CVE-2009-2911
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
22/10/2009
Last modified:
09/04/2025
Description
SystemTap 1.0, when the --unprivileged option is used, does not properly restrict certain data sizes, which allows local users to (1) cause a denial of service or gain privileges via a print operation with a large number of arguments that trigger a kernel stack overflow, (2) cause a denial of service via crafted DWARF expressions that trigger a kernel stack frame overflow, or (3) cause a denial of service (infinite loop) via vectors that trigger creation of large unwind tables, related to Common Information Entry (CIE) and Call Frame Instruction (CFI) records.
Impact
Base Score 2.0
1.90
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:systemtap:systemtap:1.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://gcc.gnu.org/bugzilla/show_bug.cgi?id=41633
- http://secunia.com/advisories/37167
- http://sources.redhat.com/bugzilla/show_bug.cgi?id=10750
- http://www.openwall.com/lists/oss-security/2009/10/21/1
- http://www.securityfocus.com/bid/36778
- http://www.vupen.com/english/advisories/2009/2989
- https://bugzilla.redhat.com/show_bug.cgi?id=529175
- https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00627.html
- https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00793.html
- http://gcc.gnu.org/bugzilla/show_bug.cgi?id=41633
- http://secunia.com/advisories/37167
- http://sources.redhat.com/bugzilla/show_bug.cgi?id=10750
- http://www.openwall.com/lists/oss-security/2009/10/21/1
- http://www.securityfocus.com/bid/36778
- http://www.vupen.com/english/advisories/2009/2989
- https://bugzilla.redhat.com/show_bug.cgi?id=529175
- https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00627.html
- https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00793.html



