linux-stable/arch/x86_64
Siddha, Suresh B 691162d638 [PATCH] x86_64 memleak from malicious 32bit elf program
malicious 32bit app can have an elf section at 0xffffe000.  During
exec of this app, we will have a memory leak as insert_vm_struct() is
not checking for return value in syscall32_setup_pages() and thus not
freeing the vma allocated for the vsyscall page.

Check the return value and free the vma incase of failure.

Signed-off-by: Suresh Siddha <suresh.b.siddha@intel.com>
Signed-off-by: Chris Wright <chrisw@osdl.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
2005-08-05 00:04:16 -07:00
..
boot [PATCH] CodingStyle: trivial whitespace fixups 2005-05-05 16:36:49 -07:00
ia32 [PATCH] x86_64 memleak from malicious 32bit elf program 2005-08-05 00:04:16 -07:00
kernel [PATCH] revert x86_64-use-the-e820-hole-to-map-the-iommu-agp-aperture 2005-06-08 16:21:13 -07:00
lib [PATCH] x86_64: fix new out of line put_user() 2005-04-22 10:22:07 -07:00
mm [PATCH] x86_64: Fixed guard page handling again in iounmap 2005-05-20 15:48:20 -07:00
oprofile Linux-2.6.12-rc2 2005-04-16 15:20:36 -07:00
pci Linux-2.6.12-rc2 2005-04-16 15:20:36 -07:00
defconfig [PATCH] x86_64: Update defconfig 2005-05-17 07:59:17 -07:00
Kconfig [PATCH] x86_64 CONFIG_ACPI=n build fix 2005-05-31 14:54:17 -07:00
Kconfig.debug Linux-2.6.12-rc2 2005-04-16 15:20:36 -07:00
Makefile Linux-2.6.12-rc2 2005-04-16 15:20:36 -07:00