Not processing entropy from a free'd mbuf in ethernet input has been
fixed in 6.x, but not yet 5.x.
This commit is contained in:
parent
2da32c24e5
commit
53d7016417
Notes:
svn2git
2020-12-08 03:00:23 +00:00
svn path=/www/; revision=22599
1 changed files with 3 additions and 2 deletions
|
@ -1,7 +1,7 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" [
|
||||
<!ENTITY base CDATA "../..">
|
||||
<!ENTITY email 'freebsd-qa'>
|
||||
<!ENTITY date "$FreeBSD: www/en/releases/5.3R/todo.sgml,v 1.95 2004/10/10 14:02:20 scottl Exp $">
|
||||
<!ENTITY date "$FreeBSD: www/en/releases/5.3R/todo.sgml,v 1.96 2004/10/12 14:11:59 rwatson Exp $">
|
||||
<!ENTITY title "FreeBSD 5.3 Open Issues">
|
||||
<!ENTITY % includes SYSTEM "../../includes.sgml"> %includes;
|
||||
<!ENTITY % developers SYSTEM "../../developers.sgml"> %developers;
|
||||
|
@ -49,7 +49,8 @@
|
|||
<td>ether_input() calls random_harvest() on the mbuf after it has been
|
||||
handed off to ether_demux(), at which point it may have been free()'d
|
||||
back to the mbuf allocator. It also passes in a pointer to the mbuf
|
||||
itself, rather than ethernet frame header.</td>
|
||||
itself, rather than ethernet frame header. Passing of a potentially
|
||||
free'd mbuf has been corrected in 6.x, but not yet merged to 5.x.</td>
|
||||
</tr>
|
||||
|
||||
</table>
|
||||
|
|
Loading…
Reference in a new issue