===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata58.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -c -r1.25 -r1.26
*** www/errata58.html 2016/06/06 12:35:08 1.25
--- www/errata58.html 2016/07/14 18:17:19 1.26
***************
*** 273,278 ****
--- 273,335 ----
A source code patch exists which remedies this problem.
+
+ 018: RELIABILITY FIX: July 14, 2016
+ All architectures
+ Splicing sockets in a loop could cause a kernel spin.
+
+
+ A source code patch exists which remedies this problem.
+
+
+
+ 019: RELIABILITY FIX: July 14, 2016
+ All architectures
+ ufs_readdir failed to limit size of memory allocation, leading to panics.
+
+
+ A source code patch exists which remedies this problem.
+
+
+
+ 020: SECURITY FIX: July 14, 2016
+ All architectures
+ The mmap extension __MAP_NOFAULT could overcommit resources and crash
+ the system.
+
+
+ A source code patch exists which remedies this problem.
+
+
+
+ 021: RELIABILITY FIX: July 14, 2016
+ All architectures
+ Tick counting overflows could cause a kernel crash.
+
+
+ A source code patch exists which remedies this problem.
+
+
+
+ 022: RELIABILITY FIX: July 14, 2016
+ All architectures
+ Invalid file descriptor use with kevent(2) could lead to a kernel crash.
+
+
+ A source code patch exists which remedies this problem.
+
+
+
+ 023: RELIABILITY FIX: July 14, 2016
+ All architectures
+ Unchecked parameters and integer overflows in the amap allocation routines
+ could cause malloc(9) to either not allocate enough memory, leading to memory
+ corruption, or to trigger a "malloc: allocation too large" panic.
+
+
+ A source code patch exists which remedies this problem.
+
+