Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2007-4752 (GCVE-0-2007-4752)
Vulnerability from cvelistv5
Published
2007-09-12 01:00
Modified
2024-08-07 15:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:08:33.790Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openssh.com/txt/release-4.7" }, { "name": "GLSA-200711-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200711-02.xml" }, { "name": "oval:org.mitre.oval:def:10809", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10809" }, { "name": "DSA-1576", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1576" }, { "name": "25628", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25628" }, { "name": "20070917 FLEA-2007-0055-1 openssh openssh-client openssh-server gnome-ssh-askpass", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/479760/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm" }, { "name": "FEDORA-2007-715", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00214.html" }, { "name": "USN-566-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-566-1" }, { "name": "3126", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3126" }, { "name": "ADV-2008-0924", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0924/references" }, { "name": "ADV-2008-2821", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2821" }, { "name": "30249", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30249" }, { "name": "ADV-2007-3156", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3156" }, { "name": "SSRT071485", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085" }, { "name": "31575", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31575" }, { "name": "RHSA-2008:0855", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0855.html" }, { "name": "MDKSA-2007:236", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:236" }, { "name": "oval:org.mitre.oval:def:5599", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5599" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=280471" }, { "name": "29420", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29420" }, { "name": "APPLE-SA-2008-03-18", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" }, { "name": "20071115 Re: HPSBUX02287 SSRT071485 rev.1 - HP-UX Running HP Secure Shell, Remotely Gain Extended Privileges", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/483748/100/200/threaded" }, { "name": "HPSBUX02287", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085" }, { "name": "27399", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27399" }, { "name": "openssh-x11cookie-privilege-escalation(36637)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36637" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1706" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=307562" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=191321" }, { "name": "SUSE-SR:2007:022", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html" }, { "name": "32241", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32241" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-09-05T00:00:00", "descriptions": [ { "lang": "en", "value": "ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openssh.com/txt/release-4.7" }, { "name": "GLSA-200711-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200711-02.xml" }, { "name": "oval:org.mitre.oval:def:10809", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10809" }, { "name": "DSA-1576", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1576" }, { "name": "25628", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25628" }, { "name": "20070917 FLEA-2007-0055-1 openssh openssh-client openssh-server gnome-ssh-askpass", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/479760/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm" }, { "name": "FEDORA-2007-715", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00214.html" }, { "name": "USN-566-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-566-1" }, { "name": "3126", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3126" }, { "name": "ADV-2008-0924", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0924/references" }, { "name": "ADV-2008-2821", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2821" }, { "name": "30249", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30249" }, { "name": "ADV-2007-3156", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3156" }, { "name": "SSRT071485", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085" }, { "name": "31575", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31575" }, { "name": "RHSA-2008:0855", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0855.html" }, { "name": "MDKSA-2007:236", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:236" }, { "name": "oval:org.mitre.oval:def:5599", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5599" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=280471" }, { "name": "29420", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29420" }, { "name": "APPLE-SA-2008-03-18", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" }, { "name": "20071115 Re: HPSBUX02287 SSRT071485 rev.1 - HP-UX Running HP Secure Shell, Remotely Gain Extended Privileges", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/483748/100/200/threaded" }, { "name": "HPSBUX02287", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085" }, { "name": "27399", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27399" }, { "name": "openssh-x11cookie-privilege-escalation(36637)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36637" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1706" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=307562" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=191321" }, { "name": "SUSE-SR:2007:022", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html" }, { "name": "32241", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32241" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4752", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.openssh.com/txt/release-4.7", "refsource": "CONFIRM", "url": "http://www.openssh.com/txt/release-4.7" }, { "name": "GLSA-200711-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200711-02.xml" }, { "name": "oval:org.mitre.oval:def:10809", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10809" }, { "name": "DSA-1576", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1576" }, { "name": "25628", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25628" }, { "name": "20070917 FLEA-2007-0055-1 openssh openssh-client openssh-server gnome-ssh-askpass", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/479760/100/0/threaded" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm" }, { "name": "FEDORA-2007-715", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00214.html" }, { "name": "USN-566-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-566-1" }, { "name": "3126", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3126" }, { "name": "ADV-2008-0924", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0924/references" }, { "name": "ADV-2008-2821", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2821" }, { "name": "30249", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30249" }, { "name": "ADV-2007-3156", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3156" }, { "name": "SSRT071485", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085" }, { "name": "31575", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31575" }, { "name": "RHSA-2008:0855", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0855.html" }, { "name": "MDKSA-2007:236", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:236" }, { "name": "oval:org.mitre.oval:def:5599", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5599" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=280471", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=280471" }, { "name": "29420", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29420" }, { "name": "APPLE-SA-2008-03-18", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" }, { "name": "20071115 Re: HPSBUX02287 SSRT071485 rev.1 - HP-UX Running HP Secure Shell, Remotely Gain Extended Privileges", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/483748/100/200/threaded" }, { "name": "HPSBUX02287", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085" }, { "name": "27399", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27399" }, { "name": "openssh-x11cookie-privilege-escalation(36637)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36637" }, { "name": "https://issues.rpath.com/browse/RPL-1706", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-1706" }, { "name": "http://docs.info.apple.com/article.html?artnum=307562", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=307562" }, { "name": "http://bugs.gentoo.org/show_bug.cgi?id=191321", "refsource": "CONFIRM", "url": "http://bugs.gentoo.org/show_bug.cgi?id=191321" }, { "name": "SUSE-SR:2007:022", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html" }, { "name": "32241", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32241" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4752", "datePublished": "2007-09-12T01:00:00", "dateReserved": "2007-09-07T00:00:00", "dateUpdated": "2024-08-07T15:08:33.790Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2007-4752\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-09-12T01:17:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.\"},{\"lang\":\"es\",\"value\":\"ssh en OpenSSH anterior a 4.7 no maneja adecuadamente cuando una cookie no confiable no puede ser creada y utiliza una cookie X11 confiable en su lugar, lo cual permite a los atacantes violar pol\u00edticas establecidas y obtener privilegios provocando que un cliente X sea tratado como confiable.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":true,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.6\",\"matchCriteriaId\":\"A410C8F9-717C-4657-91DD-BAEAB53ECC16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E003AB3C-8DF3-4AE8-82A3-984F30E5599B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EBE75FE-DDE2-43BA-80EF-15A6698EABC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FF67D77-02AC-4807-984D-C5AE9799F051\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"683B26F0-5EA2-455A-8948-27C100BBA3AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5A75B23-2DD7-4EB2-BEAA-049FF4E51A14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7279E1EC-DEBC-4ACC-925D-06A7697C162F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7910598E-BEC1-4644-9DE4-D8BE505A4F9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB416D0C-6C86-450F-8917-D4B1BD82AB1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3640CCC9-EC4A-44A4-B747-7BAAAD3460C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2DD362E-9EA9-4E88-9A94-D7B471EB1FD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3094069-AC2E-43BD-8094-D48E2526DECC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B72CFB3-39C7-469C-AA59-69F5B8993BF7\"}]}]}],\"references\":[{\"url\":\"http://bugs.gentoo.org/show_bug.cgi?id=191321\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=307562\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/27399\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/29420\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/30249\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/31575\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/32241\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200711-02.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securityreason.com/securityalert/3126\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1576\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:236\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openssh.com/txt/release-4.7\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0855.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/479760/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/483748/100/200/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/25628\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/usn-566-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/3156\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0924/references\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2821\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=280471\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/36637\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1706\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10809\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5599\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00214.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugs.gentoo.org/show_bug.cgi?id=191321\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=307562\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/27399\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/29420\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30249\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/31575\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32241\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200711-02.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securityreason.com/securityalert/3126\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1576\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:236\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openssh.com/txt/release-4.7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0855.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/479760/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/483748/100/200/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/25628\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-566-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/3156\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0924/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2821\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=280471\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/36637\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1706\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10809\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5599\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00214.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"This issue did not affect the OpenSSH packages as distributed with Red Hat Enterprise Linux 2.1 or 3, as they do not support Trusted X11 forwarding.\\n\\nFor Red Hat Enterprise Linux 4 and 5, this issue was addressed via: https://rhn.redhat.com/errata/RHSA-2008-0855.html\\n\",\"lastModified\":\"2008-08-28T00:00:00\"}]}}" } }
