aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorsimon <simon@FreeBSD.org>2006-10-08 14:51:43 +0800
committersimon <simon@FreeBSD.org>2006-10-08 14:51:43 +0800
commit057cf63b764974b095a8e087dc97dc0dab512fff (patch)
tree817ec60db86e14a158424374789a0e40be94d1cb /security
parent4f07e3aa87f3cc63e9bf1869f4afca45ee429c17 (diff)
downloadfreebsd-ports-gnome-057cf63b764974b095a8e087dc97dc0dab512fff.tar.gz
freebsd-ports-gnome-057cf63b764974b095a8e087dc97dc0dab512fff.tar.zst
freebsd-ports-gnome-057cf63b764974b095a8e087dc97dc0dab512fff.zip
Fix whitespace in openssh -- multiple vulnerabilities entry, which I
originally missed.
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml34
1 files changed, 17 insertions, 17 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index e2c76187f107..86f74e28d811 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -608,13 +608,13 @@ Note: Please add new entries to the beginning of this file.
<topic>openssh -- multiple vulnerabilities</topic>
<affects>
<system>
- <name>FreeBSD</name>
- <range><ge>6.1</ge><lt>6.1_10</lt></range>
- <range><ge>6.0</ge><lt>6.0_15</lt></range>
- <range><ge>5.5</ge><lt>5.5_8</lt></range>
- <range><ge>5.4</ge><lt>5.4_22</lt></range>
- <range><ge>5.0</ge><lt>5.3_37</lt></range>
- <range><lt>4.11_25</lt></range>
+ <name>FreeBSD</name>
+ <range><ge>6.1</ge><lt>6.1_10</lt></range>
+ <range><ge>6.0</ge><lt>6.0_15</lt></range>
+ <range><ge>5.5</ge><lt>5.5_8</lt></range>
+ <range><ge>5.4</ge><lt>5.4_22</lt></range>
+ <range><ge>5.0</ge><lt>5.3_37</lt></range>
+ <range><lt>4.11_25</lt></range>
</system>
<package>
<name>openssh</name>
@@ -630,23 +630,23 @@ Note: Please add new entries to the beginning of this file.
<h1>Problem Description</h1>
<p>The CRC compensation attack detector in the sshd(8) daemon,
upon receipt of duplicate blocks, uses CPU time cubic in the
- number of duplicate blocks received. [CVE-2006-4924]</p>
+ number of duplicate blocks received. [CVE-2006-4924]</p>
<p>A race condition exists in a signal handler used by the
sshd(8) daemon to handle the LoginGraceTime option, which
can potentially cause some cleanup routines to be executed
multiple times. [CVE-2006-5051]</p>
<h1>Impact</h1>
<p>An attacker sending specially crafted packets to sshd(8)
- can cause a Denial of Service by using 100% of CPU time
- until a connection timeout occurs. Since this attack can be
- performed over multiple connections simultaneously, it is
- possible to cause up to MaxStartups (10 by default) sshd
- processes to use all the CPU time they can obtain.
- [CVE-2006-4924]</p>
+ can cause a Denial of Service by using 100% of CPU time
+ until a connection timeout occurs. Since this attack can be
+ performed over multiple connections simultaneously, it is
+ possible to cause up to MaxStartups (10 by default) sshd
+ processes to use all the CPU time they can obtain.
+ [CVE-2006-4924]</p>
<p>The OpenSSH project believe that the race condition can
- lead to a Denial of Service or potentially remote code
- execution, but the FreeBSD Security Team has been unable to
- verify the exact impact. [CVE-2006-5051]</p>
+ lead to a Denial of Service or potentially remote code
+ execution, but the FreeBSD Security Team has been unable to
+ verify the exact impact. [CVE-2006-5051]</p>
<h1>Workaround</h1>
<p>The attack against the CRC compensation attack detector can
be avoided by disabling SSH Protocol version 1 support in