Binary Updates for NetBSD/i386 1.5.3
Note that usually the application or library version is not changed.
Also be sure to restart daemons or running software as applicable.
- binary-update.NetBSD-1.5.3-i386-openssl-20020803
OpenSSL Security Advisory [30 July 2002]
remotely exploitable buffer overruns in OpenSSL (includes ANS1 fix)
http://www.openssl.org/news/secadv_20020730.txt
- binary-update.NetBSD-1.5.3-i386-SA2002-010-pppd
NetBSD Security Advisory 2002-010
exploitable race condition in pppd
ftp://ftp.NetBSD.ORG/pub/NetBSD/security/advisories/NetBSD-SA2002-010.txt.asc
- binary-update.NetBSD-1.5.3-i386-SA2002-011-libc
NetBSD Security Advisory 2002-011
possible remote root exploit with RPC services (XDR decoder buffer overflow)
http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20823
- binary-update.NetBSD-1.5.3-i386-SA2002-012-setlocale
NetBSD Security Advisory 2002-012
buffer overrun in setlocale -- local root exploit via xterm
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-012.txt.asc
- binary-update.NetBSD-1.5.3-i386-SA2002-014-mbone-pppd
NetBSD Security Advisory 2002-014
possible local root compromise -- fd_set overrun in mbone tools and pppd
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-014.txt.asc
- binary-update.NetBSD-1.5.3-i386-kernel-20020905
NetBSD Security Advisory 2002-017 and SA2002-013
Unexpected memory consumption and behaviour, and remote denial of service (NFS)
http://www.netbsd.org/Security/advisory.html
- binary-update.NetBSD-1.5.3-i386-rogue-20021002
Rogue games issue (28/Sep/2002)
users can edit games scores and bypass quotas via rogue overflow
http://online.securityfocus.com/archive/1/293582/2002-09-25/2002-10-01/0
- binary-update.NetBSD-1.5.3-i386-smrsh-20021001
Sendmail smrsh bypass vulnerabilities (01/Oct/2002)
bypass smrsh restrictions and run other non-approved commands
http://www.sendmail.org/smrsh.adv.txt
- binary-update.NetBSD-1.5.3-i386-libkvm-20020917
libkvm close-on-exec issue (2002-09-16)
local users may be able to read kernel memory via libkvm applications
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:39.libkvm.asc
If you are using this old release, please consider upgrading to latest
official release with security updates.
If you need this 1-5 branch, let us know.
We provide technical services for upgrading systems.
|