Lucene search

K

Systemtap Security Vulnerabilities

cve
cve

CVE-2009-0784

Race condition in the SystemTap stap tool 0.0.20080705 and 0.0.20090314 allows local users in the stapusr group to insert arbitrary SystemTap kernel modules and gain privileges via unknown vectors.

6.2AI Score

0.0004EPSS

2009-03-25 11:30 PM
28
cve
cve

CVE-2009-2911

SystemTap 1.0, when the --unprivileged option is used, does not properly restrict certain data sizes, which allows local users to (1) cause a denial of service or gain privileges via a print operation with a large number of arguments that trigger a kernel stack overflow, (2) cause a denial of servi...

6AI Score

0.0004EPSS

2009-10-22 04:30 PM
33
cve
cve

CVE-2009-4273

stap-server in SystemTap before 1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in stap command-line arguments in a request.

7.4AI Score

0.099EPSS

2010-01-26 06:30 PM
36
cve
cve

CVE-2010-0411

Multiple integer signedness errors in the (1) __get_argv and (2) __get_compat_argv functions in tapset/aux_syscalls.stp in SystemTap 1.1 allow local users to cause a denial of service (script crash, or system crash or hang) via a process with a large number of arguments, leading to a buffer overflo...

6.2AI Score

0.001EPSS

2010-02-08 08:30 PM
29
cve
cve

CVE-2010-0412

stap-server in SystemTap 1.1 does not properly restrict the value of the -B (aka BUILD) option, which allows attackers to have an unspecified impact via vectors associated with executing the make program, a different vulnerability than CVE-2009-4273.

6.2AI Score

0.099EPSS

2010-02-25 12:30 AM
28
cve
cve

CVE-2010-4170

The staprun runtime tool in SystemTap 1.3 does not properly clear the environment before executing modprobe, which allows local users to gain privileges by setting the MODPROBE_OPTIONS environment variable to specify a malicious configuration file.

6AI Score

0.001EPSS

2010-12-07 10:00 PM
52
1
cve
cve

CVE-2010-4171

The staprun runtime tool in SystemTap 1.3 does not verify that a module to unload was previously loaded by SystemTap, which allows local users to cause a denial of service (unloading of arbitrary kernel modules).

6AI Score

0.0004EPSS

2010-12-07 10:00 PM
29
cve
cve

CVE-2011-1769

SystemTap 1.4 and earlier, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs context variable access.

5.8AI Score

0.0004EPSS

2011-08-29 09:55 PM
36
cve
cve

CVE-2011-1781

SystemTap 1.4, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs stack unwinding (aka backtracing).

5.9AI Score

0.0004EPSS

2011-08-29 09:55 PM
25
cve
cve

CVE-2011-2502

runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate modules when a module path is specified by a user for user-space probing, which allows local users in the stapusr group to gain privileges via a crafted module in the search pa...

6.2AI Score

0.0004EPSS

2022-10-03 04:15 PM
20
cve
cve

CVE-2011-2503

The insert_module function in runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate a module when loading it, which allows local users to gain privileges via a race condition between the signature validation and the module initial...

6.1AI Score

0.0004EPSS

2022-10-03 04:15 PM
31
cve
cve

CVE-2012-0875

SystemTap 1.7, 1.6.7, and probably other versions, when unprivileged mode is enabled, allows local users to obtain sensitive information from kernel memory or cause a denial of service (kernel panic and crash) via vectors related to crafted DWARF data, which triggers a read of an invalid pointer.

5.8AI Score

0.0004EPSS

2014-02-04 11:55 PM
35