NetBSD Security Advisories by Date
- NetBSD-SA2024-002 OpenSSH CVE-2024-6387 `regreSSHion'
 - NetBSD-SA2024-001 Inadequate validation of user-supplied hostname in utmp_update(8)
 - NetBSD-SA2023-007 multiple vulnerabilities in ftpd(8)
 - NetBSD-SA2023-006 KDC-spoofing in pam_krb5
 - NetBSD-SA2023-005 su(1) bypass via pam_ksu(8)
 - NetBSD-SA2023-004 procfs environ exposure
 - NetBSD-SA2023-003 Structure padding memory disclosures
 - NetBSD-SA2023-002 Various compatibility syscall memory access issues
 - NetBSD-SA2023-001 Multiple buffer overflows in USB drivers
 - NetBSD-SA2022-004 procfs(5) missing permission checks
 - NetBSD-SA2022-003 Race condition in mail.local(8)
 - NetBSD-SA2022-002 Coredump credential reference count leak
 - NetBSD-SA2022-001 PPPoE discovery phase memory corruption
 - NetBSD-SA2021-002 Incorrect permissions in kernfs
 - NetBSD-SA2021-001 Predictable ID disclosures in IPv4 and IPv6
 - NetBSD-SA2020-003 USB network interface jumbo packet memory corruption
 - NetBSD-SA2020-002 Specific ICMPv6 error message packet can crash the system
 - NetBSD-SA2020-001 Missing permissions checks for network ioctls
 - NetBSD-SA2019-006 Denial of service and possible privilege escallation in filemon
 - NetBSD-SA2019-005 Sysctl RNG Key Erasure
 - NetBSD-SA2019-004 IPv6 neighbor cache leak on expiration
 - NetBSD-SA2019-003 Unprivileged user kernel stack disclosure in SIOCGIFCONF
 - NetBSD-SA2019-002 Unprivileged kernel memory overwrite in mq_send(3)
 - NetBSD-SA2019-001 Several kernel memory disclosure bugs
 - NetBSD-SA2018-009 bozohttpd(8) can allow access to .htpasswd
 - NetBSD-SA2018-008 Several vulnerabilities in NPF
 - NetBSD-SA2018-007 Several vulnerabilities in IPSEC
 - NetBSD-SA2018-006 Several vulnerabilities in the network stack
 - NetBSD-SA2018-005 Privilege separation bug in Xen-amd64
 - NetBSD-SA2018-004 Remote Memory Corruption in IPv6
 - NetBSD-SA2018-003 Remote DoS in IPsec (IPv6)
 - NetBSD-SA2018-002 Local DoS in virecover
 - NetBSD-SA2018-001 Vulnerabilities in context handling
 - NetBSD-SA2017-006 Vnode reference leak in the openat system call
 - NetBSD-SA2017-005 X86: Vulnerabilities in context handling
 - NetBSD-SA2017-004 Buffer overflow via cmap for 4 graphics drivers
 - NetBSD-SA2017-003 Weak privilege separation in XEN
 - NetBSD-SA2017-002 Several vulnerabilities in ARP
 - NetBSD-SA2017-001 Memory leak in connect(2)
 - NetBSD-SA2016-006 Race condition in mail.local(8)
 - NetBSD-SA2016-005 Potential remote code execution in the bozohttpd CGI handlers
 - NetBSD-SA2016-004 Multiple vulnerabilities in the compatibility layers
 - NetBSD-SA2016-003 Privilege escalation in calendar(1)
 - NetBSD-SA2016-002 BDF file parsing issues in libXfont
 - NetBSD-SA2016-001 Multiple vulnerabilities in ntp daemon
 - NetBSD-SA2015-009 TCP LAST_ACK state memory exhaustion
 - NetBSD-SA2015-008 OpenSSL and TLS protocol vulnerabilities
 - NetBSD-SA2015-007 OpenSSL and SSLv3 vulnerabilities
 - NetBSD-SA2015-006 OpenSSL and SSLv3 vulnerabilities
