Alistair Crooks | 4 Sep 09:31 2002
Picon

Summary of Changes to the NetBSD Packages Collection in August 2002

Summary of Changes to the NetBSD Packages Collection in August 2002
===================================================================

[For a full list of all the changes, please refer to the mail on
the current-users mailing list - agc]

By my calculations, at the end of August 2002, there were 3104
packages in the NetBSD Packages Collection, up from 3037 the previous
month.

During August, we branched pkgsrc for the upcoming NetBSD 1.6 release. 
This is a break with tradition - in the past we've tagged the tree. 
However, we have found that a tag is not flexible - in particular, if
there are any fixes for slower-building architectures, or security
fixes, we haven't been able to apply them to the tagged source, since
we can't move any tags once they have been applied (we don't want
different versions out there).  This time we've branched pkgsrc, to
give us more flexibility.  Eagle-eyed readers of the pkgsrc-changes
mailing list will already have seen a number of pullups to the
netbsd-1-6 branch.

We must also recognise the contribution of Matthias Scheler, who
allowed us to exit from the freeze, and branch pkgsrc for 1.6.  My
whole family thanks him from the bottom of our stomachs, erm, hearts,
for providing the chocolate.

Once we had branched pkgsrc for 1.6, Johnny Lam merged his buildlink2
branch onto the trunk.  This is a refinement of the older buildlink
functionality, which is much easier for people creating the pkgsrc
entries for the first time to use.  Another benefit is that buildlink2
(Continue reading)

Herb Peyerl | 12 Sep 22:37 2002
Picon

The NetBSD Foundation Board elections.

With the publishing of the final ballot of the Board Elections on
September 12th, a one-year long effort to establish a more democratic
structure in the NetBSD Project came to a successful end.  The
Nomination Committee's slate for the new Board has been accepted
by the Members of the NetBSD Project with an overwhelming majority.
Out of the 124 valid votes cast, 122 approved the Nomination
Committee's slate.

The members of the new NetBSD Board are:

        Chris G. Demetriou, 2 year term
        Luke Mewburn, 2 year term
        Alistair G. Crooks, 1 year term
        Scott Reynolds, 1 year term
        Christos Zoulas, 1 year term

Luke Mewburn | 14 Sep 04:45 2002
Picon

Announcing NetBSD 1.6

                   Announcing NetBSD 1.6
                   =====================

The NetBSD Project is pleased to announce that release 1.6 of the
NetBSD Operating System is now available.

NetBSD 1.6 continues our long tradition with major improvements in
file system and memory management performance, major security
enhancements, and support for many new platforms and peripherals.

The NetBSD 1.6 release contains complete binary releases for
thirty nine different system architectures.  Complete source and
binaries for are available for download at many sites around the
world. A list of download sites via FTP, AnonCVS, SUP, and other
methods may be found at:

	http://www.netbsd.org/mirrors/

For further information about NetBSD 1.6, supported architectures,
changes between NetBSD 1.5 and 1.6, and how to obtain NetBSD is
available in the full release announcement which may be found at:

	http://www.netbsd.org/Releases/formal-1.6/NetBSD-1.6.html

Acknowledgments
===============

The NetBSD Foundation would like to thank all those who have
contributed code, hardware, documentation, funds, colocation for
our servers, web pages and other documentation, release engineering,
(Continue reading)

NetBSD Security Officer | 17 Sep 03:31 2002
Picon

Multiple NetBSD Security Advisories Released/Updated


With the release of NetBSD 1.6, the NetBSD project is publishing a
batch of Security Advisories (some of which are updates), as follows:

*   2002-006    buffer overrun in libc/libresolv DNS resolver
 x  2002-007    Repeated TIOCSCTTY ioctl can corrupt session hold counts
*x  2002-009    Multiple vulnerabilities in OpenSSL code
*x  2002-010    symlink race in pppd
*x  2002-011	Sun RPC XDR decoder contains buffer overflow
 x  2002-012    buffer overrun in setlocale
 x  2002-013    Bug in NFS server code allows remote denial of service
 x  2002-014    fd_set overrun in mbone tools and pppd
 x  2002-017    shutdown(s, SHUT_RD) on TCP socket does not work as intended
 x+ 2002-018    Multiple security isses with kfd daemon

    (*) reissue   (x) affects 1.5.3   (+) affects 1.6

These advisories involve bugs in libc (affecting static binaries), as
well as the kernel.  A full system rebuild is recommended to
collectively address all of these issues, but please make sure to read
through all of the advisories in case specific issues affect your
system.

