A security issue has been reported in SystemTap, which can be exploited by malicious, local users to gain escalated privileges.
The security issue is caused due to a race condition while checking and loading certain kernel modules, which can be exploited by e.g. symlinking to valid kernel modules during the time of check and replacing it with a symlink to a malicious kernel module before it's loaded.
Successful exploitation allows to e.g. gain "stapdev" group or "root" privileges, but requires membership of the "stapusr" group and that the "/lib/modules/$VERSION/systemtap" directory exists.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org