opensuse-su-2024:11124-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
openssh-8.4p1-7.4 on GA media
Notes
Title of the patch
openssh-8.4p1-7.4 on GA media
Description of the patch
These are all security issues fixed in the openssh-8.4p1-7.4 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11124
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "openssh-8.4p1-7.4 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the openssh-8.4p1-7.4 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11124", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11124-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2006-0225 page", "url": "https://www.suse.com/security/cve/CVE-2006-0225/" }, { "category": "self", "summary": "SUSE CVE CVE-2007-4752 page", "url": "https://www.suse.com/security/cve/CVE-2007-4752/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-1483 page", "url": "https://www.suse.com/security/cve/CVE-2008-1483/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10009 page", "url": "https://www.suse.com/security/cve/CVE-2016-10009/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10010 page", "url": "https://www.suse.com/security/cve/CVE-2016-10010/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10011 page", "url": "https://www.suse.com/security/cve/CVE-2016-10011/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10012 page", "url": "https://www.suse.com/security/cve/CVE-2016-10012/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8858 page", "url": "https://www.suse.com/security/cve/CVE-2016-8858/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20685 page", "url": "https://www.suse.com/security/cve/CVE-2018-20685/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6109 page", "url": "https://www.suse.com/security/cve/CVE-2019-6109/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6110 page", "url": "https://www.suse.com/security/cve/CVE-2019-6110/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6111 page", "url": "https://www.suse.com/security/cve/CVE-2019-6111/" } ], "title": "openssh-8.4p1-7.4 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11124-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openssh-8.4p1-7.4.aarch64", "product": { "name": "openssh-8.4p1-7.4.aarch64", "product_id": "openssh-8.4p1-7.4.aarch64" } }, { "category": "product_version", "name": "openssh-cavs-8.4p1-7.4.aarch64", "product": { "name": "openssh-cavs-8.4p1-7.4.aarch64", "product_id": "openssh-cavs-8.4p1-7.4.aarch64" } }, { "category": "product_version", "name": "openssh-clients-8.4p1-7.4.aarch64", "product": { "name": "openssh-clients-8.4p1-7.4.aarch64", "product_id": "openssh-clients-8.4p1-7.4.aarch64" } }, { "category": "product_version", "name": "openssh-common-8.4p1-7.4.aarch64", "product": { "name": "openssh-common-8.4p1-7.4.aarch64", "product_id": "openssh-common-8.4p1-7.4.aarch64" } }, { "category": "product_version", "name": "openssh-fips-8.4p1-7.4.aarch64", "product": { "name": "openssh-fips-8.4p1-7.4.aarch64", "product_id": "openssh-fips-8.4p1-7.4.aarch64" } }, { "category": "product_version", "name": "openssh-helpers-8.4p1-7.4.aarch64", "product": { "name": "openssh-helpers-8.4p1-7.4.aarch64", "product_id": "openssh-helpers-8.4p1-7.4.aarch64" } }, { "category": "product_version", "name": "openssh-server-8.4p1-7.4.aarch64", "product": { "name": "openssh-server-8.4p1-7.4.aarch64", "product_id": "openssh-server-8.4p1-7.4.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "openssh-8.4p1-7.4.ppc64le", "product": { "name": "openssh-8.4p1-7.4.ppc64le", "product_id": "openssh-8.4p1-7.4.ppc64le" } }, { "category": "product_version", "name": "openssh-cavs-8.4p1-7.4.ppc64le", "product": { "name": "openssh-cavs-8.4p1-7.4.ppc64le", "product_id": "openssh-cavs-8.4p1-7.4.ppc64le" } }, { "category": "product_version", "name": "openssh-clients-8.4p1-7.4.ppc64le", "product": { "name": "openssh-clients-8.4p1-7.4.ppc64le", "product_id": "openssh-clients-8.4p1-7.4.ppc64le" } }, { "category": "product_version", "name": "openssh-common-8.4p1-7.4.ppc64le", "product": { "name": "openssh-common-8.4p1-7.4.ppc64le", "product_id": "openssh-common-8.4p1-7.4.ppc64le" } }, { "category": "product_version", "name": "openssh-fips-8.4p1-7.4.ppc64le", "product": { "name": "openssh-fips-8.4p1-7.4.ppc64le", "product_id": "openssh-fips-8.4p1-7.4.ppc64le" } }, { "category": "product_version", "name": "openssh-helpers-8.4p1-7.4.ppc64le", "product": { "name": "openssh-helpers-8.4p1-7.4.ppc64le", "product_id": "openssh-helpers-8.4p1-7.4.ppc64le" } }, { "category": "product_version", "name": "openssh-server-8.4p1-7.4.ppc64le", "product": { "name": "openssh-server-8.4p1-7.4.ppc64le", "product_id": "openssh-server-8.4p1-7.4.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssh-8.4p1-7.4.s390x", "product": { "name": "openssh-8.4p1-7.4.s390x", "product_id": "openssh-8.4p1-7.4.s390x" } }, { "category": "product_version", "name": "openssh-cavs-8.4p1-7.4.s390x", "product": { "name": "openssh-cavs-8.4p1-7.4.s390x", "product_id": "openssh-cavs-8.4p1-7.4.s390x" } }, { "category": "product_version", "name": "openssh-clients-8.4p1-7.4.s390x", "product": { "name": "openssh-clients-8.4p1-7.4.s390x", "product_id": "openssh-clients-8.4p1-7.4.s390x" } }, { "category": "product_version", "name": "openssh-common-8.4p1-7.4.s390x", "product": { "name": "openssh-common-8.4p1-7.4.s390x", "product_id": "openssh-common-8.4p1-7.4.s390x" } }, { "category": "product_version", "name": "openssh-fips-8.4p1-7.4.s390x", "product": { "name": "openssh-fips-8.4p1-7.4.s390x", "product_id": "openssh-fips-8.4p1-7.4.s390x" } }, { "category": "product_version", "name": "openssh-helpers-8.4p1-7.4.s390x", "product": { "name": "openssh-helpers-8.4p1-7.4.s390x", "product_id": "openssh-helpers-8.4p1-7.4.s390x" } }, { "category": "product_version", "name": "openssh-server-8.4p1-7.4.s390x", "product": { "name": "openssh-server-8.4p1-7.4.s390x", "product_id": "openssh-server-8.4p1-7.4.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-8.4p1-7.4.x86_64", "product": { "name": "openssh-8.4p1-7.4.x86_64", "product_id": "openssh-8.4p1-7.4.x86_64" } }, { "category": "product_version", "name": "openssh-cavs-8.4p1-7.4.x86_64", "product": { "name": "openssh-cavs-8.4p1-7.4.x86_64", "product_id": "openssh-cavs-8.4p1-7.4.x86_64" } }, { "category": "product_version", "name": "openssh-clients-8.4p1-7.4.x86_64", "product": { "name": "openssh-clients-8.4p1-7.4.x86_64", "product_id": "openssh-clients-8.4p1-7.4.x86_64" } }, { "category": "product_version", "name": "openssh-common-8.4p1-7.4.x86_64", "product": { "name": "openssh-common-8.4p1-7.4.x86_64", "product_id": "openssh-common-8.4p1-7.4.x86_64" } }, { "category": "product_version", "name": "openssh-fips-8.4p1-7.4.x86_64", "product": { "name": "openssh-fips-8.4p1-7.4.x86_64", "product_id": "openssh-fips-8.4p1-7.4.x86_64" } }, { "category": "product_version", "name": "openssh-helpers-8.4p1-7.4.x86_64", "product": { "name": "openssh-helpers-8.4p1-7.4.x86_64", "product_id": "openssh-helpers-8.4p1-7.4.x86_64" } }, { "category": "product_version", "name": "openssh-server-8.4p1-7.4.x86_64", "product": { "name": "openssh-server-8.4p1-7.4.x86_64", "product_id": "openssh-server-8.4p1-7.4.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-7.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64" }, "product_reference": "openssh-8.4p1-7.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-7.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le" }, "product_reference": "openssh-8.4p1-7.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-7.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x" }, "product_reference": "openssh-8.4p1-7.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-7.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64" }, "product_reference": "openssh-8.4p1-7.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-8.4p1-7.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64" }, "product_reference": "openssh-cavs-8.4p1-7.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-8.4p1-7.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le" }, "product_reference": "openssh-cavs-8.4p1-7.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-8.4p1-7.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x" }, "product_reference": "openssh-cavs-8.4p1-7.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-8.4p1-7.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64" }, "product_reference": "openssh-cavs-8.4p1-7.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-7.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64" }, "product_reference": "openssh-clients-8.4p1-7.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-7.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le" }, "product_reference": "openssh-clients-8.4p1-7.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-7.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x" }, "product_reference": "openssh-clients-8.4p1-7.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-7.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64" }, "product_reference": "openssh-clients-8.4p1-7.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-7.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64" }, "product_reference": "openssh-common-8.4p1-7.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-7.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le" }, "product_reference": "openssh-common-8.4p1-7.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-7.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x" }, "product_reference": "openssh-common-8.4p1-7.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-7.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64" }, "product_reference": "openssh-common-8.4p1-7.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-7.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64" }, "product_reference": "openssh-fips-8.4p1-7.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-7.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le" }, "product_reference": "openssh-fips-8.4p1-7.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-7.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x" }, "product_reference": "openssh-fips-8.4p1-7.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-7.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64" }, "product_reference": "openssh-fips-8.4p1-7.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-7.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64" }, "product_reference": "openssh-helpers-8.4p1-7.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-7.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le" }, "product_reference": "openssh-helpers-8.4p1-7.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-7.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x" }, "product_reference": "openssh-helpers-8.4p1-7.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-7.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64" }, "product_reference": "openssh-helpers-8.4p1-7.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-7.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64" }, "product_reference": "openssh-server-8.4p1-7.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-7.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le" }, "product_reference": "openssh-server-8.4p1-7.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-7.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x" }, "product_reference": "openssh-server-8.4p1-7.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-7.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" }, "product_reference": "openssh-server-8.4p1-7.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-0225", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2006-0225" } ], "notes": [ { "category": "general", "text": "scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2006-0225", "url": "https://www.suse.com/security/cve/CVE-2006-0225" }, { "category": "external", "summary": "SUSE Bug 143435 for CVE-2006-0225", "url": "https://bugzilla.suse.com/143435" }, { "category": "external", "summary": "SUSE Bug 206456 for CVE-2006-0225", "url": "https://bugzilla.suse.com/206456" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2006-0225" }, { "cve": "CVE-2007-4752", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-4752" } ], "notes": [ { "category": "general", "text": "ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-4752", "url": "https://www.suse.com/security/cve/CVE-2007-4752" }, { "category": "external", "summary": "SUSE Bug 308521 for CVE-2007-4752", "url": "https://bugzilla.suse.com/308521" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2007-4752" }, { "cve": "CVE-2008-1483", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-1483" } ], "notes": [ { "category": "general", "text": "OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-1483", "url": "https://www.suse.com/security/cve/CVE-2008-1483" }, { "category": "external", "summary": "SUSE Bug 1069509 for CVE-2008-1483", "url": "https://bugzilla.suse.com/1069509" }, { "category": "external", "summary": "SUSE Bug 373527 for CVE-2008-1483", "url": "https://bugzilla.suse.com/373527" }, { "category": "external", "summary": "SUSE Bug 585630 for CVE-2008-1483", "url": "https://bugzilla.suse.com/585630" }, { "category": "external", "summary": "SUSE Bug 647633 for CVE-2008-1483", "url": "https://bugzilla.suse.com/647633" }, { "category": "external", "summary": "SUSE Bug 706386 for CVE-2008-1483", "url": "https://bugzilla.suse.com/706386" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2008-1483" }, { "cve": "CVE-2016-10009", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10009" } ], "notes": [ { "category": "general", "text": "Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10009", "url": "https://www.suse.com/security/cve/CVE-2016-10009" }, { "category": "external", "summary": "SUSE Bug 1016336 for CVE-2016-10009", "url": "https://bugzilla.suse.com/1016336" }, { "category": "external", "summary": "SUSE Bug 1016366 for CVE-2016-10009", "url": "https://bugzilla.suse.com/1016366" }, { "category": "external", "summary": "SUSE Bug 1016370 for CVE-2016-10009", "url": "https://bugzilla.suse.com/1016370" }, { "category": "external", "summary": "SUSE