Because of the extensive rebuild required, the NetBSD 1.6 release was
delayed in order to include fixes for as many of these issues as
possible, so as to provide binary release users with an easy upgrade
path.

Readers will note that there are some gaps in the above numbering.
These pending advisories involve third parties, and are awaiting
(Continue reading)

NetBSD Security Officer | 17 Sep 04:02 2002
Picon

NetBSD Security Advisory 2002-009:


-----BEGIN PGP SIGNED MESSAGE-----

		 NetBSD Security Advisory 2002-009
		 =================================
		 (updated 2002/9/16)

Topic:		Multiple vulnerabilities in OpenSSL code

Version:	NetBSD-current:	 source prior to August 10, 2002
		NetBSD-1.6 beta: affected
		NetBSD-1.5.3:	 affected
		NetBSD-1.5.2:	 affected
		NetBSD-1.5.1:	 affected
		NetBSD-1.5:	 affected
		NetBSD-1.4.*:	 not applicable
		pkgsrc:		 prior to openssl-0.9.6f

Severity:	Potential for remote root exploit

Fixed:		NetBSD-current:		August 10, 2002
		NetBSD-1.6 branch:	August 11, 2002 (1.6 includes the fix)
		NetBSD-1.5 branch:	August 31, 2002
		pkgsrc:			openssl-0.9.6f (or later)

	NOTE: previous advisory had fixed dates prior to August 10.
	There were errors found in the vendor-supplied fix, therefore
	the fixed dates were modified.  Sorry for the confusion and
	thanks for the patience.

(Continue reading)

NetBSD Security Officer | 17 Sep 04:47 2002
Picon

NetBSD Security Advisory 2002-017: shutdown(s, SHUT_RD) on TCP socket does not work as intended


-----BEGIN PGP SIGNED MESSAGE-----

		 NetBSD Security Advisory 2002-017
		 =================================

Topic:		shutdown(s, SHUT_RD) on TCP socket does not work as intended

Version:	NetBSD-current:	 source prior to September 7, 2002
		NetBSD 1.6 beta: affected
		NetBSD-1.5.3:	 affected
		NetBSD-1.5.2:	 affected
		NetBSD-1.5.1:	 affected
		NetBSD-1.5:	 affected
		NetBSD-1.4.*:	 affected

Severity:	Unexpected kernel memory consumption

Fixed:		NetBSD-current:	    September 7, 2002
		NetBSD-1.6 branch:  September 7, 2002 (1.6 includes the fix)
		NetBSD-1.5 branch:  September 7, 2002
		NetBSD-1.4 branch:  not yet

Abstract
========

shutdown(s, SHUT_RD) is used to indicate that there should be no inbound
traffic expected on the socket.  There was mistake in TCP with respect to
the handling of shutdown'ed socket, leading to unexpected kernel resource
consumption and unexpected behavior.
(Continue reading)

NetBSD Security Officer | 17 Sep 04:56 2002
Picon

NetBSD Security Advisory 2002-018: Multiple security isses with kfd daemon


		 NetBSD Security Advisory 2002-018
		 =================================

Topic:		Multiple security isses with kfd daemon

Version:	NetBSD-current:	source prior to September 10, 2002
		NetBSD 1.6:	affected
		NetBSD-1.5.3:	affected
		NetBSD-1.5.2:	affected
		NetBSD-1.5.1:	affected
		NetBSD-1.5:	affected
		NetBSD-1.4.*:	not affected

Severity:	remote buffer overrun, possibly resulting in root exploit

Fixed:		NetBSD-current:		September 11, 2002
		NetBSD-1.6 branch:	not yet
		NetBSD-1.5 branch:	September 11, 2002

Abstract
========

Kf and kfd are used to forward Kerberos credentials in a stand-alone
fashion, and come from the Heimdal Kerberos implementation used by
NetBSD.  In Heimdal releases earlier than 0.5, these programs have
multiple security issues, including possible buffer overruns.