 - NetBSD-SA2015-005 buffer overflow in libevent (CVE-2014-6272)
 - NetBSD-SA2015-004 Two vulnerabilities in the compatibility layers
 - NetBSD-SA2015-003 NTPd multiple vulnerabilities (CVE-2014-929[3-6])
 - NetBSD-SA2015-002 bind Denial of Service (CVE-2014-8500)
 - NetBSD-SA2015-001 Protocol handling issues in X Window System servers
 - NetBSD-SA2014-015 OpenSSL and SSLv3 vulnerabilities
 - NetBSD-SA2014-014 Multiple vulnerabilities in the mount system call
 - NetBSD-SA2014-013 ftp(1) can be made to execute arbitrary commands by a malicious webserver
 - NetBSD-SA2014-012 Memory leak in the setsockopt system call
 - NetBSD-SA2014-011 User-controlled memory allocation in the modctl system call
 - NetBSD-SA2014-010 Multiple vulnerabilities in the compatibility layers
 - NetBSD-SA2014-009 Multiple vulnerabilities in the execve system call
 - NetBSD-SA2014-008 Multiple OpenSSL vulnerabilities
 - NetBSD-SA2014-007 bozohttpd basic http authentication bypass
 - NetBSD-SA2014-006 Multiple OpenSSL vulnerabilities
 - NetBSD-SA2014-005 libXfont multiple vulnerabilities
 - NetBSD-SA2014-004 OpenSSL information disclosure ("heartbleed")
 - NetBSD-SA2014-003 posix_spawn unbounded kernel memory allocation
 - NetBSD-SA2014-002 ntpd used as DDoS amplifier
 - NetBSD-SA2014-001 Stack buffer overflow in libXfont
 - NetBSD-SA2013-013 Memory leak when trying to execute bogus ELF binaries
 - NetBSD-SA2013-012 Router Advertisement sysctl local Denial of Service
 - NetBSD-SA2013-011 embryonic TCP sockets local DoS
 - NetBSD-SA2013-010 Use after free in Xserver handling of ImageText requests
 - NetBSD-SA2013-009 user settable small BPF buffer can cause a panic
 - NetBSD-SA2013-008 Error in authorization check re tcpdrop sysctl
 - NetBSD-SA2013-007 Protocol handling issues in X Window System client libraries
 - NetBSD-SA2013-006 Arbitrary Kernel Read with netstat -P
 - NetBSD-SA2013-005 bind Denial of Service (CVE-2013-4854)
 - NetBSD-SA2013-004 Vulnerabilities in grep
 - NetBSD-SA2013-003 RNG Bug May Result in Weak Cryptographic Keys
 - NetBSD-SA2013-002 kqueue related kernel panic triggered from userland
 - NetBSD-SA2013-001 kernel panic triggered from userland
 - NetBSD-SA2012-004 BIND resolver DoS when using DNSSEC Validation
 - NetBSD-SA2012-003 Intel processors sysret to non-canonical address behaviour
 - NetBSD-SA2012-002 OpenSSL Invalid TLS/DTLS record attack
 - NetBSD-SA2012-001 OpenSSL buffer overflow in DER read function
 - NetBSD-SA2011-009 BIND resolver DoS
 - NetBSD-SA2011-008 OpenPAM privilege escalation
 - NetBSD-SA2011-007 LZW decoding loop on manipulated compressed files
 - NetBSD-SA2011-006 BIND DoS via packet with rrtype zero
 - NetBSD-SA2011-005 ISC dhclient does not strip shell meta-characters in
 - NetBSD-SA2011-004 Kernel stack overflow via nested IPCOMP packet
 - NetBSD-SA2011-003 Exhausting kernel memory from user controlled value
 - NetBSD-SA2011-002 OpenSSL TLS extension parsing race condition.
 - NetBSD-SA2011-001 BIND DoS due to improper handling of RRSIG records
 - NetBSD-SA2010-013 UDP6 Option Parsing local Denial of Service
 - NetBSD-SA2010-012 OpenSSL TLS extension parsing race condition.
 - NetBSD-SA2010-011 OpenSSL Double Free Arbitrary Code Execution
 - NetBSD-SA2010-010 Buffer Length Handling Errors in netsmb
 - NetBSD-SA2010-009 Privilege Handling Errors In larn
 - NetBSD-SA2010-008 sftp(1)/ftp(1)/glob(3) related resource exhaustion
 - NetBSD-SA2010-007 Integer overflow in libbz2 decompression code
 - NetBSD-SA2010-006 Buffer length checking errors in CODA
 - NetBSD-SA2010-005 NTP server Denial of Service vulnerability
 - NetBSD-SA2010-004 amd64 per-page No-execute (NX) bit disabled
 - NetBSD-SA2010-003 azalia(4)/hdaudio(4) negative mixer index panic
 - NetBSD-SA2010-002 OpenSSL TLS renegotiation man in the middle vulnerability
 - NetBSD-SA2010-001 File system module autoloading Denial of Service attack
 - NetBSD-SA2009-013 BIND named dynamic update Denial of Service vulnerability
 - NetBSD-SA2009-012 SHA2 implementation potential buffer overflow
 - NetBSD-SA2009-011 ISC DHCP server Denial of Service vulnerability
 - NetBSD-SA2009-010 ISC dhclient subnet-mask flag stack overflow
 - NetBSD-SA2009-009 OpenSSL DTLS Memory Exhaustion and DSA signature verification vulnerabilities
 - NetBSD-SA2009-008 OpenSSL ASN1 parsing denial of service and CMS signature verification weakness
 - NetBSD-SA2009-007 Buffer overflows in hack(6)
 - NetBSD-SA2009-006 Buffer overflows in ntp
 - NetBSD-SA2009-005 Plaintext Recovery Attack Against SSH
 - NetBSD-SA2009-004 NetBSD OpenPAM passwd(1) changing weakness
 - NetBSD-SA2009-003 proplib crashes on reading bad XML data
 - NetBSD-SA2009-002 tcpdump multiple denial of service and arbitrary code execution issues
 - NetBSD-SA2009-001 PF firewall remote Denial Of Service attack
 - NetBSD-SA2008-015 ICMPv6 Packet Too Big messages
 - NetBSD-SA2008-014 Cross-site request forgery in ftpd(8)
 - NetBSD-SA2008-013 IPv6 Neighbor Discovery Protocol
 - NetBSD-SA2008-012 Denial of service issues in racoon(8)
 - NetBSD-SA2008-011 ICMPv6 MLD query
 - NetBSD-SA2008-010 Malicious PPPoE discovery packet can overrun a kernel buffer
 - NetBSD-SA2008-009 BIND cache poisoning
 - NetBSD-SA2008-008 OpenSSL Montgomery multiplication
 - NetBSD-SA2008-007 OpenSSL Multiple issues
 - NetBSD-SA2008-006 Integer overflow in strfmon(3) function
 - NetBSD-SA2008-005 OpenSSH Multiple issues
 - NetBSD-SA2008-004 bzip2(1) Multiple issues
 - NetBSD-SA2008-003 IPsec in IPv6 Denial of Service
 - NetBSD-SA2008-002 Endianness issue in fast_ipsec(4)
 - NetBSD-SA2008-001 file(1) Integer overflow
 - NetBSD-SA2007-007 BIND cryptographically weak query IDs
 - NetBSD-SA2007-006 Local panics in display driver code
 - NetBSD-SA2007-005 IPv6 Type 0 Routing Header
 - NetBSD-SA2007-004 Insufficient length checking in iso(4)
 - NetBSD-SA2007-003 BIND multiple denial of service vulnerabilities
 - NetBSD-SA2007-002 Integer overflows in Render and DBE extensions
