mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-12-26 22:24:09 +08:00
9fb1759a31
A malicious 32bit app can have an elf section at 0xffffe000. During exec of this app, we will have a memory leak as insert_vm_struct() is not checking for return value in syscall32_setup_pages() and thus not freeing the vma allocated for the vsyscall page. Check the return value and free the vma incase of failure. Signed-off-by: Suresh Siddha <suresh.b.siddha@intel.com> Signed-off-by: Linus Torvalds <torvalds@osdl.org> |
||
---|---|---|
.. | ||
fpu32.c | ||
ia32_aout.c | ||
ia32_binfmt.c | ||
ia32_ioctl.c | ||
ia32_signal.c | ||
ia32entry.S | ||
ipc32.c | ||
Makefile | ||
ptrace32.c | ||
sys_ia32.c | ||
syscall32.c | ||
tls32.c | ||
vsyscall-sigreturn.S | ||
vsyscall-syscall.S | ||
vsyscall-sysenter.S | ||
vsyscall.lds |