CVE Database


Impact: Important
Public: 2013-05-14
CWE: CWE-839->CWE-129->CWE-119
Bugzilla: 962792: CVE-2013-2094 kernel: perf_swevent_enabled array out-of-bound access


The MITRE CVE dictionary describes this issue as:

The perf_swevent_init function in kernel/events/core.c in the Linux kernel before 3.8.9 uses an incorrect integer data type, which allows local users to gain privileges via a crafted perf_event_open system call.

Find out more about CVE-2013-2094 from the MITRE CVE dictionary and NIST NVD.


This issue does not affect the kernel packages as shipped with Red Hat Enterprise Linux 5 because we did not backport upstream commit b0a873eb that introduced this issue.
This issue was addressed in Red Hat Enterprise Linux 6 via RHSA-2013:0830 (, Red Hat Enterprise Linux 6.1 Extended update support via RHSA-2013:0841 (, Red Hat Enterprise Linux 6.2 Extended update support via RHSA-2013:0840 (, Red Hat Enterprise Linux 6.3 Extended Update Support via RHSA-2013:0832 (, and Red Hat Enterprise MRG 2 via RHSA-2013:0829 (
Red Hat Enterprise Linux 6.0 was not affected by this flaw.
Refer to for further information.

CVSS v2 metrics

Base Score: 7.2
Base Metrics: AV:L/AC:L/Au:N/C:C/I:C/A:C
Access Vector: Local
Access Complexity: Low
Authentication: None
Confidentiality Impact: Complete
Integrity Impact: Complete
Availability Impact: Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
MRG Grid for RHEL 6 Server v.2 (kernel-rt) RHSA-2013:0829 May 20, 2013
Red Hat Enterprise Linux Server EUS (v. 6.1) (kernel) RHSA-2013:0841 May 20, 2013
Red Hat Enterprise Linux Server EUS (v. 6.2) (kernel) RHSA-2013:0840 May 20, 2013
Red Hat Enterprise Linux Server EUS (v. 6.3) (kernel) RHSA-2013:0832 May 17, 2013
Red Hat Enterprise Linux version 6 (kernel) RHSA-2013:0830 May 16, 2013

External References

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.