CVE-2011-2502
Publication date 26 July 2012
Last updated 24 July 2024
Ubuntu priority
runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate modules when a module path is specified by a user for user-space probing, which allows local users in the stapusr group to gain privileges via a crafted module in the search path in the -u argument.
Status
Package | Ubuntu Release | Status |
---|---|---|
systemtap | 13.04 raring |
Not affected
|
12.10 quantal |
Not affected
|
|
12.04 LTS precise |
Not affected
|
|
11.10 oneiric | Ignored end of life | |
11.04 natty | Ignored end of life | |
10.10 maverick | Ignored end of life | |
10.04 LTS lucid |
Not affected
|
|
8.04 LTS hardy | Ignored end of life |