version 1.25, 2016/06/06 12:35:08 |
version 1.26, 2016/07/14 18:17:19 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
<li id="018_splice"> |
|
<font color="#009000"><strong>018: RELIABILITY FIX: July 14, 2016</strong></font> |
|
<i>All architectures</i><br> |
|
Splicing sockets in a loop could cause a kernel spin. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/018_splice.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="019_dirent"> |
|
<font color="#009000"><strong>019: RELIABILITY FIX: July 14, 2016</strong></font> |
|
<i>All architectures</i><br> |
|
ufs_readdir failed to limit size of memory allocation, leading to panics. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/019_dirent.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="020_mmap"> |
|
<font color="#009000"><strong>020: SECURITY FIX: July 14, 2016</strong></font> |
|
<i>All architectures</i><br> |
|
The mmap extension __MAP_NOFAULT could overcommit resources and crash |
|
the system. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/020_mmap.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="021_timeout"> |
|
<font color="#009000"><strong>021: RELIABILITY FIX: July 14, 2016</strong></font> |
|
<i>All architectures</i><br> |
|
Tick counting overflows could cause a kernel crash. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/021_mmap.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="022_kevent"> |
|
<font color="#009000"><strong>022: RELIABILITY FIX: July 14, 2016</strong></font> |
|
<i>All architectures</i><br> |
|
Invalid file descriptor use with kevent(2) could lead to a kernel crash. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/022_mmap.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="023_amap"> |
|
<font color="#009000"><strong>023: RELIABILITY FIX: July 14, 2016</strong></font> |
|
<i>All architectures</i><br> |
|
Unchecked parameters and integer overflows in the amap allocation routines |
|
could cause malloc(9) to either not allocate enough memory, leading to memory |
|
corruption, or to trigger a "malloc: allocation too large" panic. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/023_amap.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
</ul> |
</ul> |
|
|
<hr> |
<hr> |