 - NetBSD-SA2007-001 Integer overflow in ktruser()
 - NetBSD-SA2006-027 libc glob(3) buffer overflow
 - NetBSD-SA2006-026 Multiple denial of service issues
 - NetBSD-SA2006-025 Multiple information/memory leakage issues
 - NetBSD-SA2006-024 systrace(4) integer overflow
 - NetBSD-SA2006-023 OpenSSL RSA Signature Forgery
 - NetBSD-SA2006-022 BIND recursive query and SIG query processing
 - NetBSD-SA2006-021 Integer overflows in CID-keyed font parser
 - NetBSD-SA2006-020 Integer overflows in PCF font parsers
 - NetBSD-SA2006-019 Malicious PPP options can overrun a kernel buffer
 - NetBSD-SA2006-018 sail(6), dm(8) and tetris(6) buffer overflows
 - NetBSD-SA2006-017 Sendmail malformed multipart MIME messages
 - NetBSD-SA2006-016 IPv6 socket options can crash the system
 - NetBSD-SA2006-015 FPU Information leak on i386/amd64/Xen platforms with AMD CPUs
 - NetBSD-SA2006-014 An audio subsystem race condition may crash the system
 - NetBSD-SA2006-013 sysctl(3) local denial of service
 - NetBSD-SA2006-012 SIOCGIFALIAS ioctl may cause system crash
 - NetBSD-SA2006-011 IPSec replay attack
 - NetBSD-SA2006-010 Sendmail race condition
 - NetBSD-SA2006-009 False detection of Intel hardware RNG
 - NetBSD-SA2006-008 Malformed ELF interpreter causes system crash
 - NetBSD-SA2006-007 mail(1) creates record file with insecure umask
 - NetBSD-SA2006-005 bridge memory disclosure
 - NetBSD-SA2006-004 Denial of services issues with pf
 - NetBSD-SA2006-003 Multiple denial of services issues with racoon
 - NetBSD-SA2006-002 settimeofday() time wrap
 - NetBSD-SA2006-001 Kernfs kernel memory disclosure
 - NetBSD-SA2005-013 ptrace() permissions after S[UG]ID and exec()
 - NetBSD-SA2005-012 SO_LINGER argument checking DIAGNOSTIC panic
 - NetBSD-SA2005-011 ntpd may start with different group id than desired
 - NetBSD-SA2005-010 OpenSSL "man in the middle" can force weak protocol
 - NetBSD-SA2005-009 Insecure /tmp file usage when building using imake
 - NetBSD-SA2005-008 Heap memory corruption in FreeBSD compat code
 - NetBSD-SA2005-007 AES-XCBC-MAC (IPsec AH) calculated using fixed key
 - NetBSD-SA2005-006 Multiple vulnerabilities in CVS
 - NetBSD-SA2005-005 cgd(4) key destruction on unconfigure
 - NetBSD-SA2005-004 Buffer overflows in MIT Kerberos 5
 - NetBSD-SA2005-003 F_CLOSEM local denial of service
 - NetBSD-SA2005-002 Local DoS via audio device with specific drivers
 - NetBSD-SA2005-001 Crypto leaks across HyperThreaded CPUs (i386, P4, HTT+SMP only)
 - NetBSD-SA2004-010 Insufficient argument validation in compat code
 - NetBSD-SA2004-009 ftpd root escalation
 - NetBSD-SA2004-008 CVS server vulnerability
 - NetBSD-SA2004-007 Systrace systrace_exit() local root
 - NetBSD-SA2004-006 TCP protocol and implementation vulnerability
 - NetBSD-SA2004-005 Denial of service vulnerabilities in OpenSSL
 - NetBSD-SA2004-004 shmat reference counting bug
 - NetBSD-SA2004-003 OpenSSL 0.9.6 ASN.1 parser vulnerability
 - NetBSD-SA2004-002 Inconsistent IPv6 path MTU discovery handling
 - NetBSD-SA2004-001 Insufficient packet validation in racoon IKE daemon
 - NetBSD-SA2003-018 DNS negative cache poisoning
 - NetBSD-SA2003-017 OpenSSL multiple vulnerability
 - NetBSD-SA2003-016 Sendmail - another prescan() bug CAN-2003-0694
 - NetBSD-SA2003-015 Remote and local vulnerabilities in XFree86 font libraries
 - NetBSD-SA2003-014 Insufficient argument checking in sysctl(2)
 - NetBSD-SA2003-013 Kernel memory disclosure via ibcs2
 - NetBSD-SA2003-012 Out of bounds memset(0) in sshd
 - NetBSD-SA2003-011 off-by-one error in realpath(3)
 - NetBSD-SA2003-010 remote panic in OSI networking code
 - NetBSD-SA2003-009 sendmail buffer overrun in prescan() address parser
 - NetBSD-SA2003-008 faulty length checks in xdrmem_getbytes
 - NetBSD-SA2003-007 (Another) Encryption weakness in OpenSSL code
 - NetBSD-SA2003-006 Cryptographic weaknesses in Kerberos v4 protocol
 - NetBSD-SA2003-005 RSA timing attack in OpenSSL code
 - NetBSD-SA2003-004 Format string vulnerability in zlib gzprintf()
 - NetBSD-SA2003-003 Buffer Overflow in file(1)
 - NetBSD-SA2003-002 Malformed header Sendmail Vulnerability
 - NetBSD-SA2003-001 Encryption weakness in OpenSSL code
 - NetBSD-SA2002-029 named(8) multiple denial of service and remote execution of code
 - NetBSD-SA2002-028 Buffer overrun in getnetbyname/getnetbyaddr
 - NetBSD-SA2002-027 ftpd STAT output non-conformance can deceive firewall devices
 - NetBSD-SA2002-026 buffer overrun in kadmind
 - NetBSD-SA2002-025 trek(6) buffer overrun
 - NetBSD-SA2002-024 IPFilter FTP proxy
 - NetBSD-SA2002-023 sendmail smrsh vulnerability
 - NetBSD-SA2002-022 buffer overrun in pic(1)
 - NetBSD-SA2002-021 rogue vulnerability
 - NetBSD-SA2002-019 Buffer overrun in talkd
 - NetBSD-SA2002-018 Multiple security isses with kfd daemon
 - NetBSD-SA2002-017 shutdown(s, SHUT_RD) on TCP socket does not work as intended
 - NetBSD-SA2002-016 Insufficient length check in ESP authentication data
 - NetBSD-SA2002-015 (another) buffer overrun in libc/libresolv DNS resolver
 - NetBSD-SA2002-014 fd_set overrun in mbone tools and pppd
 - NetBSD-SA2002-013 Bug in NFS server code allows remote denial of service
 - NetBSD-SA2002-012 buffer overrun in setlocale
 - NetBSD-SA2002-011 Sun RPC XDR decoder contains buffer overflow
 - NetBSD-SA2002-010 symlink race in pppd
 - NetBSD-SA2002-009 Multiple vulnerabilities in OpenSSL code
 - NetBSD-SA2002-007 Repeated TIOCSCTTY ioctl can corrupt session hold counts
 - NetBSD-SA2002-006 buffer overrun in libc DNS resolver
 - NetBSD-SA2002-005 OpenSSH protocol version 2 challenge-response authentication
 - NetBSD-SA2002-004 Off-by-one error in openssh session
 - NetBSD-SA2002-003 IPv4 forwarding doesn't consult inbound SPD
 - NetBSD-SA2002-002 gzip buffer overrun with long filename
 - NetBSD-SA2002-001 Close-on-exec, SUID and ptrace(2)
 - NetBSD-SA2001-018 Remote Buffer Overflow Vulnerability in BSD Line Printer Daemon
 - NetBSD-SA2001-017 sendmail(8) incorrect command line argument check.
