Description
runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate modules when a module path is specified by a user for user-space probing, which allows local users in the stapusr group to gain privileges via a crafted module in the search path in the -u argument.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2011-2489 | runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate modules when a module path is specified by a user for user-space probing, which allows local users in the stapusr group to gain privileges via a crafted module in the search path in the -u argument. |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-09-16T20:42:11.436Z
Reserved: 2011-06-15T00:00:00.000Z
Link: CVE-2011-2502
No data.
Status : Modified
Published: 2012-07-26T19:55:00.700
Modified: 2026-04-29T01:13:23.040
Link: CVE-2011-2502
OpenCVE Enrichment
No data.
Weaknesses
EUVD