Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
pureGavin
Syzkaller
提交
1884f55a
S
Syzkaller
项目概览
pureGavin
/
Syzkaller
9 个月 前同步成功
通知
1
Star
0
Fork
0
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
DevOps
流水线
流水线任务
计划
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
S
Syzkaller
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
DevOps
DevOps
流水线
流水线任务
计划
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
流水线任务
提交
Issue看板
前往新版Gitcode,体验更适合开发者的 AI 搜索 >>
提交
1884f55a
编写于
1月 11, 2022
作者:
A
Anton Lindqvist
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
docs/openbsd: update found bugs
上级
a9d62f91
变更
1
隐藏空白更改
内联
并排
Showing
1 changed file
with
37 addition
and
3 deletion
+37
-3
docs/openbsd/found_bugs.md
docs/openbsd/found_bugs.md
+37
-3
未找到文件。
docs/openbsd/found_bugs.md
浏览文件 @
1884f55a
...
...
@@ -6,6 +6,38 @@ mailing list and are listed on the [dashboard](https://syzkaller.appspot.com/ope
Newer bugs comes first.
-
[
pppx(4): variable confusion
](
https://marc.info/?l=openbsd-cvs&m=164087429912026&w=2
)
-
[
wscons(4): double free
](
https://marc.info/?l=openbsd-cvs&m=164084727201849&w=2
)
-
[
pppx(4): concurrent access of partially initialized softc
](
https://marc.info/?l=openbsd-cvs&m=164082533927977&w=2
)
-
[
kcov(4): disallow file descriptor send/receive
](
https://marc.info/?l=openbsd-cvs&m=164076207103501&w=2
)
-
[
pf(4): NULL pointer dereference
](
https://marc.info/?l=openbsd-cvs&m=164052742928360&w=2
)
-
[
vnd(4): missing locking
](
https://marc.info/?l=openbsd-cvs&m=164025412309248&w=2
)
-
[
sysctl: state changed after sleeping
](
https://marc.info/?l=openbsd-cvs&m=164021158325071&w=2
)
-
[
mlock: double free
](
https://marc.info/?l=openbsd-cvs&m=164012526116825&w=2
)
-
[
shmat: propagate error instead of panicking on allocation failure
](
https://marc.info/?l=openbsd-cvs&m=164006713618898&w=2
)
-
[
vnd(4): state changed after sleeping
](
https://marc.info/?l=openbsd-cvs&m=164006704118875&w=2
)
-
[
dt(4): too strict assertion
](
https://marc.info/?l=openbsd-cvs&m=164003929408900&w=2
)
-
[
uvm(9): NULL pointer dereference
](
https://marc.info/?l=openbsd-cvs&m=163975066621151&w=2
)
-
[
pf(4): division by zero
](
https://marc.info/?l=openbsd-cvs&m=163962008918189&w=2
)
-
[
multicast(4): NULL pointer dereference
](
https://marc.info/?l=openbsd-cvs&m=163958385427172&w=2
)
-
[
inet6(4): NULL pointer dereference
](
https://marc.info/?l=openbsd-cvs&m=163940579227165&w=2
)
-
[
vmm(4): missing locking
](
https://marc.info/?l=openbsd-cvs&m=163886391905123&w=2
)
-
[
vnd(4): unintended nesting of devices
](
https://marc.info/?l=openbsd-cvs&m=163379079731494&w=2
)
-
[
route(4): NULL pointer dereference
](
https://marc.info/?l=openbsd-cvs&m=163103086932150&w=2
)
...
...
@@ -14,7 +46,9 @@ Newer bugs comes first.
-
[
vmm(4): missing locking
](
https://marc.info/?l=openbsd-cvs&m=163066962908920&w=2
)
-
[
vmm(4): lock ordering problem
](
https://marc.info/?l=openbsd-cvs&m=163050503012931&w=2
)
-
[
pf(4): use-after-free
](
https://marc.info/?l=openbsd-cvs&m=159828307919706&w=2
)
-
[
vmm(4): lock ordering problem
](
https://marc.info/?l=openbsd-cvs&m=163050503012931&w=2
)
-
[
kqueue: missing locking
](
https://marc.info/?l=openbsd-cvs&m=162338580619514&w=2
)
...
...
@@ -22,7 +56,7 @@ Newer bugs comes first.
-
[
tun(4): leaking device references
](
https://marc.info/?l=openbsd-cvs&m=161532031720186&w=2
)
-
[
pf(4): incorrect handling of overlapping fragments
](
https://marc.info/?l=openbsd-cvs&m=161399910228130&w=2
)
[
ERRATA-68-014
]
(https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/014_pffrag.patch.sig)
-
[
pf(4): incorrect handling of overlapping fragments
](
https://marc.info/?l=openbsd-cvs&m=161399910228130&w=2
)
[
ERRATA-68-014
]
(https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/014_pffrag.patch.sig)
-
[
if_addgroup(9): double free of interface groups
](
https://marc.info/?l=openbsd-cvs&m=161296812703484&w=2
)
...
...
@@ -110,7 +144,7 @@ Newer bugs comes first.
-
[
VOP_LOCK(9): threads not observing exclusive lock
](
https://marc.info/?l=openbsd-cvs&m=156684581030011&w=2
)
-
[
ip6(4): don't use the flow of the first fragment to store ECN data
](
https://marc.info/?l=openbsd-cvs&m=156684528429904&w=2
)
-
[
ip6(4): don't use the flow of the first fragment to store ECN data
](
https://marc.info/?l=openbsd-cvs&m=156684528429904&w=2
)
-
[
acct: `vn_close(9)` race
](
https://marc.info/?l=openbsd-cvs&m=156585417104888&w=2
)
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录