version 1.16, 2016/06/27 19:58:07 |
version 1.17, 2016/07/14 18:17:19 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
<li id="013_splice"> |
|
<font color="#009000"><strong>013: RELIABILITY FIX: July 14, 2016</strong></font> |
|
<i>All architectures</i><br> |
|
Splicing sockets in a loop could cause a kernel spin. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/013_splice.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="014_unp"> |
|
<font color="#009000"><strong>014: RELIABILITY FIX: July 14, 2016</strong></font> |
|
<i>All architectures</i><br> |
|
Multiple processes exiting with a fd-passing control message on a |
|
shared socket could crash the system. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/014_unp.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="015_dirent"> |
|
<font color="#009000"><strong>015: RELIABILITY FIX: July 14, 2016</strong></font> |
|
<i>All architectures</i><br> |
|
ufs_readdir failed to limit size of memory allocation, leading to panics. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/015_dirent.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="016_mmap"> |
|
<font color="#009000"><strong>016: SECURITY FIX: July 14, 2016</strong></font> |
|
<i>All architectures</i><br> |
|
The mmap extension __MAP_NOFAULT could overcommit resources and crash |
|
the system. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/016_mmap.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="017_timeout"> |
|
<font color="#009000"><strong>017: RELIABILITY FIX: July 14, 2016</strong></font> |
|
<i>All architectures</i><br> |
|
Tick counting overflows could cause a kernel crash. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/017_mmap.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="018_kevent"> |
|
<font color="#009000"><strong>018: RELIABILITY FIX: July 14, 2016</strong></font> |
|
<i>All architectures</i><br> |
|
Invalid file descriptor use with kevent(2) could lead to a kernel crash. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/018_mmap.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="019_amap"> |
|
<font color="#009000"><strong>019: RELIABILITY FIX: July 14, 2016</strong></font> |
|
<i>All architectures</i><br> |
|
Unchecked parameters and integer overflows in the amap allocation routines |
|
could cause malloc(9) to either not allocate enough memory, leading to memory |
|
corruption, or to trigger a "malloc: allocation too large" panic. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/019_amap.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
</ul> |
</ul> |
|
|
<hr> |
<hr> |