[BACK]Return to errata58.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata58.html between version 1.25 and 1.26

version 1.25, 2016/06/06 12:35:08 version 1.26, 2016/07/14 18:17:19
Line 273 
Line 273 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
   <li id="018_splice">
   <font color="#009000"><strong>018: RELIABILITY FIX: July 14, 2016</strong></font>
   &nbsp; <i>All architectures</i><br>
   Splicing sockets in a loop could cause a kernel spin.
   <br>
   <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/018_splice.patch.sig">
   A source code patch exists which remedies this problem.</a>
   <p>
   
   <li id="019_dirent">
   <font color="#009000"><strong>019: RELIABILITY FIX: July 14, 2016</strong></font>
   &nbsp; <i>All architectures</i><br>
   ufs_readdir failed to limit size of memory allocation, leading to panics.
   <br>
   <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/019_dirent.patch.sig">
   A source code patch exists which remedies this problem.</a>
   <p>
   
   <li id="020_mmap">
   <font color="#009000"><strong>020: SECURITY FIX: July 14, 2016</strong></font>
   &nbsp; <i>All architectures</i><br>
   The mmap extension __MAP_NOFAULT could overcommit resources and crash
   the system.
   <br>
   <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/020_mmap.patch.sig">
   A source code patch exists which remedies this problem.</a>
   <p>
   
   <li id="021_timeout">
   <font color="#009000"><strong>021: RELIABILITY FIX: July 14, 2016</strong></font>
   &nbsp; <i>All architectures</i><br>
   Tick counting overflows could cause a kernel crash.
   <br>
   <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/021_mmap.patch.sig">
   A source code patch exists which remedies this problem.</a>
   <p>
   
   <li id="022_kevent">
   <font color="#009000"><strong>022: RELIABILITY FIX: July 14, 2016</strong></font>
   &nbsp; <i>All architectures</i><br>
   Invalid file descriptor use with kevent(2) could lead to a kernel crash.
   <br>
   <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/022_mmap.patch.sig">
   A source code patch exists which remedies this problem.</a>
   <p>
   
   <li id="023_amap">
   <font color="#009000"><strong>023: RELIABILITY FIX: July 14, 2016</strong></font>
   &nbsp; <i>All architectures</i><br>
   Unchecked parameters and integer overflows in the amap allocation routines
   could cause malloc(9) to either not allocate enough memory, leading to memory
   corruption, or to trigger a "malloc: allocation too large" panic.
   <br>
   <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/023_amap.patch.sig">
   A source code patch exists which remedies this problem.</a>
   <p>
   
 </ul>  </ul>
   
 <hr>  <hr>

Legend:
Removed from v.1.25  
changed lines
  Added in v.1.26