### [CVE-2013-2930](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2930) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The perf_trace_event_perm function in kernel/trace/trace_event_perf.c in the Linux kernel before 3.12.2 does not properly restrict access to the perf subsystem, which allows local users to enable function tracing via a crafted application. ### POC #### Reference - http://www.ubuntu.com/usn/USN-2076-1 - http://www.ubuntu.com/usn/USN-2076-1 #### Github No PoCs found on GitHub currently.