Open Source BSD-Related CERT Announcements
Michael Lucas Note: This list does not include all of the various CERT announces related to Sendmail versions shipped with any BSD. For those, you need to be tracking a recent Sendmail version. The short answer to patching security holes is: upgrade to the latest stable or release version of your BSD. In addition to the CERT advisories, each BSD issues its own security advisories. These security advisories include issues for which no CERT advisory is released. You can find project-specific advisories at:
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/ http://www.netbsd.org/Security/advisory.html http://www.openbsd.org/security.html CERT Advisories CA-95:14.Telnetd_Environment_Vulnerability
CA-96.08.pcnfsd
ftp://ftp.FreeBSD.ORG/pub/FreeBSD/FreeBSD-current/ports/net/ \ pcnfsd/patches/patch -ad CA-96.12.suidperl_vul
ftp://freebsd.org/pub/CERT/patches/SA-96:12/ CA-96.14.rdist_vul
CA-97.04.talkd
CA-97.06.rlogin-term
CA-97.11.libXt
CA-97.13.xlock
CA-97.14.metamail
CA-97.16.ftpd
ftp://ftp.netbsd.org/pub/NetBSD/misc/security/19970123-ftpdOpenBSD: version 2.0 vulnerable, upgrade to 2.1 or better
CA-97.19.bsdlp
CA-97.23.rdist
CA-97.27.FTP_bounce
ftp.netbsd.org:/pub/NetBSD/NetBSD-current/src/libexec/ftp should work on a vulnerable NetBSD machine
CA-98.01.smurf
CA-98.05.bind_problems
CA-98.10.mime_buffer_overflows
CA-98.13.tcp-denial-of-service |
Michael Lucas is an independent networking, security, and FreeBSD consultant. He previously worked for Verio, AGIS, and Oakland University. He lives in Detroit, Michigan with his wife Liz, four gerbils, and assorted fish. He can be reached at mwlucas@exceptionet.com.