SystemTap 0.0.20080705

CPE Details

SystemTap 0.0.20080705
0.0.20080705
2020-11-04
18h30 +00:00
2020-11-04
18h30 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:systemtap:systemtap:0.0.20080705:*:*:*:*:*:*:*

Informations

Vendor

systemtap

Product

systemtap

Version

0.0.20080705

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2011-2502 2012-07-26 19h00 +00:00 runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate modules when a module path is specified by a user for user-space probing, which allows local users in the stapusr group to gain privileges via a crafted module in the search path in the -u argument.
4.4
CVE-2011-2503 2012-07-26 19h00 +00:00 The insert_module function in runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate a module when loading it, which allows local users to gain privileges via a race condition between the signature validation and the module initialization.
3.7
CVE-2011-1769 2011-08-29 19h00 +00:00 SystemTap 1.4 and earlier, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs context variable access.
1.2
CVE-2009-4273 2010-01-26 17h00 +00:00 stap-server in SystemTap before 1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in stap command-line arguments in a request.
10
CVE-2009-0784 2009-03-25 22h00 +00:00 Race condition in the SystemTap stap tool 0.0.20080705 and 0.0.20090314 allows local users in the stapusr group to insert arbitrary SystemTap kernel modules and gain privileges via unknown vectors.
6.3