Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 285461 (CVE-2009-3234)

Summary: Kernel: perf_copy_attr() Local privilege escalation (CVE-2009-3234)
Product: Gentoo Security Reporter: Alex Legler (RETIRED) <a3li>
Component: KernelAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal CC: hardened-kernel+disabled, kernel
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=b3e62e35058fc744ac794611f4e79bcd1c5a4b83
Whiteboard: [linux <2.6.31.1] [gp <2.6.31-2]
Package list:
Runtime testing required: ---

Description Alex Legler (RETIRED) archtester gentoo-dev Security 2009-09-18 14:24:33 UTC
CVE-2009-3234 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3234):
  Buffer overflow in the perf_copy_attr function in
  kernel/perf_counter.c in the Linux kernel 2.6.31-rc1 allows local
  users to cause a denial of service (crash) via a "big size data" to
  the perf_counter_open system call.