First published: Tue May 14 2013(Updated: )
A flaw was found in the way index into perf_swevent_enabled array was sanitized. A local unprivileged user can use this flaw to increase their privileges on the system. Introduced by: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b0a873ebbf87bf38bf70b5e39a7cadc96099fa13">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b0a873ebbf87bf38bf70b5e39a7cadc96099fa13</a> Upstream fix: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8176cced706b5e5d15887584150764894e94e02f">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8176cced706b5e5d15887584150764894e94e02f</a> References: <a href="http://lkml.indiana.edu/hypermail/linux/kernel/1304.1/03652.html">http://lkml.indiana.edu/hypermail/linux/kernel/1304.1/03652.html</a> <a href="https://news.ycombinator.com/item?id=5703758">https://news.ycombinator.com/item?id=5703758</a> <a href="http://packetstormsecurity.com/files/121616/semtex.c">http://packetstormsecurity.com/files/121616/semtex.c</a>
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 | |
Linux Kernel | <3.0.75 | |
Linux Kernel | >=3.1<3.2.45 | |
Linux Kernel | >=3.3<3.4.42 | |
Linux Kernel | >=3.5<3.8.9 | |
Linux Kernel | <=3.8.8 | |
Linux Kernel | =3.8.0 | |
Linux Kernel | =3.8.1 | |
Linux Kernel | =3.8.2 | |
Linux Kernel | =3.8.3 | |
Linux Kernel | =3.8.4 | |
Linux Kernel | =3.8.5 | |
Linux Kernel | =3.8.6 | |
Linux Kernel | =3.8.7 | |
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2094 has a moderate severity level as it allows local unprivileged users to potentially escalate their privileges.
To fix CVE-2013-2094, upgrade to a patched version of the Linux kernel listed in the vulnerability details.
CVE-2013-2094 affects multiple versions of the Linux kernel from versions prior to 3.9 and specific versions up to 6.12.10.
CVE-2013-2094 was discovered in the Linux kernel by the open-source community during routine audits.
There are no specific workarounds for CVE-2013-2094; updating the kernel is the recommended action.