CAN-2005-2617: local users can trigger a memory leak via a 32-bit application with crafted ELF headers
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hey all,
CAN-2005-2617 describes a local DOS on 64bit machines:
The syscall32_setup_pages function in syscall32.c for Linux kernel
2.6.12 and later, on the 64-bit x86 platform, does not check the return
value of the insert_vm_struct function, which allows local users to
trigger a memory leak via a 32-bit application with crafted ELF headers.
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9fb1759a3102c26cd8f64254a7c3e532782c2bb8
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=9fb1759a3102c26cd8f64254a7c3e532782c2bb8
Micah
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
iD8DBQFDD61v9n4qXRzy1ioRAvumAJ9k/0+/k9an4RrMyet7PtSovjM85gCdH/jq
R3nomBvjsb+HK4zCeZKHbu4=
=zlkD
-----END PGP SIGNATURE-----
Reply to: