NetBSD 5.1 released, security fixes abound

NetBSD 5.1 represents a selected subset of fixes deemed critical for security or stability reasons, as well as new features and enhancements.

Security advisory fixes:

  • NetBSD-SA2009-004, NetBSD OpenPAM passwd(1) changing weakness.
  • NetBSD-SA2009-005, Plaintext Recovery Attack Against SSH.
  • NetBSD-SA2009-006, Buffer overflows in ntp.
  • NetBSD-SA2009-007, Buffer overflows in hack(6).
  • NetBSD-SA2009-008, OpenSSL ASN1 parsing denial of service and CMS signature verification weakness.
  • NetBSD-SA2009-009, OpenSSL DTLS Memory Exhaustion and DSA signature verification vulnerabilities.
  • NetBSD-SA2009-010, ISC dhclient subnet-mask flag stack overflow.
  • NetBSD-SA2009-011, ISC DHCP server Denial of Service vulnerability.
  • NetBSD-SA2009-012, SHA2 implementation potential buffer overflow.
  • NetBSD-SA2009-013, BIND named dynamic update Denial of Service vulnerability.
  • NetBSD-SA2010-002, OpenSSL TLS renegotiation man in the middle vulnerability.
  • NetBSD-SA2010-003, azalia(4)/hdaudio(4) negative mixer index panic.
  • NetBSD-SA2010-004, amd64 per-page No-execute (NX) bit disabled.
  • NetBSD-SA2010-005, NTP server Denial of Service vulnerability.
  • NetBSD-SA2010-006, Buffer length checking errors in CODA.
  • NetBSD-SA2010-007, Integer overflow in libbz2 decompression code.
  • NetBSD-SA2010-008, sftp(1)/ftp(1)/glob(3) related resource exhaustion.
  • NetBSD-SA2010-010, Buffer Length Handling Errors in netsmb.
  • NetBSD-SA2010-011, OpenSSL Double Free Arbitrary Code Execution.

Other security fixes:

  • openssl: Fix CVE-2009-4355 and CVE-2010-0740.
  • Fix crash in openssl: handshake_dgst[] may be used without being allocated, causing NULL pointer dereference.
  • Update BIND server and tools to 9.5.2-P2, fixing CVE-2009-0025, CVE-2009-4022, and CVE-2010-0097.
  • ntpd(8): Fix CVE-2009-3563.
  • expat: Fix SA36425 and CVE-2009-3560.
  • fts(3): Avoid possible integer overflow on really deep dirs, and subsequent collateral damage. Received from OpenBSD via US-CERT as VU #590371.
  • Fix a couple issues with POSIX message queues
  • arc4random(3): Keep arc4_i and arc4_j synchronised after a rekeying. This prevents accidentally ending up in a short ARC4 cycle.
  • freetype: Fix CVE-2009-0946.
  • ftpd(8): Fix a remote crash. PR 43023.
  • openldap: Fix CVE-2009-3767.
  • Fix an NX regression observed on amd64 kernels, where per-page execution right was disabled (therefore leading to the inability of the kernel to detect fraudulent use of memory mappings marked as not being executable).



Share this