CVE-2009-0784

N/A Unknown
Published: March 25, 2009 Modified: April 23, 2026
View on NVD

Description

Race condition in the SystemTap stap tool 0.0.20080705 and 0.0.20090314 allows local users in the stapusr group to insert arbitrary SystemTap kernel modules and gain privileges via unknown vectors.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/34441
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/34479
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/34548
Source: secalert@redhat.com
Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2009-110.htm
Source: secalert@redhat.com
Third Party Advisory
http://www.debian.org/security/2009/dsa-1755
Source: secalert@redhat.com
Patch Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2009-0373.html
Source: secalert@redhat.com
Third Party Advisory
http://www.vupen.com/english/advisories/2009/0907
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/34441
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/34479
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/34548
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2009-110.htm
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2009/dsa-1755
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2009-0373.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.vupen.com/english/advisories/2009/0907
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11613
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

16 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.0%
12th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

debian systemtap