From owner-freebsd-security Mon Dec 4 11:44:35 2000 From owner-freebsd-security@FreeBSD.ORG Mon Dec 4 11:44:34 2000 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from smtp.nettoll.com (unknown [212.155.143.61]) by hub.freebsd.org (Postfix) with ESMTP id 627CF37B400 for ; Mon, 4 Dec 2000 11:44:33 -0800 (PST) Received: by smtp.nettoll.com; Mon, 4 Dec 2000 20:42:47 +0100 (MET) Message-Id: <4.3.0.20001204204204.04b31e90@pop.free.fr> X-Sender: usebsd@pop.free.fr X-Mailer: QUALCOMM Windows Eudora Version 4.3 Date: Mon, 04 Dec 2000 20:48:38 +0100 To: security@FreeBSD.ORG From: mouss Subject: ipfw/dummy: memory leak or what? Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Hi guys, while looking at the ip_input code, and more particularly at the dummy net stuff in the start, I saw the m = m->m_next; given that m is supposed to be freed wen delivered, I don't see when is the dummy net mbuf (the one containing the rule, and that is skipped by the ->m_next above) will be freed. Is this a memory leak opprotunity or am I missing something? regards, mouss To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message