The kfd daemon has never been enabled by default in NetBSD; enabling
it would have required a port name to be added to /etc/services.
(Continue reading)

NetBSD Security Officer | 17 Sep 04:09 2002
Picon

NetBSD Security Advisory 2002-010: symlink race in pppd


-----BEGIN PGP SIGNED MESSAGE-----

		 NetBSD Security Advisory 2002-010
		 =================================

Topic:		symlink race in pppd

Version:	NetBSD-current:	 source prior to July 31, 2002
		NetBSD-1.6 beta: affected
		NetBSD-1.5.3:	 affected
		NetBSD-1.5.2:	 affected
		NetBSD-1.5.1:	 affected
		NetBSD-1.5:	 affected
		NetBSD-1.4.*:	 affected

Severity:       Local user may be able to modify permissions on any file

Fixed:		NetBSD-current:		July 31, 2002
		NetBSD-1.6 branch:	August 3, 2002
					(NetBSD 1.6 includes the fix)
		NetBSD-1.5 branch:	September 5, 2002
		NetBSD-1.4 branch:	not yet

Abstract
========

A race condition exists in the pppd program that may be exploited
in order to change the permissions of an arbitrary file.

(Continue reading)

NetBSD Security Officer | 17 Sep 03:49 2002
Picon

NetBSD Security Advisory 2002-006: buffer overrun in libc/libresolv DNS resolver


-----BEGIN PGP SIGNED MESSAGE-----

		 NetBSD Security Advisory 2002-006
		 =================================
		 (updated 2002/9/16)

Topic:		buffer overrun in libc/libresolv DNS resolver

Version:	NetBSD-current:	source prior to June 28, 2002
		NetBSD-1.6 beta:source prior to June 28, 2002
		NetBSD-1.5.3:   NOT affected
		NetBSD-1.5.2:	affected
		NetBSD-1.5.1:	affected
		NetBSD-1.5:	affected
		NetBSD-1.4.*:	affected
		All prior NetBSD releases.

		pkgsrc:		net/bind4, prior to bind-4.9.9 are affected
				net/bind8, prior to bind-8.3.3 are affected
				net/bind9, bind-9.2.1 includes vulnerable code
					(not compiled for normal use)
				emulators/compat14 prior to 1.4.3.2
				emulators/compat14-crypto prior to 1.4.3.2
				emulators/netbsd32_compat14 prior to 1.4.3.2
				emulators/compat15 prior to 1.5.3.1
					if ships with libc/libresolv shlib
				emulators/netbsd32_compat15 prior to 1.5.3.1
				emulators/* for other operating systems,
					if ships with libc/libresolv shlib
(Continue reading)

NetBSD Security Officer | 17 Sep 03:56 2002
Picon

NetBSD Security Advisory 2002-007: Repeated TIOCSCTTY ioctl can corrupt session hold counts


-----BEGIN PGP SIGNED MESSAGE-----

		 NetBSD Security Advisory 2002-007
		 =================================

Topic:		Repeated TIOCSCTTY ioctl can corrupt session hold counts

Version:	NetBSD-current:	source prior to July 21, 2002 
		NetBSD-1.6 beta: source prior to July 23, 2002
		NetBSD-1.5.*:	source prior to September 5, 2002
		NetBSD-1.5.3:	affected
		NetBSD-1.5.2:	affected
		NetBSD-1.5.1:	affected
		NetBSD-1.5:	affected
		NetBSD-1.4.*:	affected

Severity:	Local user can cause system panic

Fixed:		NetBSD-current:		July 21, 2002
		NetBSD-1.6 branch:	July 23, 2002 (1.6 includes the fix)
		NetBSD-1.5 branch:	September 5, 2002
		NetBSD-1.4 branch:	not yet

Abstract
========

A Session leader can use the TIOCSCTTY ioctl to set the session
controlling terminal. This ioctl can be called any number of times.
The call unconditionally raised the hold count of a kernel structure
(Continue reading)


Gmane