The perf_trace_event_perm function in kernel/trace/trace_event_perf.c in
the Linux kernel before 3.12.2 does not properly restrict access to the
perf subsystem, which allows local users to enable function tracing via a
crafted application.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 12.10 | noarch | linux | < 3.5.0-45.68 | UNKNOWN |
ubuntu | 13.10 | noarch | linux | < 3.11.0-15.23 | UNKNOWN |
ubuntu | 12.10 | noarch | linux-armadaxp | < 3.5.0-1626.35 | UNKNOWN |
ubuntu | 12.04 | noarch | linux-lts-quantal | < 3.5.0-45.68~precise1 | UNKNOWN |
ubuntu | 12.04 | noarch | linux-lts-raring | < 3.8.0-36.52~precise1 | UNKNOWN |
ubuntu | 12.04 | noarch | linux-lts-saucy | < 3.11.0-15.23~precise1 | UNKNOWN |
ubuntu | 12.10 | noarch | linux-ti-omap4 | < 3.5.0-237.53 | UNKNOWN |
ubuntu | 13.04 | noarch | linux-ti-omap4 | < 3.5.0-237.53 | UNKNOWN |
ubuntu | 13.10 | noarch | linux-ti-omap4 | < 3.5.0-237.53 | UNKNOWN |
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=12ae030d54ef250706da5642fc7697cc60ad0df7
www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.2
github.com/torvalds/linux/commit/12ae030d54ef250706da5642fc7697cc60ad0df7
launchpad.net/bugs/cve/CVE-2013-2930
nvd.nist.gov/vuln/detail/CVE-2013-2930
security-tracker.debian.org/tracker/CVE-2013-2930
ubuntu.com/security/notices/USN-2068-1
ubuntu.com/security/notices/USN-2070-1
ubuntu.com/security/notices/USN-2071-1
ubuntu.com/security/notices/USN-2072-1
ubuntu.com/security/notices/USN-2074-1
ubuntu.com/security/notices/USN-2075-1
ubuntu.com/security/notices/USN-2076-1
ubuntu.com/security/notices/USN-2112-1
www.cve.org/CVERecord?id=CVE-2013-2930