 - NetBSD-SA2001-016 unsafe chdir usage in fts(3).
 - NetBSD-SA2001-015 Insufficient checking of lengths passed from userland to kernel.
 - NetBSD-SA2001-014 dump(8) exposes 'tty' group.
 - NetBSD-SA2001-013 OpenSSL PRNG weakness.
 - NetBSD-SA2001-012 telnetd(8) options overflow.
 - NetBSD-SA2001-011 Insufficient msg_controllen checking for sendmsg(2).
 - NetBSD-SA2001-010 sshd(8) "cookies" file mishandling on X11 forwarding.
 - NetBSD-SA2001-009 Race condition between sugid-exec and ptrace(2).
 - NetBSD-SA2001-008 Processes can gain "Supervisor" privileges on sh3.
 - NetBSD-SA2001-007 IP Filter may incorrectly pass packets.
 - NetBSD-SA2001-006 Denial of service using bogus fragmented IPv4 packets.
 - NetBSD-SA2001-005 Remote buffer overflow in ftpd.
 - NetBSD-SA2001-004 Buffer overflow in NTP daemon.
 - NetBSD-SA2001-003 Secure Shell (SSH) vulnerability and rnd(4) configuration.
 - NetBSD-SA2001-002 USER_LDT vulnerability on i386 systems only.
 - NetBSD-SA2001-001 Security vulnerabilies in BIND.
 - NetBSD-SA2000-018 Security vulnerability in ftpd.
 - NetBSD-SA2000-017 Security vulnerability in telnetd/libkrb.
 - NetBSD-SA2000-015 Security vulnerability in libutil.
 - NetBSD-SA2000-014 Security vulnerability in CGI interface of global packages.
 - NetBSD-SA2000-013 Security vulnerability in cfengine packages.
 - NetBSD-SA2000-012 Security vulnerability in NIS hostname lookup.
 - NetBSD-SA2000-011 Security vulnerability in netscape packages.
 - NetBSD-SA2000-010 Security vulnerability in wu-ftpd package.
 - NetBSD-SA2000-009 Security vulnerability in ftpd .
 - NetBSD-SA2000-008 Remote dhclient vulnerability.
 - NetBSD-SA2000-007 Bad key generation in libdes in NetBSD-current.
 - NetBSD-SA2000-006 ftpd error parsing /etc/ftpchroot.
 - NetBSD-SA2000-005 local cpu-hog denial of service.
 - NetBSD-SA2000-004 semcontrol(2) vulnerability.
 - NetBSD-SA2000-003 xlockmore package vulnerability.
 - NetBSD-SA2000-002 IP Options vulnerability.
 - NetBSD-SA2000-001 procfs vulnerability.
 - NetBSD-SA1999-012 VAX ptrace(2) vulnerability.
 - NetBSD-SA1999-011 profil(2) problems.
 - NetBSD-SA1999-010 ARP problems.
 - NetBSD-SA1999-009 i386 SVR4 compatibility problems.
 - NetBSD-SA1999-008 vfs locking problems.
 - NetBSD-SA1999-007 mount(2) problems.
 - NetBSD-SA1999-006 umapfs problems.
 - NetBSD-SA1999-005 lsof(1) package problems.
 - NetBSD-SA1999-004 traceroute(1) problems.
 - NetBSD-SA1999-003 wu-ftpd(8) package problems.
 - NetBSD-SA1999-002 netstat(1) problems.
 - NetBSD-SA1999-001 select(2)/accept(2) race condition in TCP servers.
 - NetBSD-SA1998-005 mmap(2) device driver vulnerabilties.
 - NetBSD-SA1998-004 at(1) vulnerabilties.
 - NetBSD-SA1998-003 mmap(2) and append-only files vulnerabilities.
 - NetBSD-SA1998-002 xterm and Xaw vulnerablilities.
 - NetBSD-SA1998-001 BIND 4.9.6 vulnerabilities.
 
