[BACK]Return to errata59.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata59.html between version 1.17 and 1.18

version 1.17, 2016/07/14 18:17:19 version 1.18, 2016/07/14 18:55:29
Line 251 
Line 251 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="017_timeout">  <li id="017_arp">
 <font color="#009000"><strong>017: RELIABILITY FIX: July 14, 2016</strong></font>  <font color="#009000"><strong>017: RELIABILITY FIX: July 14, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Tick counting overflows could cause a kernel crash.  A race occuring in the unlocked ARP input path can lead to a kernel
   NULL dereference.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/017_mmap.patch.sig">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/017_arp.patch.sig">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="018_kevent">  <li id="018_timeout">
 <font color="#009000"><strong>018: RELIABILITY FIX: July 14, 2016</strong></font>  <font color="#009000"><strong>018: RELIABILITY FIX: July 14, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Invalid file descriptor use with kevent(2) could lead to a kernel crash.  Tick counting overflows could cause a kernel crash.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/018_mmap.patch.sig">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/018_timeout.patch.sig">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="019_amap">  <li id="019_kevent">
 <font color="#009000"><strong>019: RELIABILITY FIX: July 14, 2016</strong></font>  <font color="#009000"><strong>019: RELIABILITY FIX: July 14, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
   Invalid file descriptor use with kevent(2) could lead to a kernel crash.
   <br>
   <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/019_kevent.patch.sig">
   A source code patch exists which remedies this problem.</a>
   <p>
   
   <li id="020_amap">
   <font color="#009000"><strong>020: RELIABILITY FIX: July 14, 2016</strong></font>
   &nbsp; <i>All architectures</i><br>
 Unchecked parameters and integer overflows in the amap allocation routines  Unchecked parameters and integer overflows in the amap allocation routines
 could cause malloc(9) to either not allocate enough memory, leading to memory  could cause malloc(9) to either not allocate enough memory, leading to memory
 corruption, or to trigger a "malloc: allocation too large" panic.  corruption, or to trigger a "malloc: allocation too large" panic.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/019_amap.patch.sig">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/020_amap.patch.sig">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   

Legend:
Removed from v.1.17  
changed lines
  Added in v.1.18