Bug 1026634 for CVE-2016-10009", "url": "https://bugzilla.suse.com/1026634" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2016-10009", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 1213504 for CVE-2016-10009", "url": "https://bugzilla.suse.com/1213504" }, { "category": "external", "summary": "SUSE Bug 1217035 for CVE-2016-10009", "url": "https://bugzilla.suse.com/1217035" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-10009" }, { "cve": "CVE-2016-10010", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10010" } ], "notes": [ { "category": "general", "text": "sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10010", "url": "https://www.suse.com/security/cve/CVE-2016-10010" }, { "category": "external", "summary": "SUSE Bug 1016336 for CVE-2016-10010", "url": "https://bugzilla.suse.com/1016336" }, { "category": "external", "summary": "SUSE Bug 1016368 for CVE-2016-10010", "url": "https://bugzilla.suse.com/1016368" }, { "category": "external", "summary": "SUSE Bug 1021751 for CVE-2016-10010", "url": "https://bugzilla.suse.com/1021751" }, { "category": "external", "summary": "SUSE Bug 1196721 for CVE-2016-10010", "url": "https://bugzilla.suse.com/1196721" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-10010" }, { "cve": "CVE-2016-10011", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10011" } ], "notes": [ { "category": "general", "text": "authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10011", "url": "https://www.suse.com/security/cve/CVE-2016-10011" }, { "category": "external", "summary": "SUSE Bug 1016336 for CVE-2016-10011", "url": "https://bugzilla.suse.com/1016336" }, { "category": "external", "summary": "SUSE Bug 1016369 for CVE-2016-10011", "url": "https://bugzilla.suse.com/1016369" }, { "category": "external", "summary": "SUSE Bug 1016370 for CVE-2016-10011", "url": "https://bugzilla.suse.com/1016370" }, { "category": "external", "summary": "SUSE Bug 1017870 for CVE-2016-10011", "url": "https://bugzilla.suse.com/1017870" }, { "category": "external", "summary": "SUSE Bug 1026634 for CVE-2016-10011", "url": "https://bugzilla.suse.com/1026634" }, { "category": "external", "summary": "SUSE Bug 1029445 for CVE-2016-10011", "url": "https://bugzilla.suse.com/1029445" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-10011" }, { "cve": "CVE-2016-10012", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10012" } ], "notes": [ { "category": "general", "text": "The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10012", "url": "https://www.suse.com/security/cve/CVE-2016-10012" }, { "category": "external", "summary": "SUSE Bug 1006166 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1006166" }, { "category": "external", "summary": "SUSE Bug 1016336 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1016336" }, { "category": "external", "summary": "SUSE Bug 1016369 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1016369" }, { "category": "external", "summary": "SUSE Bug 1016370 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1016370" }, { "category": "external", "summary": "SUSE Bug 1017870 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1017870" }, { "category": "external", "summary": "SUSE Bug 1026634 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1026634" }, { "category": "external", "summary": "SUSE Bug 1035742 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1035742" }, { "category": "external", "summary": "SUSE Bug 1073044 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1073044" }, { "category": "external", "summary": "SUSE Bug 1092582 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1092582" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1138392" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-10012" }, { "cve": "CVE-2016-8858", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8858" } ], "notes": [ { "category": "general", "text": "The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that \"OpenSSH upstream does not consider this as a security issue.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8858", "url": "https://www.suse.com/security/cve/CVE-2016-8858" }, { "category": "external", "summary": "SUSE Bug 1005480 for CVE-2016-8858", "url": "https://bugzilla.suse.com/1005480" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-8858" }, { "cve": "CVE-2018-20685", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20685" } ], "notes": [ { "category": "general", "text": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20685", "url": "https://www.suse.com/security/cve/CVE-2018-20685" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1123220 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1123220" }, { "category": "external", "summary": "SUSE Bug 1131109 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1131109" }, { "category": "external", "summary": "SUSE Bug 1134932 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1134932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-20685" }, { "cve": "CVE-2019-6109", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6109" } ], "notes": [ { "category": "general", "text": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6109", "url": "https://www.suse.com/security/cve/CVE-2019-6109" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121821" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 1144902 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1144902" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1148884 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1148884" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-6109" }, { "cve": "CVE-2019-6110", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6110" } ], "notes": [ { "category": "general", "text": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6110", "url": "https://www.suse.com/security/cve/CVE-2019-6110" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-6110" }, { "cve": "CVE-2019-6111", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6111" } ], "notes": [ { "category": "general", "text": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6111", "url": "https://www.suse.com/security/cve/CVE-2019-6111" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121821" }, { "category": "external", "summary": "SUSE Bug 1123028 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1123028" }, { "category": "external", "summary": "SUSE Bug 1123220 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1123220" }, { "category": "external", "summary": "SUSE Bug 1131109 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1131109" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 1144902 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1144902" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1148884 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1148884" }, { "category": "external", "summary": "SUSE Bug 1201840 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1201840" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-6111" } ] }
gsd-2007-4752
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2007-4752", "description": "ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.", "id": "GSD-2007-4752", "references": [ "https://www.suse.com/security/cve/CVE-2007-4752.html", "https://access.redhat.com/errata/RHSA-2008:0855", "https://linux.oracle.com/cve/CVE-2007-4752.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2007-4752" ], "details": "ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.", "id": "GSD-2007-4752", "modified": "2023-12-13T01:21:36.178839Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4752", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.openssh.com/txt/release-4.7", "refsource": "CONFIRM", "url": "http://www.openssh.com/txt/release-4.7" }, { "name": "GLSA-200711-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200711-02.xml" }, { "name": "oval:org.mitre.oval:def:10809", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10809" }, { "name": "DSA-1576", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1576" }, { "name": "25628", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25628" }, { "name": "20070917 FLEA-2007-0055-1 openssh openssh-client openssh-server gnome-ssh-askpass", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/479760/100/0/threaded" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm" }, { "name": "FEDORA-2007-715", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00214.html" }, { "name": "USN-566-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-566-1" }, { "name": "3126", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3126" }, { "name": "ADV-2008-0924", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0924/references" }, { "name": "ADV-2008-2821", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2821" }, { "name": "30249", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30249" }, { "name": "ADV-2007-3156", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3156" }, { "name": "SSRT071485", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085" }, { "name": "31575", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31575" }, { "name": "RHSA-2008:0855", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0855.html" }, { "name": "MDKSA-2007:236", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:236" }, { "name": "oval:org.mitre.oval:def:5599", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5599" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=280471", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=280471" }, { "name": "29420", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29420" }, { "name": "APPLE-SA-2008-03-18", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" }, { "name": "20071115 Re: HPSBUX02287 SSRT071485 rev.1 - HP-UX Running HP Secure Shell, Remotely Gain Extended Privileges", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/483748/100/200/threaded" }, { "name": "HPSBUX02287", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085" }, { "name": "27399", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27399" }, { "name": "openssh-x11cookie-privilege-escalation(36637)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36637" }, { "name": "https://issues.rpath.com/browse/RPL-1706", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-1706" }, { "name": "http://docs.info.apple.com/article.html?artnum=307562", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=307562" }, { "name": "http://bugs.gentoo.org/show_bug.cgi?id=191321", "refsource": "CONFIRM", "url": "http://bugs.gentoo.org/show_bug.cgi?id=191321" }, { "name": "SUSE-SR:2007:022", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html" }, { "name": "32241", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32241" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.6", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4752" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.openssh.com/txt/release-4.7", "refsource": "CONFIRM", "tags": [], "url": "http://www.openssh.com/txt/release-4.7" }, { "name": "https://issues.rpath.com/browse/RPL-1706", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "https://issues.rpath.com/browse/RPL-1706" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=280471", "refsource": "MISC", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=280471" }, { "name": "http://bugs.gentoo.org/show_bug.cgi?id=191321", "refsource": "CONFIRM", "tags": [], "url": "http://bugs.gentoo.org/show_bug.cgi?id=191321" }, { "name": "FEDORA-2007-715", "refsource": "FEDORA", "tags": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00214.html" }, { "name": "GLSA-200711-02", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-200711-02.xml" }, { "name": "MDKSA-2007:236", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:236" }, { "name": "SUSE-SR:2007:022", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html" }, { "name": "25628", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/25628" }, { "name": "27399", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/27399" }, { "name": "3126", "refsource": "SREASON", "tags": [], "url": "http://securityreason.com/securityalert/3126" }, { "name": "USN-566-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-566-1" }, { "name": "http://docs.info.apple.com/article.html?artnum=307562", "refsource": "CONFIRM", "tags": [], "url": "http://docs.info.apple.com/article.html?artnum=307562" }, { "name": "APPLE-SA-2008-03-18", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" }, { "name": "29420", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/29420" }, { "name": "DSA-1576", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2008/dsa-1576" }, { "name": "30249", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/30249" }, { "name": "31575", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/31575" }, { "name": "RHSA-2008:0855", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0855.html" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm", "refsource": "CONFIRM", "tags": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm" }, { "name": "32241", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/32241" }, { "name": "ADV-2008-2821", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/2821" }, { "name": "ADV-2008-0924", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/0924/references" }, { "name": "ADV-2007-3156", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/3156" }, { "name": "SSRT071485", "refsource": "HP", "tags": [], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085" }, { "name": "openssh-x11cookie-privilege-escalation(36637)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36637" }, { "name": "oval:org.mitre.oval:def:5599", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5599" }, { "name": "oval:org.mitre.oval:def:10809", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10809" }, { "name": "20071115 Re: HPSBUX02287 SSRT071485 rev.1 - HP-UX Running HP Secure Shell, Remotely Gain Extended Privileges", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/483748/100/200/threaded" }, { "name": "20070917 FLEA-2007-0055-1 openssh openssh-client openssh-server gnome-ssh-askpass", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/479760/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-15T21:37Z", "publishedDate": "2007-09-12T01:17Z" } } }
fkie_cve-2007-4752
Vulnerability from fkie_nvd
Published
2007-09-12 01:17
Modified
2025-04-09 00:30
Severity ?
