Date: Wed, 31 May 2000 12:36:47 -0400 (EDT) From: Bosko Milekic <bmilekic@dsuper.net> To: Mike Silbersack <silby@silby.com> Cc: FreeBSD-SECURITY <freebsd-security@FreeBSD.ORG> Subject: Re: Local FreeBSD, OpenBSD, NetBSD, DoS Vulnerability (fwd) Message-ID: <Pine.BSF.4.21.0005311233490.56932-100000@jehovah.technokratis.com> In-Reply-To: <Pine.BSF.4.21.0005310118500.45571-100000@achilles.silby.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 31 May 2000, Mike Silbersack wrote: > EVERYONE running a 3.4 box is welcome to test the patch. <g> > > Mike "Silby" Silbersack I don't have a 3.4 machine up right now, but you should check to make sure that all callers to m_get and MGET actually check their return values, even if the call goes in with M_WAIT. I remember seeing some places in the code where callers with M_WAIT automatically assumed that they would be getting an mbuf, which probably has to do with the old behavior of mbufs being allocated with malloc(). I think green mentionned this to me, although I remember fixing a few of them with the initial 4.x patch. -- Bosko Milekic bmilekic@technokratis.com WWW: http://www.technokratis.com/ Voice/Mobile: 514.865.7738 * Pager: 514.921.0237 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0005311233490.56932-100000>
