NetBSD 9.0 Security Advisories
Below is the list of advisories applicable to the NetBSD 9.0 release:
- NetBSD-SA2024-002 OpenSSH CVE-2024-6387 `regreSSHion'
- NetBSD-SA2024-001 Inadequate validation of user-supplied hostname in utmp_update(8)
- NetBSD-SA2023-007 multiple vulnerabilities in ftpd(8)
- NetBSD-SA2023-006 KDC-spoofing in pam_krb5
- NetBSD-SA2023-005 su(1) bypass via pam_ksu(8)
- NetBSD-SA2023-004 procfs environ exposure
- NetBSD-SA2023-003 Structure padding memory disclosures
- NetBSD-SA2023-002 Various compatibility syscall memory access issues
- NetBSD-SA2022-004 procfs(5) missing permission checks
- NetBSD-SA2022-003 Race condition in mail.local(8)
- NetBSD-SA2022-002 Coredump credential reference count leak
- NetBSD-SA2022-001 PPPoE discovery phase memory corruption
- NetBSD-SA2021-002 Incorrect permissions in kernfs
- NetBSD-SA2020-003 USB network interface jumbo packets