Summary
ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://bugs.gentoo.org/show_bug.cgi?id=191321 | ||
cve@mitre.org | http://docs.info.apple.com/article.html?artnum=307562 | ||
cve@mitre.org | http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085 | ||
cve@mitre.org | http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085 | ||
cve@mitre.org | http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html | ||
cve@mitre.org | http://secunia.com/advisories/27399 | ||
cve@mitre.org | http://secunia.com/advisories/29420 | ||
cve@mitre.org | http://secunia.com/advisories/30249 | ||
cve@mitre.org | http://secunia.com/advisories/31575 | ||
cve@mitre.org | http://secunia.com/advisories/32241 | ||
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200711-02.xml | ||
cve@mitre.org | http://securityreason.com/securityalert/3126 | ||
cve@mitre.org | http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm | ||
cve@mitre.org | http://www.debian.org/security/2008/dsa-1576 | ||
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDKSA-2007:236 | ||
cve@mitre.org | http://www.openssh.com/txt/release-4.7 | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2008-0855.html | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/479760/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/483748/100/200/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/25628 | ||
cve@mitre.org | http://www.ubuntu.com/usn/usn-566-1 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2007/3156 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2008/0924/references | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2008/2821 | ||
cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=280471 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/36637 | ||
cve@mitre.org | https://issues.rpath.com/browse/RPL-1706 | Patch | |
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10809 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5599 | ||
cve@mitre.org | https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00214.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://bugs.gentoo.org/show_bug.cgi?id=191321 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://docs.info.apple.com/article.html?artnum=307562 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27399 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29420 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30249 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31575 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32241 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200711-02.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/3126 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1576 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2007:236 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openssh.com/txt/release-4.7 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0855.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/479760/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/483748/100/200/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/25628 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-566-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/3156 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/0924/references | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2821 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=280471 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/36637 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://issues.rpath.com/browse/RPL-1706 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10809 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5599 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00214.html |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", "matchCriteriaId": "A410C8F9-717C-4657-91DD-BAEAB53ECC16", "versionEndIncluding": "4.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "E003AB3C-8DF3-4AE8-82A3-984F30E5599B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*", "matchCriteriaId": "5EBE75FE-DDE2-43BA-80EF-15A6698EABC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1FF67D77-02AC-4807-984D-C5AE9799F051", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*", "matchCriteriaId": "683B26F0-5EA2-455A-8948-27C100BBA3AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "E5A75B23-2DD7-4EB2-BEAA-049FF4E51A14", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*", "matchCriteriaId": "7279E1EC-DEBC-4ACC-925D-06A7697C162F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "7910598E-BEC1-4644-9DE4-D8BE505A4F9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*", "matchCriteriaId": "FB416D0C-6C86-450F-8917-D4B1BD82AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*", "matchCriteriaId": "3640CCC9-EC4A-44A4-B747-7BAAAD3460C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*", "matchCriteriaId": "B2DD362E-9EA9-4E88-9A94-D7B471EB1FD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*", "matchCriteriaId": "E3094069-AC2E-43BD-8094-D48E2526DECC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "9B72CFB3-39C7-469C-AA59-69F5B8993BF7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted." }, { "lang": "es", "value": "ssh en OpenSSH anterior a 4.7 no maneja adecuadamente cuando una cookie no confiable no puede ser creada y utiliza una cookie X11 confiable en su lugar, lo cual permite a los atacantes violar pol\u00edticas establecidas y obtener privilegios provocando que un cliente X sea tratado como confiable." } ], "id": "CVE-2007-4752", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-09-12T01:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.gentoo.org/show_bug.cgi?id=191321" }, { "source": "cve@mitre.org", "url": "http://docs.info.apple.com/article.html?artnum=307562" }, { "source": "cve@mitre.org", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085" }, { "source": "cve@mitre.org", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/27399" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29420" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/30249" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/31575" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/32241" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200711-02.xml" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3126" }, { "source": "cve@mitre.org", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2008/dsa-1576" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:236" }, { "source": "cve@mitre.org", "url": "http://www.openssh.com/txt/release-4.7" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-0855.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/479760/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/483748/100/200/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/25628" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-566-1" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3156" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0924/references" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/2821" }, { "source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=280471" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36637" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://issues.rpath.com/browse/RPL-1706" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10809" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5599" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00214.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.gentoo.org/show_bug.cgi?id=191321" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://docs.info.apple.com/article.html?artnum=307562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/27399" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/30249" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31575" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/32241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200711-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3126" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2008/dsa-1576" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openssh.com/txt/release-4.7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0855.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/479760/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/483748/100/200/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/25628" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-566-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3156" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0924/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2821" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=280471" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36637" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://issues.rpath.com/browse/RPL-1706" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10809" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5599" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00214.html" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "This issue did not affect the OpenSSH packages as distributed with Red Hat Enterprise Linux 2.1 or 3, as they do not support Trusted X11 forwarding.\n\nFor Red Hat Enterprise Linux 4 and 5, this issue was addressed via: https://rhn.redhat.com/errata/RHSA-2008-0855.html\n", "lastModified": "2008-08-28T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-657x-xg3w-fxx6
Vulnerability from github
Published
2022-05-01 18:26
Modified
2022-05-01 18:26
VLAI Severity ?
Details
ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.
{ "affected": [], "aliases": [ "CVE-2007-4752" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2007-09-12T01:17:00Z", "severity": "HIGH" }, "details": "ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.", "id": "GHSA-657x-xg3w-fxx6", "modified": "2022-05-01T18:26:55Z", "published": "2022-05-01T18:26:55Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4752" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=280471" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36637" }, { "type": "WEB", "url": "https://issues.rpath.com/browse/RPL-1706" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10809" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5599" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00214.html" }, { "type": "WEB", "url": "http://bugs.gentoo.org/show_bug.cgi?id=191321" }, { "type": "WEB", "url": "http://docs.info.apple.com/article.html?artnum=307562" }, { "type": "WEB", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/27399" }, { "type": "WEB", "url": "http://secunia.com/advisories/29420" }, { "type": "WEB", "url": "http://secunia.com/advisories/30249" }, { "type": "WEB", "url": "http://secunia.com/advisories/31575" }, { "type": "WEB", "url": "http://secunia.com/advisories/32241" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200711-02.xml" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/3126" }, { "type": "WEB", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm" }, { "type": "WEB", "url": "http://www.debian.org/security/2008/dsa-1576" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:236" }, { "type": "WEB", "url": "http://www.openssh.com/txt/release-4.7" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0855.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/479760/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/483748/100/200/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/25628" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-566-1" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/3156" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/0924/references" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/2821" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2008:0855
Vulnerability from csaf_redhat
Published
2008-08-22 12:10
Modified
2024-11-22 02:12
Summary
Red Hat Security Advisory: openssh security update
Notes
Topic
Updated openssh packages are now available for Red Hat Enterprise Linux 4,
Red Hat Enterprise Linux 5, and Red Hat Enterprise Linux 4.5 Extended
Update Support.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
Details
OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation.
Last week Red Hat detected an intrusion on certain of its computer systems
and took immediate action. While the investigation into the intrusion is
on-going, our initial focus was to review and test the distribution
channel we use with our customers, Red Hat Network (RHN) and its associated
security measures. Based on these efforts, we remain highly confident that
our systems and processes prevented the intrusion from compromising RHN or
the content distributed via RHN and accordingly believe that customers who
keep their systems updated using Red Hat Network are not at risk. We are
issuing this alert primarily for those who may obtain Red Hat binary
packages via channels other than those of official Red Hat subscribers.
In connection with the incident, the intruder was able to sign a small
number of OpenSSH packages relating only to Red Hat Enterprise Linux 4
(i386 and x86_64 architectures only) and Red Hat Enterprise Linux 5 (x86_64
architecture only). As a precautionary measure, we are releasing an
updated version of these packages, and have published a list of the
tampered packages and how to detect them at
http://www.redhat.com/security/data/openssh-blacklist.html
To reiterate, our processes and efforts to date indicate that packages
obtained by Red Hat Enterprise Linux subscribers via Red Hat Network are
not at risk.
