CVE-2013-2930
Published: 9 December 2013
The perf_trace_event_perm function in kernel/trace/trace_event_perf.c in the Linux kernel before 3.12.2 does not properly restrict access to the perf subsystem, which allows local users to enable function tracing via a crafted application.
From the Ubuntu security team
Dave Jones and Vince Weaver reported a flaw in the Linux kernel's per event subsystem that allows normal users to enable function tracing. An unprivileged local user could exploit this flaw to obtain potentially sensitive information from the kernel.
Priority
Status
Package | Release | Status |
---|---|---|
linux Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-armadaxp Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-aws Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-ec2 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-flo Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-fsl-imx51 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-gke Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-goldfish Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-grouper Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-hwe Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-hwe-edge Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-linaro-omap Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-linaro-shared Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-linaro-vexpress Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-lts-quantal Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-lts-raring Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-lts-saucy Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-lts-trusty Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-lts-utopic Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-lts-vivid Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-lts-wily Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-lts-xenial Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-maguro Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-mako Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-manta Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-mvl-dove Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-qcm-msm Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-raspi2 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-snapdragon Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
linux-ti-omap4 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.13~rc1)
|
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2930
- https://github.com/torvalds/linux/commit/12ae030d54ef250706da5642fc7697cc60ad0df7
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=12ae030d54ef250706da5642fc7697cc60ad0df7
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.2
- https://ubuntu.com/security/notices/USN-2068-1
- https://ubuntu.com/security/notices/USN-2070-1
- https://ubuntu.com/security/notices/USN-2071-1
- https://ubuntu.com/security/notices/USN-2072-1
- https://ubuntu.com/security/notices/USN-2074-1
- https://ubuntu.com/security/notices/USN-2075-1
- https://ubuntu.com/security/notices/USN-2076-1
- https://ubuntu.com/security/notices/USN-2112-1
- NVD
- Launchpad
- Debian