2.1
CVSSv2

CVE-2010-4171

Published: 07/12/2010 Updated: 13/02/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The staprun runtime tool in SystemTap 1.3 does not verify that a module to unload was previously loaded by SystemTap, which allows local users to cause a denial of service (unloading of arbitrary kernel modules).

Vulnerable Product Search on Vulmon Subscribe to Product

systemtap systemtap 1.3

Vendor Advisories

Debian Bug report logs - #603946 CVE-2010-4170 and CVE-2010-4171 Package: systemtap; Maintainer for systemtap is Ritesh Raj Sarraf <rrs@debianorg>; Source for systemtap is src:systemtap (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Thu, 18 Nov 2010 18:42:02 UTC Severity: grave Tags: s ...
Several vulnerabilities were discovered in SystemTap, an instrumentation system for Linux: CVE-2011-2503 It was discovered that a race condition in staprun could lead to privilege escalation CVE-2010-4170 It was discovered that insufficient validation of environment variables in staprun could lead to privilege escalation CVE-2010-41 ...