These packages also fix a low severity flaw in the way ssh handles X11
cookies when creating X11 forwarding connections. When ssh was unable to
create untrusted cookie, ssh used a trusted cookie instead, possibly
allowing the administrative user of a untrusted remote server, or untrusted
application run on the remote server, to gain unintended access to a users
local X server. (CVE-2007-4752)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssh packages are now available for Red Hat Enterprise Linux 4,\nRed Hat Enterprise Linux 5, and Red Hat Enterprise Linux 4.5 Extended\nUpdate Support.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "OpenSSH is OpenBSD\u0027s SSH (Secure SHell) protocol implementation. \n\nLast week Red Hat detected an intrusion on certain of its computer systems\nand took immediate action. While the investigation into the intrusion is\non-going, our initial focus was to review and test the distribution\nchannel we use with our customers, Red Hat Network (RHN) and its associated\nsecurity measures. Based on these efforts, we remain highly confident that\nour systems and processes prevented the intrusion from compromising RHN or\nthe content distributed via RHN and accordingly believe that customers who\nkeep their systems updated using Red Hat Network are not at risk. We are\nissuing this alert primarily for those who may obtain Red Hat binary\npackages via channels other than those of official Red Hat subscribers.\n\nIn connection with the incident, the intruder was able to sign a small\nnumber of OpenSSH packages relating only to Red Hat Enterprise Linux 4\n(i386 and x86_64 architectures only) and Red Hat Enterprise Linux 5 (x86_64\narchitecture only). As a precautionary measure, we are releasing an\nupdated version of these packages, and have published a list of the\ntampered packages and how to detect them at\nhttp://www.redhat.com/security/data/openssh-blacklist.html\n\nTo reiterate, our processes and efforts to date indicate that packages\nobtained by Red Hat Enterprise Linux subscribers via Red Hat Network are\nnot at risk.\n\nThese packages also fix a low severity flaw in the way ssh handles X11\ncookies when creating X11 forwarding connections. When ssh was unable to\ncreate untrusted cookie, ssh used a trusted cookie instead, possibly\nallowing the administrative user of a untrusted remote server, or untrusted\napplication run on the remote server, to gain unintended access to a users\nlocal X server. (CVE-2007-4752)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0855", "url": "https://access.redhat.com/errata/RHSA-2008:0855" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.redhat.com/security/data/openssh-blacklist.html", "url": "http://www.redhat.com/security/data/openssh-blacklist.html" }, { "category": "external", "summary": "280361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=280361" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0855.json" } ], "title": "Red Hat Security Advisory: openssh security update", "tracking": { "current_release_date": "2024-11-22T02:12:28+00:00", "generator": { "date": "2024-11-22T02:12:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0855", "initial_release_date": "2008-08-22T12:10:00+00:00", "revision_history": [ { "date": "2008-08-22T12:10:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-08-22T08:15:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:12:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS EUS (v. 4.5)", "product": { "name": "Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:4.5::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES EUS (v. 4.5)", "product": { "name": "Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:4.5::es" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssh-server-0:4.3p2-26.el5_2.1.x86_64", "product": { "name": "openssh-server-0:4.3p2-26.el5_2.1.x86_64", "product_id": "openssh-server-0:4.3p2-26.el5_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@4.3p2-26.el5_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "product": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "product_id": "openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@4.3p2-26.el5_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "product": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "product_id": "openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@4.3p2-26.el5_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-0:4.3p2-26.el5_2.1.x86_64", "product": { "name": "openssh-0:4.3p2-26.el5_2.1.x86_64", "product_id": "openssh-0:4.3p2-26.el5_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@4.3p2-26.el5_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "product": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "product_id": "openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@4.3p2-26.el5_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-11.el4_7.x86_64", "product": { "name": "openssh-askpass-0:3.9p1-11.el4_7.x86_64", "product_id": "openssh-askpass-0:3.9p1-11.el4_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-11.el4_7?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-11.el4_7.x86_64", "product": { "name": "openssh-server-0:3.9p1-11.el4_7.x86_64", "product_id": "openssh-server-0:3.9p1-11.el4_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-11.el4_7?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "product": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "product_id": "openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-11.el4_7?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "product": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "product_id": "openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-11.el4_7?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-11.el4_7.x86_64", "product": { "name": "openssh-clients-0:3.9p1-11.el4_7.x86_64", "product_id": "openssh-clients-0:3.9p1-11.el4_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-11.el4_7?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-11.el4_7.x86_64", "product": { "name": "openssh-0:3.9p1-11.el4_7.x86_64", "product_id": "openssh-0:3.9p1-11.el4_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-11.el4_7?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "product": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "product_id": "openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-10.RHEL4.20?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "product": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "product_id": "openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-10.RHEL4.20?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "product": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "product_id": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-10.RHEL4.20?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "product": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "product_id": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-10.RHEL4.20?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-10.RHEL4.20.x86_64", "product": { "name": "openssh-0:3.9p1-10.RHEL4.20.x86_64", "product_id": "openssh-0:3.9p1-10.RHEL4.20.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-10.RHEL4.20?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "product": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "product_id": "openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-10.RHEL4.20?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssh-server-0:4.3p2-26.el5_2.1.i386", "product": { "name": "openssh-server-0:4.3p2-26.el5_2.1.i386", "product_id": "openssh-server-0:4.3p2-26.el5_2.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@4.3p2-26.el5_2.1?arch=i386" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "product": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "product_id": "openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@4.3p2-26.el5_2.1?arch=i386" } } }, { "category": "product_version", "name": "openssh-clients-0:4.3p2-26.el5_2.1.i386", "product": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.i386", "product_id": "openssh-clients-0:4.3p2-26.el5_2.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@4.3p2-26.el5_2.1?arch=i386" } } }, { "category": "product_version", "name": "openssh-0:4.3p2-26.el5_2.1.i386", "product": { "name": "openssh-0:4.3p2-26.el5_2.1.i386", "product_id": "openssh-0:4.3p2-26.el5_2.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@4.3p2-26.el5_2.1?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-0:4.3p2-26.el5_2.1.i386", "product": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.i386", "product_id": "openssh-askpass-0:4.3p2-26.el5_2.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@4.3p2-26.el5_2.1?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-11.el4_7.i386", "product": { "name": "openssh-askpass-0:3.9p1-11.el4_7.i386", "product_id": "openssh-askpass-0:3.9p1-11.el4_7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-11.el4_7?arch=i386" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-11.el4_7.i386", "product": { "name": "openssh-server-0:3.9p1-11.el4_7.i386", "product_id": "openssh-server-0:3.9p1-11.el4_7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-11.el4_7?arch=i386" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-11.el4_7.i386", "product": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.i386", "product_id": "openssh-debuginfo-0:3.9p1-11.el4_7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-11.el4_7?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "product": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "product_id": "openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-11.el4_7?arch=i386" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-11.el4_7.i386", "product": { "name": "openssh-clients-0:3.9p1-11.el4_7.i386", "product_id": "openssh-clients-0:3.9p1-11.el4_7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-11.el4_7?arch=i386" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-11.el4_7.i386", "product": { "name": "openssh-0:3.9p1-11.el4_7.i386", "product_id": "openssh-0:3.9p1-11.el4_7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-11.el4_7?arch=i386" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-10.RHEL4.20.i386", "product": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.i386", "product_id": "openssh-clients-0:3.9p1-10.RHEL4.20.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-10.RHEL4.20?arch=i386" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-10.RHEL4.20.i386", "product": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.i386", "product_id": "openssh-server-0:3.9p1-10.RHEL4.20.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-10.RHEL4.20?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "product": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "product_id": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-10.RHEL4.20?arch=i386" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "product": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "product_id": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-10.RHEL4.20?arch=i386" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-10.RHEL4.20.i386", "product": { "name": "openssh-0:3.9p1-10.RHEL4.20.i386", "product_id": "openssh-0:3.9p1-10.RHEL4.20.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-10.RHEL4.20?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "product": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "product_id": "openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-10.RHEL4.20?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "openssh-0:4.3p2-26.el5_2.1.src", "product": { "name": "openssh-0:4.3p2-26.el5_2.1.src", "product_id": "openssh-0:4.3p2-26.el5_2.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@4.3p2-26.el5_2.1?arch=src" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-11.el4_7.src", "product": { "name": "openssh-0:3.9p1-11.el4_7.src", "product_id": "openssh-0:3.9p1-11.el4_7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-11.el4_7?arch=src" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-10.RHEL4.20.src", "product": { "name": "openssh-0:3.9p1-10.RHEL4.20.src", "product_id": "openssh-0:3.9p1-10.RHEL4.20.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-10.RHEL4.20?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssh-server-0:4.3p2-26.el5_2.1.ia64", "product": { "name": "openssh-server-0:4.3p2-26.el5_2.1.ia64", "product_id": "openssh-server-0:4.3p2-26.el5_2.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@4.3p2-26.el5_2.1?arch=ia64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "product": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "product_id": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@4.3p2-26.el5_2.1?arch=ia64" } } }, { "category": "product_version", "name": "openssh-clients-0:4.3p2-26.el5_2.1.ia64", "product": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.ia64", "product_id": "openssh-clients-0:4.3p2-26.el5_2.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@4.3p2-26.el5_2.1?arch=ia64" } } }, { "category": "product_version", "name": "openssh-0:4.3p2-26.el5_2.1.ia64", "product": { "name": "openssh-0:4.3p2-26.el5_2.1.ia64", "product_id": "openssh-0:4.3p2-26.el5_2.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@4.3p2-26.el5_2.1?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "product": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "product_id": "openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@4.3p2-26.el5_2.1?