[BACK]Return to errata59.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata59.html between version 1.16 and 1.17

version 1.16, 2016/06/27 19:58:07 version 1.17, 2016/07/14 18:17:19
Line 213 
Line 213 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
   <li id="013_splice">
   <font color="#009000"><strong>013: RELIABILITY FIX: July 14, 2016</strong></font>
   &nbsp; <i>All architectures</i><br>
   Splicing sockets in a loop could cause a kernel spin.
   <br>
   <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/013_splice.patch.sig">
   A source code patch exists which remedies this problem.</a>
   <p>
   
   <li id="014_unp">
   <font color="#009000"><strong>014: RELIABILITY FIX: July 14, 2016</strong></font>
   &nbsp; <i>All architectures</i><br>
   Multiple processes exiting with a fd-passing control message on a
   shared socket could crash the system.
   <br>
   <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/014_unp.patch.sig">
   A source code patch exists which remedies this problem.</a>
   <p>
   
   <li id="015_dirent">
   <font color="#009000"><strong>015: RELIABILITY FIX: July 14, 2016</strong></font>
   &nbsp; <i>All architectures</i><br>
   ufs_readdir failed to limit size of memory allocation, leading to panics.
   <br>
   <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/015_dirent.patch.sig">
   A source code patch exists which remedies this problem.</a>
   <p>
   
   <li id="016_mmap">
   <font color="#009000"><strong>016: SECURITY FIX: July 14, 2016</strong></font>
   &nbsp; <i>All architectures</i><br>
   The mmap extension __MAP_NOFAULT could overcommit resources and crash
   the system.
   <br>
   <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/016_mmap.patch.sig">
   A source code patch exists which remedies this problem.</a>
   <p>
   
   <li id="017_timeout">
   <font color="#009000"><strong>017: RELIABILITY FIX: July 14, 2016</strong></font>
   &nbsp; <i>All architectures</i><br>
   Tick counting overflows could cause a kernel crash.
   <br>
   <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/017_mmap.patch.sig">
   A source code patch exists which remedies this problem.</a>
   <p>
   
   <li id="018_kevent">
   <font color="#009000"><strong>018: RELIABILITY FIX: July 14, 2016</strong></font>
   &nbsp; <i>All architectures</i><br>
   Invalid file descriptor use with kevent(2) could lead to a kernel crash.
   <br>
   <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/018_mmap.patch.sig">
   A source code patch exists which remedies this problem.</a>
   <p>
   
   <li id="019_amap">
   <font color="#009000"><strong>019: RELIABILITY FIX: July 14, 2016</strong></font>
   &nbsp; <i>All architectures</i><br>
   Unchecked parameters and integer overflows in the amap allocation routines
   could cause malloc(9) to either not allocate enough memory, leading to memory
   corruption, or to trigger a "malloc: allocation too large" panic.
   <br>
   <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/019_amap.patch.sig">
   A source code patch exists which remedies this problem.</a>
   <p>
   
 </ul>  </ul>
   
 <hr>  <hr>

Legend:
Removed from v.1.16  
changed lines
  Added in v.1.17