NetBSD 5.0.1 released

NetBSD 5.0.1 is the first security/critical update of the NetBSD 5.0 release branch.

It represents a selected subset of fixes deemed critical in nature for security or stability reasons.

Security advisory fixes

  • NetBSD-SA2009-004, NetBSD OpenPAM passwd(1) changing weakness.
  • NetBSD-SA2009-005, Plaintext Recovery Attack Against SSH.
  • NetBSD-SA2009-006, Buffer overflows in ntp.
  • NetBSD-SA2009-007, Buffer overflows in hack(6).
  • NetBSD-SA2009-008, OpenSSL ASN1 parsing denial of service and CMS signature verification weakness.
  • NetBSD-SA2009-009, OpenSSL DTLS Memory Exhaustion and DSA signature verification vulnerabilities.
  • NetBSD-SA2009-010, ISC dhclient subnet-mask flag stack overflow.
  • NetBSD-SA2009-011, ISC DHCP server Denial of Service vulnerability.
  • NetBSD-SA2009-012, SHA2 implementation potential buffer overflow.
  • NetBSD-SA2009-013, BIND named dynamic update Denial of Service vulnerability.

Note: Advisories prior to NetBSD-SA2009-004 do not affect NetBSD 5.0.

Kernel

  • Fix random “filesystem full” messages on large FFS file systems.
  • Fix a regression in the 4.4BSD scheduler, improving interactive performance under load.
  • Remove a race where physio_done() may use memory already freed. Fixes PR kern/39536.
  • Fix a crash observed when trying to load a corrupted ELF kernel module.
  • Fix PR kern/41566, where writes on the controlling tty were not being awoken from blocks.
  • Various fixes for POSIX message queues.
  • Fix a possible deadlock in the VFS subsystem.
  • Fixes for POSIX advisory locks.
  • A number of other stability fixes.

Networking

  • Follow exactly the recommendation of draft-ietf-tcpm-tcpsecure-11.txt: Don’t check gainst the last ack received, but the expected sequence number. This makes RST handling independent of delayed ACK.
  • Fix a panic when trying to disable IPFilter before enabling it. Fixes PR kern/41364.

NetBSD 5.0.1 is available for download here.




Share this