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-11.el4_7.ia64", "product": { "name": "openssh-askpass-0:3.9p1-11.el4_7.ia64", "product_id": "openssh-askpass-0:3.9p1-11.el4_7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-11.el4_7?arch=ia64" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-11.el4_7.ia64", "product": { "name": "openssh-server-0:3.9p1-11.el4_7.ia64", "product_id": "openssh-server-0:3.9p1-11.el4_7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-11.el4_7?arch=ia64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "product": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "product_id": "openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-11.el4_7?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "product": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "product_id": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-11.el4_7?arch=ia64" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-11.el4_7.ia64", "product": { "name": "openssh-clients-0:3.9p1-11.el4_7.ia64", "product_id": "openssh-clients-0:3.9p1-11.el4_7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-11.el4_7?arch=ia64" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-11.el4_7.ia64", "product": { "name": "openssh-0:3.9p1-11.el4_7.ia64", "product_id": "openssh-0:3.9p1-11.el4_7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-11.el4_7?arch=ia64" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "product": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "product_id": "openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-10.RHEL4.20?arch=ia64" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-10.RHEL4.20.ia64", "product": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.ia64", "product_id": "openssh-server-0:3.9p1-10.RHEL4.20.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-10.RHEL4.20?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "product": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "product_id": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-10.RHEL4.20?arch=ia64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "product": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "product_id": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-10.RHEL4.20?arch=ia64" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-10.RHEL4.20.ia64", "product": { "name": "openssh-0:3.9p1-10.RHEL4.20.ia64", "product_id": "openssh-0:3.9p1-10.RHEL4.20.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-10.RHEL4.20?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "product": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "product_id": "openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-10.RHEL4.20?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openssh-server-0:4.3p2-26.el5_2.1.ppc", "product": { "name": "openssh-server-0:4.3p2-26.el5_2.1.ppc", "product_id": "openssh-server-0:4.3p2-26.el5_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@4.3p2-26.el5_2.1?arch=ppc" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "product": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "product_id": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@4.3p2-26.el5_2.1?arch=ppc" } } }, { "category": "product_version", "name": "openssh-clients-0:4.3p2-26.el5_2.1.ppc", "product": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.ppc", "product_id": "openssh-clients-0:4.3p2-26.el5_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@4.3p2-26.el5_2.1?arch=ppc" } } }, { "category": "product_version", "name": "openssh-0:4.3p2-26.el5_2.1.ppc", "product": { "name": "openssh-0:4.3p2-26.el5_2.1.ppc", "product_id": "openssh-0:4.3p2-26.el5_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@4.3p2-26.el5_2.1?arch=ppc" } } }, { "category": "product_version", "name": "openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "product": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "product_id": "openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@4.3p2-26.el5_2.1?arch=ppc" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-11.el4_7.ppc", "product": { "name": "openssh-askpass-0:3.9p1-11.el4_7.ppc", "product_id": "openssh-askpass-0:3.9p1-11.el4_7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-11.el4_7?arch=ppc" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-11.el4_7.ppc", "product": { "name": "openssh-server-0:3.9p1-11.el4_7.ppc", "product_id": "openssh-server-0:3.9p1-11.el4_7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-11.el4_7?arch=ppc" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "product": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "product_id": "openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-11.el4_7?arch=ppc" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "product": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "product_id": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-11.el4_7?arch=ppc" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-11.el4_7.ppc", "product": { "name": "openssh-clients-0:3.9p1-11.el4_7.ppc", "product_id": "openssh-clients-0:3.9p1-11.el4_7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-11.el4_7?arch=ppc" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-11.el4_7.ppc", "product": { "name": "openssh-0:3.9p1-11.el4_7.ppc", "product_id": "openssh-0:3.9p1-11.el4_7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-11.el4_7?arch=ppc" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "product": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "product_id": "openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-10.RHEL4.20?arch=ppc" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-10.RHEL4.20.ppc", "product": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.ppc", "product_id": "openssh-server-0:3.9p1-10.RHEL4.20.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-10.RHEL4.20?arch=ppc" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "product": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "product_id": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-10.RHEL4.20?arch=ppc" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "product": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "product_id": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-10.RHEL4.20?arch=ppc" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-10.RHEL4.20.ppc", "product": { "name": "openssh-0:3.9p1-10.RHEL4.20.ppc", "product_id": "openssh-0:3.9p1-10.RHEL4.20.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-10.RHEL4.20?arch=ppc" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "product": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "product_id": "openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-10.RHEL4.20?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssh-server-0:4.3p2-26.el5_2.1.s390x", "product": { "name": "openssh-server-0:4.3p2-26.el5_2.1.s390x", "product_id": "openssh-server-0:4.3p2-26.el5_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@4.3p2-26.el5_2.1?arch=s390x" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "product": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "product_id": "openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@4.3p2-26.el5_2.1?arch=s390x" } } }, { "category": "product_version", "name": "openssh-clients-0:4.3p2-26.el5_2.1.s390x", "product": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.s390x", "product_id": "openssh-clients-0:4.3p2-26.el5_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@4.3p2-26.el5_2.1?arch=s390x" } } }, { "category": "product_version", "name": "openssh-0:4.3p2-26.el5_2.1.s390x", "product": { "name": "openssh-0:4.3p2-26.el5_2.1.s390x", "product_id": "openssh-0:4.3p2-26.el5_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@4.3p2-26.el5_2.1?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "product": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "product_id": "openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@4.3p2-26.el5_2.1?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-11.el4_7.s390x", "product": { "name": "openssh-askpass-0:3.9p1-11.el4_7.s390x", "product_id": "openssh-askpass-0:3.9p1-11.el4_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-11.el4_7?arch=s390x" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-11.el4_7.s390x", "product": { "name": "openssh-server-0:3.9p1-11.el4_7.s390x", "product_id": "openssh-server-0:3.9p1-11.el4_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-11.el4_7?arch=s390x" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "product": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "product_id": "openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-11.el4_7?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "product": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "product_id": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-11.el4_7?arch=s390x" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-11.el4_7.s390x", "product": { "name": "openssh-clients-0:3.9p1-11.el4_7.s390x", "product_id": "openssh-clients-0:3.9p1-11.el4_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-11.el4_7?arch=s390x" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-11.el4_7.s390x", "product": { "name": "openssh-0:3.9p1-11.el4_7.s390x", "product_id": "openssh-0:3.9p1-11.el4_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-11.el4_7?arch=s390x" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "product": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "product_id": "openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-10.RHEL4.20?arch=s390x" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-10.RHEL4.20.s390x", "product": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.s390x", "product_id": "openssh-server-0:3.9p1-10.RHEL4.20.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-10.RHEL4.20?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "product": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "product_id": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-10.RHEL4.20?arch=s390x" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "product": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "product_id": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-10.RHEL4.20?arch=s390x" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-10.RHEL4.20.s390x", "product": { "name": "openssh-0:3.9p1-10.RHEL4.20.s390x", "product_id": "openssh-0:3.9p1-10.RHEL4.20.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-10.RHEL4.20?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "product": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "product_id": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-10.RHEL4.20?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:3.9p1-11.el4_7.s390", "product": { "name": "openssh-askpass-0:3.9p1-11.el4_7.s390", "product_id": "openssh-askpass-0:3.9p1-11.el4_7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-11.el4_7?arch=s390" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-11.el4_7.s390", "product": { "name": "openssh-server-0:3.9p1-11.el4_7.s390", "product_id": "openssh-server-0:3.9p1-11.el4_7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-11.el4_7?arch=s390" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-11.el4_7.s390", "product": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.s390", "product_id": "openssh-debuginfo-0:3.9p1-11.el4_7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-11.el4_7?arch=s390" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "product": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "product_id": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-11.el4_7?arch=s390" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-11.el4_7.s390", "product": { "name": "openssh-clients-0:3.9p1-11.el4_7.s390", "product_id": "openssh-clients-0:3.9p1-11.el4_7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-11.el4_7?arch=s390" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-11.el4_7.s390", "product": { "name": "openssh-0:3.9p1-11.el4_7.s390", "product_id": "openssh-0:3.9p1-11.el4_7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-11.el4_7?arch=s390" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-10.RHEL4.20.s390", "product": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.s390", "product_id": "openssh-clients-0:3.9p1-10.RHEL4.20.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-10.RHEL4.20?arch=s390" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-10.RHEL4.20.s390", "product": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.s390", "product_id": "openssh-server-0:3.9p1-10.RHEL4.20.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-10.RHEL4.20?arch=s390" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "product": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "product_id": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-10.RHEL4.20?arch=s390" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "product": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "product_id": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-10.RHEL4.20?arch=s390" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-10.RHEL4.20.s390", "product": { "name": "openssh-0:3.9p1-10.RHEL4.20.s390", "product_id": "openssh-0:3.9p1-10.RHEL4.20.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-10.RHEL4.20?arch=s390" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "product": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "product_id": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-10.RHEL4.20?