Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-2502

Опубликовано: 26 июл. 2012
Источник: debian
EPSS Низкий

Описание

runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate modules when a module path is specified by a user for user-space probing, which allows local users in the stapusr group to gain privileges via a crafted module in the search path in the -u argument.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
systemtapfixed1.6-1package
systemtapnot-affectedlennypackage
systemtapnot-affectedsqueezepackage

EPSS

Процентиль: 24%
0.00076
Низкий

Связанные уязвимости

ubuntu
почти 13 лет назад

runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate modules when a module path is specified by a user for user-space probing, which allows local users in the stapusr group to gain privileges via a crafted module in the search path in the -u argument.

redhat
почти 14 лет назад

runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate modules when a module path is specified by a user for user-space probing, which allows local users in the stapusr group to gain privileges via a crafted module in the search path in the -u argument.

nvd
почти 13 лет назад

runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate modules when a module path is specified by a user for user-space probing, which allows local users in the stapusr group to gain privileges via a crafted module in the search path in the -u argument.

github
около 3 лет назад

runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate modules when a module path is specified by a user for user-space probing, which allows local users in the stapusr group to gain privileges via a crafted module in the search path in the -u argument.

oracle-oval
почти 14 лет назад

ELSA-2011-1088: systemtap security update (MODERATE)

EPSS

Процентиль: 24%
0.00076
Низкий