OpenBSD Journal

y Patch 004: pool (3 of 3)

Contributed by jose on from the memory-allocation dept.

The final patch of three released tonight concerns the pool(9) kernel memory allocator. In low memory situations, pool(9) could corrupt memory, leading to system instability. Patch 004 remedies this problem and fixes up memory handling in pool(9).

Many thanks go out to Miod and Peter for their coordination with us on these advisories. I would also like to take a moment and clearly state that we are trying to coordinate the release of patch information with the OpenBSD team more closely to ensure that all information and patches are available at the appropriate time. They have been very helpful and accomodating in this, and their help is greatly appreciated.

(Comments are closed)


Comments
  1. By Anonymous Coward () on

    Jesus H. Christ. WTF? Could Theo maybe take a little more interest in QC? I mean, I like the stickers I got and the song, but I would prefer have a better tested release. Is Theo trying to emulate Microsft's quality control? At this rate, he might win for most bugs...

  2. By Dom () on

    If these bugs were "known" at release time, and presumebly they were, they should have put up the errata page before sending out the CDs.

    Releasing software with bugs is fine, but releasing software with known bugs and then sitting on publishing fixes is not.

    It would have gone to OpenBSDs credit if patches were announced before the CDs were posted.

    This is not a good way to do things, and OpenBSD has taken a lot of critism in the past for doing the same thing ("oh yea, we found and fixed that ages ago, but didn't tell anyone til now")

  3. By Anonymous Coward () on

    It seams that OpenBSD isn't so secure as I thought.

  4. By Anonymous Coward () on

    "One remote hole in the default install, in nearly 6 years!" - that ISN'T TRUE!!!

    Look at http://online.securityfocus.com/bid/5991
    - remote Yes
    - OpenBSD 2.8
    - OpenBSD 2.9
    - OpenBSD 3.0
    - OpenBSD 3.1

    OpenBSD ships with apache, but if you want a secure web-server you have to compile apace for the source and update when a new version is out.

  5. By Pedro () on

    I'm very pleased with the coordination between the security team and this site. Coupled with the security announce mail list it certainly helps me to get the info i need. thanks

    Too bad some people on in these comment boards feel the need to whine about an OS which they've probably never even used and at the same time dont understand the goals of OpenBSD well enough to even make a normal critical analysis of the project.

Credits

Copyright © - Daniel Hartmeier. All rights reserved. Articles and comments are copyright their respective authors, submission implies license to publish on this web site. Contents of the archive prior to as well as images and HTML templates were copied from the fabulous original deadly.org with Jose's and Jim's kind permission. This journal runs as CGI with httpd(8) on OpenBSD, the source code is BSD licensed. undeadly \Un*dead"ly\, a. Not subject to death; immortal. [Obs.]