Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-2502

Опубликовано: 25 июл. 2011
Источник: redhat
CVSS2: 6.8
EPSS Низкий

Описание

runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate modules when a module path is specified by a user for user-space probing, which allows local users in the stapusr group to gain privileges via a crafted module in the search path in the -u argument.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4systemtapNot affected
Red Hat Enterprise Linux 5systemtapNot affected
Red Hat Enterprise Linux 6systemtapFixedRHSA-2011:108825.07.2011

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=716476systemtap: insufficient security check when loading uprobes kernel module

EPSS

Процентиль: 24%
0.00076
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 13 лет назад

runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate modules when a module path is specified by a user for user-space probing, which allows local users in the stapusr group to gain privileges via a crafted module in the search path in the -u argument.

nvd
почти 13 лет назад

runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate modules when a module path is specified by a user for user-space probing, which allows local users in the stapusr group to gain privileges via a crafted module in the search path in the -u argument.

debian
почти 13 лет назад

runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun ...

github
около 3 лет назад

runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate modules when a module path is specified by a user for user-space probing, which allows local users in the stapusr group to gain privileges via a crafted module in the search path in the -u argument.

oracle-oval
почти 14 лет назад

ELSA-2011-1088: systemtap security update (MODERATE)

EPSS

Процентиль: 24%
0.00076
Низкий

6.8 Medium

CVSS2