A description and resolution procedure for
shutdown(s, SHUT_RD) on TCP socket does not work as intended
can be found in
NetBSD
Security Advisory SA2002-017
A description and resolution procedure for
Insufficient length check in ESP authentication data
can be found in
NetBSD
Security Advisory SA2002-016
A description and resolution procedure for
(another) buffer overrun in libc/libresolv DNS resolver
can be found in
NetBSD
Security Advisory SA2002-015
A description and resolution procedure for
OpenSSH protocol version 2 challenge-response authentication
can be found in
NetBSD
Security Advisory SA2002-005
A description and resolution procedure for
Remote Buffer Overflow Vulnerability in BSD Line Printer Daemon
can be found in
NetBSD
Security Advisory SA2001-018
A description and resolution procedure for
sendmail(8) incorrect command line argument check
can be found in
NetBSD
Security Advisory SA2001-017
A description and resolution procedure for
Insufficient checking of lengths passed from userland to kernel
can be found in
NetBSD
Security Advisory SA2001-015
A description and resolution procedure for
an insufficient msg_controllen checking for sendmsg(2)
can be found in
NetBSD
Security Advisory SA2001-011
A description and resolution procedure for
a sshd(8) "cookies" file mishandling on X11 forwarding
can be found in
NetBSD
Security Advisory SA2001-010
A description and resolution procedure for
a race condition between sugid-exec and ptrace(2)
can be found in
NetBSD
Security Advisory SA2001-009
A description and resolution procedure for
a vulnerability that could lead to local root compromise on the
sh3 platform
can be found in
NetBSD
Security Advisory SA2001-008
A description and resolution procedure for
a problem where the IP Filter packet filtering software may
incorrectly pass packets
can be found in
NetBSD
Security Advisory SA2001-007
A description and resolution procedure for
a remote denial of service using bogus fragmented IPv4 packets
can be found in
NetBSD
Security Advisory SA2001-006
A description of NetBSD's vulnerability position with regard to
various implementations of the Secure Shell (SSH) daemon, either
integrated releases or via pkgsrc, can be found in
NetBSD Security Advisory SA2001-003.
This advisory also describes a requirement for all users to ensure
that the rnd(4) device is properly configured to prevent weak
random number generation by integrated SSH and OpenSSL on
NetBSD-1.5.
A description, patch and workaround for a vulnerability that could
lead to local root compromise on i386 systems with the USER_LDT
kernel option enabled can be found in
NetBSD Security Advisory SA2001-002
A description and resolution procedure for several security vulnerabilities in the BIND name server daemon can be found in
NetBSD Security Advisory SA2001-001
A description and resolution procedure for
ftpd STAT output non-conformance can deceive firewall devices
can be found in
NetBSD
Security Advisory SA2002-027
A description and resolution procedure for
named(8) multiple denial of service and remote execution of code
can be found in
NetBSD
Security Advisory SA2002-029