Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 31 May 2000 12:36:47 -0400 (EDT)
From:      Bosko Milekic <bmilekic@dsuper.net>
To:        Mike Silbersack <silby@silby.com>
Cc:        FreeBSD-SECURITY <freebsd-security@FreeBSD.ORG>
Subject:   Re: Local FreeBSD, OpenBSD, NetBSD, DoS Vulnerability (fwd)
Message-ID:  <Pine.BSF.4.21.0005311233490.56932-100000@jehovah.technokratis.com>
In-Reply-To: <Pine.BSF.4.21.0005310118500.45571-100000@achilles.silby.com>

next in thread | previous in thread | raw e-mail | index | archive | help

On Wed, 31 May 2000, Mike Silbersack wrote:

> EVERYONE running a 3.4 box is welcome to test the patch. <g>
> 
> Mike "Silby" Silbersack

	I don't have a 3.4 machine up right now, but you should check to make
  sure that all callers to m_get and MGET actually check their return
  values, even if the call goes in with M_WAIT. I remember seeing some
  places in the code where callers with M_WAIT automatically assumed that
  they would be getting an mbuf, which probably has to do with the old
  behavior of mbufs being allocated with malloc(). I think green mentionned
  this to me, although I remember fixing a few of them with the initial 4.x
  patch.

--
 Bosko Milekic
 bmilekic@technokratis.com

 WWW: http://www.technokratis.com/
 Voice/Mobile: 514.865.7738 * Pager: 514.921.0237




To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0005311233490.56932-100000>