Vulnerability Description
runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate modules when a module path is specified by a user for user-space probing, which allows local users in the stapusr group to gain privileges via a crafted module in the search path in the -u argument.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Systemtap | Systemtap | <= 1.5 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/45377Vendor Advisory
- http://sources.redhat.com/git/gitweb.cgi?p=systemtap.git%3Ba=blob%3Bf=NEWS%3Bhb=
- http://sources.redhat.com/git/gitweb.cgi?p=systemtap.git%3Ba=commitdiff%3Bh=4eca
- https://bugzilla.redhat.com/show_bug.cgi?id=716476
- http://secunia.com/advisories/45377Vendor Advisory
- http://sources.redhat.com/git/gitweb.cgi?p=systemtap.git%3Ba=blob%3Bf=NEWS%3Bhb=
- http://sources.redhat.com/git/gitweb.cgi?p=systemtap.git%3Ba=commitdiff%3Bh=4eca
- https://bugzilla.redhat.com/show_bug.cgi?id=716476
FAQ
What is CVE-2011-2502?
CVE-2011-2502 is a vulnerability with a CVSS score of 4.4 (MEDIUM). runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate modules when a module path is specified by a user for user-space probing, whi...
How severe is CVE-2011-2502?
CVE-2011-2502 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-2502?
Check the references section above for vendor advisories and patch information. Affected products include: Systemtap Systemtap.