Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 102803

Summary: Memory leak on 64 bit platforms (CAN-2005-2617)
Product: Gentoo Security Reporter: Sune Kloppenborg Jeppesen (RETIRED) <jaervosz>
Component: KernelAssignee: Gentoo Security <security>
Status: RESOLVED DUPLICATE    
Severity: normal    
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=9fb1759a3102c26cd8f64254a7c3e532782c2bb8
Whiteboard:
Package list:
Runtime testing required: ---

Description Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-08-17 02:56:22 UTC
The syscall32_setup_pages function in syscall32.c for Linux kernel 
2.6.x, on the 64-bit x86 platform, does not check the return value of 
the insert_vm_struct function, which allows local users to trigger a 
memory leak via a 32-bit application with crafted ELF headers.
Comment 1 Tim Yamin (RETIRED) gentoo-dev 2005-08-19 11:36:59 UTC

*** This bug has been marked as a duplicate of 102582 ***