1
0
mirror of https://git.FreeBSD.org/ports.git synced 2025-01-30 10:38:37 +00:00

Fix whitespace in openssh -- multiple vulnerabilities entry, which I

originally missed.
This commit is contained in:
Simon L. B. Nielsen 2006-10-08 06:51:43 +00:00
parent d341388984
commit d093092a60
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=174895

View File

@ -608,13 +608,13 @@ Note: Please add new entries to the beginning of this file.
<topic>openssh -- multiple vulnerabilities</topic>
<affects>
<system>
<name>FreeBSD</name>
<range><ge>6.1</ge><lt>6.1_10</lt></range>
<range><ge>6.0</ge><lt>6.0_15</lt></range>
<range><ge>5.5</ge><lt>5.5_8</lt></range>
<range><ge>5.4</ge><lt>5.4_22</lt></range>
<range><ge>5.0</ge><lt>5.3_37</lt></range>
<range><lt>4.11_25</lt></range>
<name>FreeBSD</name>
<range><ge>6.1</ge><lt>6.1_10</lt></range>
<range><ge>6.0</ge><lt>6.0_15</lt></range>
<range><ge>5.5</ge><lt>5.5_8</lt></range>
<range><ge>5.4</ge><lt>5.4_22</lt></range>
<range><ge>5.0</ge><lt>5.3_37</lt></range>
<range><lt>4.11_25</lt></range>
</system>
<package>
<name>openssh</name>
@ -630,23 +630,23 @@ Note: Please add new entries to the beginning of this file.
<h1>Problem Description</h1>
<p>The CRC compensation attack detector in the sshd(8) daemon,
upon receipt of duplicate blocks, uses CPU time cubic in the
number of duplicate blocks received. [CVE-2006-4924]</p>
number of duplicate blocks received. [CVE-2006-4924]</p>
<p>A race condition exists in a signal handler used by the
sshd(8) daemon to handle the LoginGraceTime option, which
can potentially cause some cleanup routines to be executed
multiple times. [CVE-2006-5051]</p>
<h1>Impact</h1>
<p>An attacker sending specially crafted packets to sshd(8)
can cause a Denial of Service by using 100% of CPU time
until a connection timeout occurs. Since this attack can be
performed over multiple connections simultaneously, it is
possible to cause up to MaxStartups (10 by default) sshd
processes to use all the CPU time they can obtain.
[CVE-2006-4924]</p>
can cause a Denial of Service by using 100% of CPU time
until a connection timeout occurs. Since this attack can be
performed over multiple connections simultaneously, it is
possible to cause up to MaxStartups (10 by default) sshd
processes to use all the CPU time they can obtain.
[CVE-2006-4924]</p>
<p>The OpenSSH project believe that the race condition can
lead to a Denial of Service or potentially remote code
execution, but the FreeBSD Security Team has been unable to
verify the exact impact. [CVE-2006-5051]</p>
lead to a Denial of Service or potentially remote code
execution, but the FreeBSD Security Team has been unable to
verify the exact impact. [CVE-2006-5051]</p>
<h1>Workaround</h1>
<p>The attack against the CRC compensation attack detector can
be avoided by disabling SSH Protocol version 1 support in