svn commit: r386026 - head/security/vuxml
Raphael Kubo da Costa
rakuco at FreeBSD.org
Sun May 10 20:24:27 UTC 2015
Author: rakuco
Date: Sun May 10 20:24:26 2015
New Revision: 386026
URL: https://svnweb.freebsd.org/changeset/ports/386026
Log:
Add entry for CVE-2015-3146 in security/libssh.
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Sun May 10 20:20:56 2015 (r386025)
+++ head/security/vuxml/vuln.xml Sun May 10 20:24:26 2015 (r386026)
@@ -57,6 +57,38 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="0b040e24-f751-11e4-b24d-5453ed2e2b49">
+ <topic>libssh -- null pointer dereference</topic>
+ <affects>
+ <package>
+ <name>libssh</name>
+ <range><lt>0.6.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Andreas Schneider reports:</p>
+ <blockquote cite="https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/">
+ <p>libssh versions 0.5.1 and above have a logical error in the
+ handling of a SSH_MSG_NEWKEYS and SSH_MSG_KEXDH_REPLY package. A
+ detected error did not set the session into the error state
+ correctly and further processed the packet which leads to a null
+ pointer dereference. This is the packet after the initial key
+ exchange and doesn’t require authentication.</p>
+ <p>This could be used for a Denial of Service (DoS) attack.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2015-3146</cvename>
+ <url>https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release</url>
+ </references>
+ <dates>
+ <discovery>2015-04-30</discovery>
+ <entry>2015-05-10</entry>
+ </dates>
+ </vuln>
+
<vuln vid="b13af778-f4fc-11e4-a95d-ac9e174be3af">
<topic>Vulnerablitiy in HWP document filter</topic>
<affects>
More information about the svn-ports-all
mailing list