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.i386" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.i386", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ia64" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.ia64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ppc" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.ppc", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.s390", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390x" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.s390x", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.src as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.src" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.src", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.x86_64" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.x86_64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.i386" }, "product_reference": "openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ia64" }, "product_reference": "openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ppc" }, "product_reference": "openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390" }, "product_reference": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390x" }, "product_reference": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64" }, "product_reference": "openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.i386" }, "product_reference": "openssh-clients-0:3.9p1-10.RHEL4.20.i386", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ia64" }, "product_reference": "openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ppc" }, "product_reference": "openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390" }, "product_reference": "openssh-clients-0:3.9p1-10.RHEL4.20.s390", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390x" }, "product_reference": "openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.x86_64" }, "product_reference": "openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386" }, "product_reference": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64" }, "product_reference": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc" }, "product_reference": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390" }, "product_reference": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x" }, "product_reference": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64" }, "product_reference": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.i386" }, "product_reference": "openssh-server-0:3.9p1-10.RHEL4.20.i386", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ia64" }, "product_reference": "openssh-server-0:3.9p1-10.RHEL4.20.ia64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ppc" }, "product_reference": "openssh-server-0:3.9p1-10.RHEL4.20.ppc", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390" }, "product_reference": "openssh-server-0:3.9p1-10.RHEL4.20.s390", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390x" }, "product_reference": "openssh-server-0:3.9p1-10.RHEL4.20.s390x", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.x86_64" }, "product_reference": "openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-11.el4_7.src" }, "product_reference": "openssh-0:3.9p1-11.el4_7.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-11.el4_7.src" }, "product_reference": "openssh-0:3.9p1-11.el4_7.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.i386" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.i386", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ia64" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.ia64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ppc" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.ppc", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.s390", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390x" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.s390x", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.src as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.src" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.src", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.x86_64" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.x86_64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.i386" }, "product_reference": "openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ia64" }, "product_reference": "openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ppc" }, "product_reference": "openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390" }, "product_reference": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390x" }, "product_reference": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64" }, "product_reference": "openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.i386" }, "product_reference": "openssh-clients-0:3.9p1-10.RHEL4.20.i386", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ia64" }, "product_reference": "openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ppc" }, "product_reference": "openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390" }, "product_reference": "openssh-clients-0:3.9p1-10.RHEL4.20.s390", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390x" }, "product_reference": "openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.x86_64" }, "product_reference": "openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386" }, "product_reference": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64" }, "product_reference": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc" }, "product_reference": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390" }, "product_reference": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x" }, "product_reference": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64" }, "product_reference": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.i386" }, "product_reference": "openssh-server-0:3.9p1-10.RHEL4.20.i386", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ia64" }, "product_reference": "openssh-server-0:3.9p1-10.RHEL4.20.ia64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ppc" }, "product_reference": "openssh-server-0:3.9p1-10.RHEL4.20.ppc", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390" }, "product_reference": "openssh-server-0:3.9p1-10.RHEL4.20.s390", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390x" }, "product_reference": "openssh-server-0:3.9p1-10.RHEL4.20.s390x", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.x86_64" }, "product_reference": "openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-11.el4_7.src" }, "product_reference": "openssh-0:3.9p1-11.el4_7.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-11.el4_7.src" }, "product_reference": "openssh-0:3.9p1-11.el4_7.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:4.3p2-26.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-0:4.3p2-26.el5_2.1.i386" }, "product_reference": "openssh-0:4.3p2-26.el5_2.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:4.3p2-26.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-0:4.3p2-26.el5_2.1.ia64" }, "product_reference": "openssh-0:4.3p2-26.el5_2.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:4.3p2-26.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-0:4.3p2-26.el5_2.1.ppc" }, "product_reference": "openssh-0:4.3p2-26.el5_2.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:4.3p2-26.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-0:4.3p2-26.el5_2.1.s390x" }, "product_reference": "openssh-0:4.3p2-26.el5_2.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:4.3p2-26.el5_2.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-0:4.3p2-26.el5_2.1.src" }, "product_reference": "openssh-0:4.3p2-26.el5_2.1.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:4.3p2-26.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-0:4.3p2-26.el5_2.1.x86_64" }, "product_reference": "openssh-0:4.3p2-26.el5_2.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.i386" }, "product_reference": "openssh-askpass-0:4.3p2-26.el5_2.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.ia64" }, "product_reference": "openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.ppc" }, "product_reference": "openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.s390x" }, "product_reference": "openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.x86_64" }, "product_reference": "openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-clients-0:4.3p2-26.el5_2.1.i386" }, "product_reference": "openssh-clients-0:4.3p2-26.el5_2.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-clients-0:4.3p2-26.el5_2.1.ia64" }, "product_reference": "openssh-clients-0:4.3p2-26.el5_2.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-clients-0:4.3p2-26.el5_2.1.ppc" }, "product_reference": "openssh-clients-0:4.3p2-26.el5_2.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-clients-0:4.3p2-26.el5_2.1.s390x" }, "product_reference": "openssh-clients-0:4.3p2-26.el5_2.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-clients-0:4.3p2-26.el5_2.1.x86_64" }, "product_reference": "openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.i386" }, "product_reference": "openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64" }, "product_reference": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc" }, "product_reference": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x" }, "product_reference": "openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64" }, "product_reference": "openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:4.3p2-26.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-server-0:4.3p2-26.el5_2.1.i386" }, "product_reference": "openssh-server-0:4.3p2-26.el5_2.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:4.3p2-26.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-server-0:4.3p2-26.el5_2.1.ia64" }, "product_reference": "openssh-server-0:4.3p2-26.el5_2.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:4.3p2-26.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-server-0:4.3p2-26.el5_2.1.ppc" }, "product_reference": "openssh-server-0:4.3p2-26.el5_2.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:4.3p2-26.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-server-0:4.3p2-26.el5_2.1.s390x" }, "product_reference": "openssh-server-0:4.3p2-26.el5_2.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:4.3p2-26.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-server-0:4.3p2-26.el5_2.1.x86_64" }, "product_reference": "openssh-server-0:4.3p2-26.el5_2.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:4.3p2-26.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-0:4.3p2-26.el5_2.1.i386" }, "product_reference": "openssh-0:4.3p2-26.el5_2.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:4.3p2-26.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-0:4.3p2-26.el5_2.1.ia64" }, "product_reference": "openssh-0:4.3p2-26.el5_2.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:4.3p2-26.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-0:4.3p2-26.el5_2.1.ppc" }, "product_reference": "openssh-0:4.3p2-26.el5_2.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:4.3p2-26.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-0:4.3p2-26.el5_2.1.s390x" }, "product_reference": "openssh-0:4.3p2-26.el5_2.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:4.3p2-26.el5_2.1.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-0:4.3p2-26.el5_2.1.src" }, "product_reference": "openssh-0:4.3p2-26.el5_2.1.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:4.3p2-26.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-0:4.3p2-26.el5_2.1.x86_64" }, "product_reference": "openssh-0:4.3p2-26.el5_2.1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.i386" }, "product_reference": "openssh-askpass-0:4.3p2-26.el5_2.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.ia64" }, "product_reference": "openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.ppc" }, "product_reference": "openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.s390x" }, "product_reference": "openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.x86_64" }, "product_reference": "openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-clients-0:4.3p2-26.el5_2.1.i386" }, "product_reference": "openssh-clients-0:4.3p2-26.el5_2.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-clients-0:4.3p2-26.el5_2.1.ia64" }, "product_reference": "openssh-clients-0:4.3p2-26.el5_2.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-clients-0:4.3p2-26.el5_2.1.ppc" }, "product_reference": "openssh-clients-0:4.3p2-26.el5_2.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-clients-0:4.3p2-26.el5_2.1.s390x" }, "product_reference": "openssh-clients-0:4.3p2-26.el5_2.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-clients-0:4.3p2-26.el5_2.1.x86_64" }, "product_reference": "openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.i386" }, "product_reference": "openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64" }, "product_reference": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc" }, "product_reference": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x" }, "product_reference": "openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64" }, "product_reference": "openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:4.3p2-26.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-server-0:4.3p2-26.el5_2.1.i386" }, "product_reference": "openssh-server-0:4.3p2-26.el5_2.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:4.3p2-26.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-server-0:4.3p2-26.el5_2.1.ia64" }, "product_reference": "openssh-server-0:4.3p2-26.el5_2.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:4.3p2-26.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-server-0:4.3p2-26.el5_2.1.ppc" }, "product_reference": "openssh-server-0:4.3p2-26.el5_2.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:4.3p2-26.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-server-0:4.3p2-26.el5_2.1.s390x" }, "product_reference": "openssh-server-0:4.3p2-26.el5_2.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:4.3p2-26.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-server-0:4.3p2-26.el5_2.1.x86_64" }, "product_reference": "openssh-server-0:4.3p2-26.el5_2.1.