Max CVSS | 6.3 | Min CVSS | 1.2 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2012-0875 | 5.4 |
SystemTap 1.7, 1.6.7, and probably other versions, when unprivileged mode is enabled, allows local users to obtain sensitive information from kernel memory or cause a denial of service (kernel panic and crash) via vectors related to crafted DWARF dat
|
13-02-2023 - 04:32 | 04-02-2014 - 23:55 | |
CVE-2011-1769 | 1.2 |
SystemTap 1.4 and earlier, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap scrip
|
13-02-2023 - 04:30 | 29-08-2011 - 21:55 | |
CVE-2010-4171 | 2.1 |
The staprun runtime tool in SystemTap 1.3 does not verify that a module to unload was previously loaded by SystemTap, which allows local users to cause a denial of service (unloading of arbitrary kernel modules).
|
13-02-2023 - 04:28 | 07-12-2010 - 22:00 | |
CVE-2010-0411 | 4.9 |
Multiple integer signedness errors in the (1) __get_argv and (2) __get_compat_argv functions in tapset/aux_syscalls.stp in SystemTap 1.1 allow local users to cause a denial of service (script crash, or system crash or hang) via a process with a large
|
13-02-2023 - 04:16 | 08-02-2010 - 20:30 | |
CVE-2009-0784 | 6.3 |
Race condition in the SystemTap stap tool 0.0.20080705 and 0.0.20090314 allows local users in the stapusr group to insert arbitrary SystemTap kernel modules and gain privileges via unknown vectors.
|
04-11-2020 - 15:43 | 25-03-2009 - 23:30 | |
CVE-2011-2503 | 3.7 |
The insert_module function in runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate a module when loading it, which allows local users to gain privileges via a race condition betwee
|
27-07-2012 - 12:04 | 26-07-2012 - 19:55 |