Puget Sound Technology Linux • Open Source • BSD  
TrainingSupport & Administration  
 

Binary Updates for NetBSD/i386 1.5.3

Note that usually the application or library version is not changed. Also be sure to restart daemons or running software as applicable.

  • binary-update.NetBSD-1.5.3-i386-openssl-20020803
     OpenSSL Security Advisory [30 July 2002]
     remotely exploitable buffer overruns in OpenSSL (includes ANS1 fix)
     http://www.openssl.org/news/secadv_20020730.txt
    
  • binary-update.NetBSD-1.5.3-i386-SA2002-010-pppd
     NetBSD Security Advisory 2002-010
     exploitable race condition in pppd
     ftp://ftp.NetBSD.ORG/pub/NetBSD/security/advisories/NetBSD-SA2002-010.txt.asc
    
  • binary-update.NetBSD-1.5.3-i386-SA2002-011-libc
     NetBSD Security Advisory 2002-011
     possible remote root exploit with RPC services (XDR decoder buffer overflow)
     http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20823
    
  • binary-update.NetBSD-1.5.3-i386-SA2002-012-setlocale
     NetBSD Security Advisory 2002-012
     buffer overrun in setlocale -- local root exploit via xterm
     ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-012.txt.asc
    
  • binary-update.NetBSD-1.5.3-i386-SA2002-014-mbone-pppd
     NetBSD Security Advisory 2002-014
     possible local root compromise -- fd_set overrun in mbone tools and pppd
     ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-014.txt.asc
    
  • binary-update.NetBSD-1.5.3-i386-kernel-20020905
     NetBSD Security Advisory 2002-017 and SA2002-013
     Unexpected memory consumption and behaviour, and remote denial of service (NFS)
     http://www.netbsd.org/Security/advisory.html
    
  • binary-update.NetBSD-1.5.3-i386-rogue-20021002
     Rogue games issue (28/Sep/2002)
     users can edit games scores and bypass quotas via rogue overflow
     http://online.securityfocus.com/archive/1/293582/2002-09-25/2002-10-01/0
    
  • binary-update.NetBSD-1.5.3-i386-smrsh-20021001
     Sendmail smrsh bypass vulnerabilities (01/Oct/2002)
     bypass smrsh restrictions and run other non-approved commands
     http://www.sendmail.org/smrsh.adv.txt
    
  • binary-update.NetBSD-1.5.3-i386-libkvm-20020917
     libkvm close-on-exec issue (2002-09-16)
     local users may be able to read kernel memory via libkvm applications
     ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:39.libkvm.asc
    

If you are using this old release, please consider upgrading to latest official release with security updates. If you need this 1-5 branch, let us know.

We provide technical services for upgrading systems.

 
Home | About | Services | Training | Hosting | Contact