theinfosecnews

CVE-2013-2094

CISA KEV

Published September 15, 2022 · Updated April 3, 2026

high
Official Description+

Linux kernel fails to check all 64 bits of attr.config passed by user space, resulting to out-of-bounds access of the perf_swevent_enabled array in sw_perf_event_destroy(). Explotation allows for privilege escalation.

Affected Products

VendorProduct
LinuxKernel

Patch Status

Patch by 2022-10-06

Recommended Actions

  1. Check if your systems use any of the affected products listed above.
  2. Apply vendor patches immediately if available.
  3. This vulnerability is in CISA's Known Exploited Vulnerabilities catalog — prioritize remediation.
  4. Monitor vendor advisories for updates and additional mitigations.
  5. Review logs for indicators of compromise related to CVE-2013-2094.