===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata58.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -r1.25 -r1.26
--- www/errata58.html 2016/06/06 12:35:08 1.25
+++ www/errata58.html 2016/07/14 18:17:19 1.26
@@ -273,6 +273,63 @@
A source code patch exists which remedies this problem.
+
+018: RELIABILITY FIX: July 14, 2016
+ All architectures
+Splicing sockets in a loop could cause a kernel spin.
+
+
+A source code patch exists which remedies this problem.
+
+
+
+019: RELIABILITY FIX: July 14, 2016
+ All architectures
+ufs_readdir failed to limit size of memory allocation, leading to panics.
+
+
+A source code patch exists which remedies this problem.
+
+
+
+020: SECURITY FIX: July 14, 2016
+ All architectures
+The mmap extension __MAP_NOFAULT could overcommit resources and crash
+the system.
+
+
+A source code patch exists which remedies this problem.
+
+
+
+021: RELIABILITY FIX: July 14, 2016
+ All architectures
+Tick counting overflows could cause a kernel crash.
+
+
+A source code patch exists which remedies this problem.
+
+
+
+022: RELIABILITY FIX: July 14, 2016
+ All architectures
+Invalid file descriptor use with kevent(2) could lead to a kernel crash.
+
+
+A source code patch exists which remedies this problem.
+
+
+
+023: RELIABILITY FIX: July 14, 2016
+ All architectures
+Unchecked parameters and integer overflows in the amap allocation routines
+could cause malloc(9) to either not allocate enough memory, leading to memory
+corruption, or to trigger a "malloc: allocation too large" panic.
+
+
+A source code patch exists which remedies this problem.
+
+