version 1.17, 2016/07/14 18:17:19 |
version 1.18, 2016/07/14 18:55:29 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li id="017_timeout"> |
<li id="017_arp"> |
<font color="#009000"><strong>017: RELIABILITY FIX: July 14, 2016</strong></font> |
<font color="#009000"><strong>017: RELIABILITY FIX: July 14, 2016</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Tick counting overflows could cause a kernel crash. |
A race occuring in the unlocked ARP input path can lead to a kernel |
|
NULL dereference. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/017_mmap.patch.sig"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/017_arp.patch.sig"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li id="018_kevent"> |
<li id="018_timeout"> |
<font color="#009000"><strong>018: RELIABILITY FIX: July 14, 2016</strong></font> |
<font color="#009000"><strong>018: RELIABILITY FIX: July 14, 2016</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Invalid file descriptor use with kevent(2) could lead to a kernel crash. |
Tick counting overflows could cause a kernel crash. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/018_mmap.patch.sig"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/018_timeout.patch.sig"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li id="019_amap"> |
<li id="019_kevent"> |
<font color="#009000"><strong>019: RELIABILITY FIX: July 14, 2016</strong></font> |
<font color="#009000"><strong>019: RELIABILITY FIX: July 14, 2016</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
|
Invalid file descriptor use with kevent(2) could lead to a kernel crash. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/019_kevent.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="020_amap"> |
|
<font color="#009000"><strong>020: RELIABILITY FIX: July 14, 2016</strong></font> |
|
<i>All architectures</i><br> |
Unchecked parameters and integer overflows in the amap allocation routines |
Unchecked parameters and integer overflows in the amap allocation routines |
could cause malloc(9) to either not allocate enough memory, leading to memory |
could cause malloc(9) to either not allocate enough memory, leading to memory |
corruption, or to trigger a "malloc: allocation too large" panic. |
corruption, or to trigger a "malloc: allocation too large" panic. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/019_amap.patch.sig"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/020_amap.patch.sig"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|