | 0.8 |
systemtap | systemtap | 0.9 |
systemtap | systemtap | 0.9.5 |
systemtap | systemtap | 0.9.7 |
systemtap | systemtap | 0.9.8 |
systemtap | systemtap | 0.9.9 |
systemtap | systemtap | 1.0 |
systemtap | systemtap | 1.1 |
systemtap | systemtap | 1.2 |
systemtap | systemtap | 1.3 |
systemtap | systemtap | 1.4 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References