summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2009-3234
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2009-11-12 22:21:16 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2009-11-12 22:21:16 +0000
commitcc477ec772747ddbca5689b96e01f2d2a8369874 (patch)
treed900fb1db139de30cb29c8c8b9b78243a2a92d0f /retired/CVE-2009-3234
parent827b49482152a993e92c7aed00ad40e9c57c89dc (diff)
retire issues
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1590 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2009-3234')
-rw-r--r--retired/CVE-2009-323420
1 files changed, 20 insertions, 0 deletions
diff --git a/retired/CVE-2009-3234 b/retired/CVE-2009-3234
new file mode 100644
index 00000000..28fc5ce6
--- /dev/null
+++ b/retired/CVE-2009-3234
@@ -0,0 +1,20 @@
+Candidate: CVE-2009-3234
+Description:
+ "If we pass a big size data over perf_counter_open() syscall, the kernel
+ will copy this data to a small buffer, it will cause kernel crash."
+References:
+ http://www.openwall.com/lists/oss-security/2009/09/16/1
+Ubuntu-Description:
+Notes:
+ kernel/perf_counter.c was introduced in commit 0793a61d (v2.6.31-rc1)
+ brad spengler has working exploit code for this one, so high-urgency
+Bugs:
+upstream: released (2.6.31.1) [986ddf533c1dd6852196182084aefe1ca9eda34e], pending (2.6.32-rc2) [b3e62e3]
+linux-2.6: released (2.6.31-1)
+2.6.18-etch-security: N/A "vulnerable code not present"
+2.6.24-etch-security: N/A "vulnerable code not present"
+2.6.26-lenny-security: N/A "vulnerable code not present"
+2.6.15-dapper-security:
+2.6.22-gutsy-security:
+2.6.24-hardy-security:
+2.6.27-intrepid-security:

© 2014-2024 Faster IT GmbH | imprint | privacy policy