The ftrace implementation in the Linux kernel before 3.8.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for write access to the (1) set_ftrace_pid or (2) set_graph_function file, and then making an lseek system call.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2013-3301 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue does not affect the version of the kernel package as shipped with
Red Hat Enterprise Linux 5.
This issue affects the versions of Linux kernel as shipped with
Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2. Future kernel updates
for Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2 may address this
issue.
Base Score | 4.4 |
---|---|
Base Metrics | AV:L/AC:M/Au:S/C:N/I:N/A:C |
Access Vector | Local |
Access Complexity | Medium |
Authentication | Single |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Complete |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 6 (kernel) | RHSA-2013:1051 | 2013-07-16 |
Red Hat MRG Grid for RHEL 6 Server v.2 (kernel-rt) | RHSA-2013:1264 | 2013-09-16 |
Red Hat Enterprise Linux OpenStack Platform 3.0 (kernel) | RHSA-2013:1080 | 2013-07-16 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 5 | kernel | Not affected |