|
Message-ID: <Pine.GSO.4.51.0909162132180.7046@faron.mitre.org> Date: Wed, 16 Sep 2009 21:32:26 -0400 (EDT) From: "Steven M. Christey" <coley@...us.mitre.org> To: oss-security@...ts.openwall.com cc: "Steven M. Christey" <coley@...us.mitre.org> Subject: Re: CVE request: kernel: perf_counter: Fix buffer overflow in perf_copy_attr() ====================================================== Name: CVE-2009-3234 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3234 Reference: MLIST:[linux-kernel] 20090916 [patch 15/45] perf_counter: Fix buffer overflow in perf_copy_attr() Reference: URL:http://article.gmane.org/gmane.linux.kernel/890654 Reference: MLIST:[oss-security] 20090916 CVE request: kernel: perf_counter: Fix buffer overflow in perf_copy_attr() Reference: URL:http://www.openwall.com/lists/oss-security/2009/09/16/1 Reference: BID:36423 Reference: URL:http://www.securityfocus.com/bid/36423 Buffer overflow in the perf_copy_attr function in kernel/perf_counter.c in the Linux kernel 2.6.31-rc1 allows local users to cause a denial of service (crash) via a "big size data" to the perf_counter_open system call.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.