NetBSD 1.5.3 Security Advisories
Below is the list of advisories applicable to the NetBSD 1.5.3 release:
- A description and resolution procedure for a ftpd root escalation can be found in NetBSD Security Advisory NetBSD-SA2004-009
- A description and resolution procedure for TCP protocol and implementation vulnerability can be found in NetBSD Security Advisory NetBSD-SA2004-006
- A description and resolution procedure for Denial of service vulnerabilities in OpenSSL can be found in NetBSD Security Advisory NetBSD-SA2004-005
- A description and resolution procedure for shmat reference counting bug can be found in NetBSD Security Advisory NetBSD-SA2004-004
- A description and resolution procedure for OpenSSL 0.9.6 ASN.1 parser vulnerability can be found in NetBSD Security Advisory NetBSD-SA2004-003
- A description and resolution procedure for DNS negative cache poisoning can be found in NetBSD Security Advisory NetBSD-SA2003-018
- A description and resolution procedure for OpenSSL multiple vulnerability can be found in NetBSD Security Advisory NetBSD-SA2003-017
- A description and resolution procedure for Sendmail - another prescan() bug CAN-2003-0694 can be found in NetBSD Security Advisory NetBSD-SA2003-016
- A description and resolution procedure for Remote and local vulnerabilities in XFree86 font libraries can be found in NetBSD Security Advisory NetBSD-SA2003-015
- A description and resolution procedure for Insufficient argument checking in sysctl(2) can be found in NetBSD Security Advisory NetBSD-SA2003-014
- A description and resolution procedure for Kernel memory disclosure via ibcs2 can be found in NetBSD Security Advisory NetBSD-SA2003-013
- A description and resolution procedure for Out of bounds memset(0) in sshd can be found in NetBSD Security Advisory NetBSD-SA2003-012
- A description and resolution procedure for off-by-one error in realpath(3) can be found in NetBSD Security Advisory NetBSD-SA2003-011
- A description and resolution procedure for remote panic in OSI networking code can be found in NetBSD Security Advisory NetBSD-SA2003-010
- A description and resolution procedure for sendmail buffer overrun in prescan() address parser can be found in NetBSD Security Advisory SA2003-009
- A description and resolution procedure for faulty length checks in xdrmem_getbytes can be found in NetBSD Security Advisory SA2003-008
- A description and resolution procedure for (Another) Encryption weakness in OpenSSL code can be found in NetBSD Security Advisory SA2003-007
- A description and resolution procedure for Cryptographic weaknesses in Kerberos v4 protocol can be found in NetBSD Security Advisory SA2003-006
- A description and resolution procedure for RSA timing attack in OpenSSL code can be found in NetBSD Security Advisory SA2003-005
- A description and resolution procedure for Format string vulnerability in zlib gzprintf() can be found in NetBSD Security Advisory SA2003-004
- A description and resolution procedure for Buffer Overflow in file(1) can be found in NetBSD Security Advisory SA2003-003
- A description and resolution procedure for Malformed header Sendmail vulnerability can be found in NetBSD Security Advisory SA2003-002
- A description and resolution procedure for Encryption weakness in OpenSSL code can be found in NetBSD Security Advisory SA2003-001
- A description and resolution procedure for named(8) multiple denial of service and remote execution of code can be found in NetBSD Security Advisory SA2002-029
- A description and resolution procedure for Buffer overrun in getnetbyname/getnetbyaddr can be found in NetBSD Security Advisory SA2002-028
- A description and resolution procedure for ftpd STAT output non-conformance can deceive firewall devices can be found in NetBSD Security Advisory SA2002-027
- A description and resolution procedure for buffer overrun in kadmind can be found in NetBSD Security Advisory SA2002-026
- A description and resolution procedure for trek(6) buffer overrun can be found in NetBSD Security Advisory SA2002-025
- A description and resolution procedure for IPFilter FTP proxy vulnerability can be found in NetBSD Security Advisory SA2002-024
- A description and resolution procedure for sendmail smrsh vulnerability can be found in NetBSD Security Advisory SA2002-023
- A description and resolution procedure for buffer overrun in pic(1) can be found in NetBSD Security Advisory SA2002-022
- A description, patch, and resolution procedure for rogue vulnerability can be found in NetBSD Security Advisory SA2002-021
- A description and resolution procedure for Buffer overrun in talkd can be found in NetBSD Security Advisory SA2002-019
- A description and resolution procedure for Multiple security isses with kfd daemon can be found in NetBSD Security Advisory SA2002-018
- A description and resolution procedure for shutdown(s, SHUT_RD) on TCP socket does not work as intended can be found in NetBSD Security Advisory SA2002-017
- A description and resolution procedure for Insufficient length check in ESP authentication data can be found in NetBSD Security Advisory SA2002-016
- A description and resolution procedure for (another) buffer overrun in libc/libresolv DNS resolver can be found in NetBSD Security Advisory SA2002-015
- A description and resolution procedure for fd_set overrun in mbone tools and pppd can be found in NetBSD Security Advisory SA2002-014
- A description and resolution procedure for Bug in NFS server code allows remote denial of service can be found in NetBSD Security Advisory SA2002-013
- A description and resolution procedure for buffer overrun in setlocale can be found in NetBSD Security Advisory SA2002-012
- A description and resolution procedure for Sun RPC XDR decoder contains buffer overflow can be found in NetBSD Security Advisory SA2002-011
- A description and resolution procedure for symlink race in pppd can be found in NetBSD Security Advisory SA2002-010
- A description and resolution procedure for Multiple vulnerabilities in OpenSSL code can be found in NetBSD Security Advisory SA2002-009
- A description, patch, and resolution procedure for Repeated TIOCSCTTY ioctl can corrupt session hold counts can be found in NetBSD Security Advisory SA2002-007