=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata58.html,v retrieving revision 1.25 retrieving revision 1.26 diff -c -r1.25 -r1.26 *** www/errata58.html 2016/06/06 12:35:08 1.25 --- www/errata58.html 2016/07/14 18:17:19 1.26 *************** *** 273,278 **** --- 273,335 ---- A source code patch exists which remedies this problem.

+

  • + 018: RELIABILITY FIX: July 14, 2016 +   All architectures
    + Splicing sockets in a loop could cause a kernel spin. +
    + + A source code patch exists which remedies this problem. +

    + +

  • + 019: RELIABILITY FIX: July 14, 2016 +   All architectures
    + ufs_readdir failed to limit size of memory allocation, leading to panics. +
    + + A source code patch exists which remedies this problem. +

    + +

  • + 020: SECURITY FIX: July 14, 2016 +   All architectures
    + The mmap extension __MAP_NOFAULT could overcommit resources and crash + the system. +
    + + A source code patch exists which remedies this problem. +

    + +

  • + 021: RELIABILITY FIX: July 14, 2016 +   All architectures
    + Tick counting overflows could cause a kernel crash. +
    + + A source code patch exists which remedies this problem. +

    + +

  • + 022: RELIABILITY FIX: July 14, 2016 +   All architectures
    + Invalid file descriptor use with kevent(2) could lead to a kernel crash. +
    + + A source code patch exists which remedies this problem. +

    + +

  • + 023: RELIABILITY FIX: July 14, 2016 +   All architectures
    + Unchecked parameters and integer overflows in the amap allocation routines + could cause malloc(9) to either not allocate enough memory, leading to memory + corruption, or to trigger a "malloc: allocation too large" panic. +
    + + A source code patch exists which remedies this problem. +

    +