Lucene search

K

Systemtap Security Vulnerabilities

cve
cve

CVE-2012-0875

SystemTap 1.7, 1.6.7, and probably other versions, when unprivileged mode is enabled, allows local users to obtain sensitive information from kernel memory or cause a denial of service (kernel panic and crash) via vectors related to crafted DWARF data, which triggers a read of an invalid...

5.8AI Score

0.0004EPSS

2014-02-04 11:55 PM
35
cve
cve

CVE-2011-2503

The insert_module function in runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate a module when loading it, which allows local users to gain privileges via a race condition between the signature validation and the module...

6AI Score

0.0004EPSS

2012-07-26 07:55 PM
30
cve
cve

CVE-2011-2502

runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate modules when a module path is specified by a user for user-space probing, which allows local users in the stapusr group to gain privileges via a crafted module in the search...

6.1AI Score

0.0004EPSS

2012-07-26 07:55 PM
20
cve
cve

CVE-2011-1769

SystemTap 1.4 and earlier, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs context variable...

5.7AI Score

0.0004EPSS

2011-08-29 09:55 PM
36
cve
cve

CVE-2011-1781

SystemTap 1.4, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs stack unwinding (aka...

5.8AI Score

0.0004EPSS

2011-08-29 09:55 PM
25
cve
cve

CVE-2010-4170

The staprun runtime tool in SystemTap 1.3 does not properly clear the environment before executing modprobe, which allows local users to gain privileges by setting the MODPROBE_OPTIONS environment variable to specify a malicious configuration...

6AI Score

0.001EPSS

2010-12-07 10:00 PM
52
1
cve
cve

CVE-2010-4171

The staprun runtime tool in SystemTap 1.3 does not verify that a module to unload was previously loaded by SystemTap, which allows local users to cause a denial of service (unloading of arbitrary kernel...

5.9AI Score

0.0004EPSS

2010-12-07 10:00 PM
28
cve
cve

CVE-2010-0412

stap-server in SystemTap 1.1 does not properly restrict the value of the -B (aka BUILD) option, which allows attackers to have an unspecified impact via vectors associated with executing the make program, a different vulnerability than...

6.1AI Score

0.058EPSS

2010-02-25 12:30 AM
27
cve
cve

CVE-2010-0411

Multiple integer signedness errors in the (1) __get_argv and (2) __get_compat_argv functions in tapset/aux_syscalls.stp in SystemTap 1.1 allow local users to cause a denial of service (script crash, or system crash or hang) via a process with a large number of arguments, leading to a buffer...

6.1AI Score

0.001EPSS

2010-02-08 08:30 PM
29
cve
cve

CVE-2009-4273

stap-server in SystemTap before 1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in stap command-line arguments in a...

7.2AI Score

0.099EPSS

2010-01-26 06:30 PM
35
cve
cve

CVE-2009-2911

SystemTap 1.0, when the --unprivileged option is used, does not properly restrict certain data sizes, which allows local users to (1) cause a denial of service or gain privileges via a print operation with a large number of arguments that trigger a kernel stack overflow, (2) cause a denial of...

6.2AI Score

0.0004EPSS

2009-10-22 04:30 PM
32
cve
cve

CVE-2009-0784

Race condition in the SystemTap stap tool 0.0.20080705 and 0.0.20090314 allows local users in the stapusr group to insert arbitrary SystemTap kernel modules and gain privileges via unknown...

6.1AI Score

0.0004EPSS

2009-03-25 11:30 PM
27