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-4752", "discovery_date": "2007-09-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "280361" } ], "notes": [ { "category": "description", "text": "ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssh falls back to the trusted x11 cookie if generation of an untrusted cookie fails", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the OpenSSH packages as distributed with Red Hat Enterprise Linux 2.1 or 3, as they do not support Trusted X11 forwarding.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.src", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "4AS:openssh-0:3.9p1-11.el4_7.i386", "4AS:openssh-0:3.9p1-11.el4_7.ia64", "4AS:openssh-0:3.9p1-11.el4_7.ppc", "4AS:openssh-0:3.9p1-11.el4_7.s390", "4AS:openssh-0:3.9p1-11.el4_7.s390x", "4AS:openssh-0:3.9p1-11.el4_7.src", "4AS:openssh-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-askpass-0:3.9p1-11.el4_7.i386", "4AS:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4AS:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4AS:openssh-askpass-0:3.9p1-11.el4_7.s390", "4AS:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4AS:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-clients-0:3.9p1-11.el4_7.i386", "4AS:openssh-clients-0:3.9p1-11.el4_7.ia64", "4AS:openssh-clients-0:3.9p1-11.el4_7.ppc", "4AS:openssh-clients-0:3.9p1-11.el4_7.s390", "4AS:openssh-clients-0:3.9p1-11.el4_7.s390x", "4AS:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-server-0:3.9p1-11.el4_7.i386", "4AS:openssh-server-0:3.9p1-11.el4_7.ia64", "4AS:openssh-server-0:3.9p1-11.el4_7.ppc", "4AS:openssh-server-0:3.9p1-11.el4_7.s390", "4AS:openssh-server-0:3.9p1-11.el4_7.s390x", "4AS:openssh-server-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-0:3.9p1-11.el4_7.src", "4Desktop:openssh-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-server-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-server-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-server-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-server-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-server-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-server-0:3.9p1-11.el4_7.x86_64", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.src", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "4ES:openssh-0:3.9p1-11.el4_7.i386", "4ES:openssh-0:3.9p1-11.el4_7.ia64", "4ES:openssh-0:3.9p1-11.el4_7.ppc", "4ES:openssh-0:3.9p1-11.el4_7.s390", "4ES:openssh-0:3.9p1-11.el4_7.s390x", "4ES:openssh-0:3.9p1-11.el4_7.src", "4ES:openssh-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-askpass-0:3.9p1-11.el4_7.i386", "4ES:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4ES:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4ES:openssh-askpass-0:3.9p1-11.el4_7.s390", "4ES:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4ES:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-clients-0:3.9p1-11.el4_7.i386", "4ES:openssh-clients-0:3.9p1-11.el4_7.ia64", "4ES:openssh-clients-0:3.9p1-11.el4_7.ppc", "4ES:openssh-clients-0:3.9p1-11.el4_7.s390", "4ES:openssh-clients-0:3.9p1-11.el4_7.s390x", "4ES:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-server-0:3.9p1-11.el4_7.i386", "4ES:openssh-server-0:3.9p1-11.el4_7.ia64", "4ES:openssh-server-0:3.9p1-11.el4_7.ppc", "4ES:openssh-server-0:3.9p1-11.el4_7.s390", "4ES:openssh-server-0:3.9p1-11.el4_7.s390x", "4ES:openssh-server-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-0:3.9p1-11.el4_7.i386", "4WS:openssh-0:3.9p1-11.el4_7.ia64", "4WS:openssh-0:3.9p1-11.el4_7.ppc", "4WS:openssh-0:3.9p1-11.el4_7.s390", "4WS:openssh-0:3.9p1-11.el4_7.s390x", "4WS:openssh-0:3.9p1-11.el4_7.src", "4WS:openssh-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-askpass-0:3.9p1-11.el4_7.i386", "4WS:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4WS:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4WS:openssh-askpass-0:3.9p1-11.el4_7.s390", "4WS:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4WS:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-clients-0:3.9p1-11.el4_7.i386", "4WS:openssh-clients-0:3.9p1-11.el4_7.ia64", "4WS:openssh-clients-0:3.9p1-11.el4_7.ppc", "4WS:openssh-clients-0:3.9p1-11.el4_7.s390", "4WS:openssh-clients-0:3.9p1-11.el4_7.s390x", "4WS:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-server-0:3.9p1-11.el4_7.i386", "4WS:openssh-server-0:3.9p1-11.el4_7.ia64", "4WS:openssh-server-0:3.9p1-11.el4_7.ppc", "4WS:openssh-server-0:3.9p1-11.el4_7.s390", "4WS:openssh-server-0:3.9p1-11.el4_7.s390x", "4WS:openssh-server-0:3.9p1-11.el4_7.x86_64", "5Client:openssh-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-0:4.3p2-26.el5_2.1.src", "5Client:openssh-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-server-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-server-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-server-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-server-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-server-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-0:4.3p2-26.el5_2.1.src", "5Server:openssh-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-server-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-server-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-server-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-server-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-server-0:4.3p2-26.el5_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4752" }, { "category": "external", "summary": "RHBZ#280361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=280361" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4752", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4752" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4752", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4752" } ], "release_date": "2007-09-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-22T12:10:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.src", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "4AS:openssh-0:3.9p1-11.el4_7.i386", "4AS:openssh-0:3.9p1-11.el4_7.ia64", "4AS:openssh-0:3.9p1-11.el4_7.ppc", "4AS:openssh-0:3.9p1-11.el4_7.s390", "4AS:openssh-0:3.9p1-11.el4_7.s390x", "4AS:openssh-0:3.9p1-11.el4_7.src", "4AS:openssh-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-askpass-0:3.9p1-11.el4_7.i386", "4AS:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4AS:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4AS:openssh-askpass-0:3.9p1-11.el4_7.s390", "4AS:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4AS:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-clients-0:3.9p1-11.el4_7.i386", "4AS:openssh-clients-0:3.9p1-11.el4_7.ia64", "4AS:openssh-clients-0:3.9p1-11.el4_7.ppc", "4AS:openssh-clients-0:3.9p1-11.el4_7.s390", "4AS:openssh-clients-0:3.9p1-11.el4_7.s390x", "4AS:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-server-0:3.9p1-11.el4_7.i386", "4AS:openssh-server-0:3.9p1-11.el4_7.ia64", "4AS:openssh-server-0:3.9p1-11.el4_7.ppc", "4AS:openssh-server-0:3.9p1-11.el4_7.s390", "4AS:openssh-server-0:3.9p1-11.el4_7.s390x", "4AS:openssh-server-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-0:3.9p1-11.el4_7.src", "4Desktop:openssh-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-server-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-server-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-server-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-server-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-server-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-server-0:3.9p1-11.el4_7.x86_64", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.src", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "4ES:openssh-0:3.9p1-11.el4_7.i386", "4ES:openssh-0:3.9p1-11.el4_7.ia64", "4ES:openssh-0:3.9p1-11.el4_7.ppc", "4ES:openssh-0:3.9p1-11.el4_7.s390", "4ES:openssh-0:3.9p1-11.el4_7.s390x", "4ES:openssh-0:3.9p1-11.el4_7.src", "4ES:openssh-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-askpass-0:3.9p1-11.el4_7.i386", "4ES:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4ES:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4ES:openssh-askpass-0:3.9p1-11.el4_7.s390", "4ES:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4ES:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-clients-0:3.9p1-11.el4_7.i386", "4ES:openssh-clients-0:3.9p1-11.el4_7.ia64", "4ES:openssh-clients-0:3.9p1-11.el4_7.ppc", "4ES:openssh-clients-0:3.9p1-11.el4_7.s390", "4ES:openssh-clients-0:3.9p1-11.el4_7.s390x", "4ES:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-server-0:3.9p1-11.el4_7.i386", "4ES:openssh-server-0:3.9p1-11.el4_7.ia64", "4ES:openssh-server-0:3.9p1-11.el4_7.ppc", "4ES:openssh-server-0:3.9p1-11.el4_7.s390", "4ES:openssh-server-0:3.9p1-11.el4_7.s390x", "4ES:openssh-server-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-0:3.9p1-11.el4_7.i386", "4WS:openssh-0:3.9p1-11.el4_7.ia64", "4WS:openssh-0:3.9p1-11.el4_7.ppc", "4WS:openssh-0:3.9p1-11.el4_7.s390", "4WS:openssh-0:3.9p1-11.el4_7.s390x", "4WS:openssh-0:3.9p1-11.el4_7.src", "4WS:openssh-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-askpass-0:3.9p1-11.el4_7.i386", "4WS:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4WS:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4WS:openssh-askpass-0:3.9p1-11.el4_7.s390", "4WS:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4WS:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-clients-0:3.9p1-11.el4_7.i386", "4WS:openssh-clients-0:3.9p1-11.el4_7.ia64", "4WS:openssh-clients-0:3.9p1-11.el4_7.ppc", "4WS:openssh-clients-0:3.9p1-11.el4_7.s390", "4WS:openssh-clients-0:3.9p1-11.el4_7.s390x", "4WS:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-server-0:3.9p1-11.el4_7.i386", "4WS:openssh-server-0:3.9p1-11.el4_7.ia64", "4WS:openssh-server-0:3.9p1-11.el4_7.ppc", "4WS:openssh-server-0:3.9p1-11.el4_7.s390", "4WS:openssh-server-0:3.9p1-11.el4_7.s390x", "4WS:openssh-server-0:3.9p1-11.el4_7.x86_64", "5Client:openssh-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-0:4.3p2-26.el5_2.1.src", "5Client:openssh-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-server-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-server-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-server-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-server-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-server-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-0:4.3p2-26.el5_2.1.src", "5Server:openssh-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-server-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-server-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-server-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-server-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-server-0:4.3p2-26.el5_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0855" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssh falls back to the trusted x11 cookie if generation of an untrusted cookie fails" }, { "cve": "CVE-2008-3844", "discovery_date": "2008-08-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618333" } ], "notes": [ { "category": "description", "text": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.src", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "4AS:openssh-0:3.9p1-11.el4_7.i386", "4AS:openssh-0:3.9p1-11.el4_7.ia64", "4AS:openssh-0:3.9p1-11.el4_7.ppc", "4AS:openssh-0:3.9p1-11.el4_7.s390", "4AS:openssh-0:3.9p1-11.el4_7.s390x", "4AS:openssh-0:3.9p1-11.el4_7.src", "4AS:openssh-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-askpass-0:3.9p1-11.el4_7.i386", "4AS:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4AS:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4AS:openssh-askpass-0:3.9p1-11.el4_7.s390", "4AS:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4AS:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-clients-0:3.9p1-11.el4_7.i386", "4AS:openssh-clients-0:3.9p1-11.el4_7.ia64", "4AS:openssh-clients-0:3.9p1-11.el4_7.ppc", "4AS:openssh-clients-0:3.9p1-11.el4_7.s390", "4AS:openssh-clients-0:3.9p1-11.el4_7.s390x", "4AS:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-server-0:3.9p1-11.el4_7.i386", "4AS:openssh-server-0:3.9p1-11.el4_7.ia64", "4AS:openssh-server-0:3.9p1-11.el4_7.ppc", "4AS:openssh-server-0:3.9p1-11.el4_7.s390", "4AS:openssh-server-0:3.9p1-11.el4_7.s390x", "4AS:openssh-server-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-0:3.9p1-11.el4_7.src", "4Desktop:openssh-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-server-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-server-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-server-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-server-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-server-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-server-0:3.9p1-11.el4_7.x86_64", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.src", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "4ES:openssh-0:3.9p1-11.el4_7.i386", "4ES:openssh-0:3.9p1-11.el4_7.ia64", "4ES:openssh-0:3.9p1-11.el4_7.ppc", "4ES:openssh-0:3.9p1-11.el4_7.s390", "4ES:openssh-0:3.9p1-11.el4_7.s390x", "4ES:openssh-0:3.9p1-11.el4_7.src", "4ES:openssh-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-askpass-0:3.9p1-11.el4_7.i386", "4ES:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4ES:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4ES:openssh-askpass-0:3.9p1-11.el4_7.s390", "4ES:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4ES:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-clients-0:3.9p1-11.el4_7.i386", "4ES:openssh-clients-0:3.9p1-11.el4_7.ia64", "4ES:openssh-clients-0:3.9p1-11.el4_7.ppc", "4ES:openssh-clients-0:3.9p1-11.el4_7.s390", "4ES:openssh-clients-0:3.9p1-11.el4_7.s390x", "4ES:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-server-0:3.9p1-11.el4_7.i386", "4ES:openssh-server-0:3.9p1-11.el4_7.ia64", "4ES:openssh-server-0:3.9p1-11.el4_7.ppc", "4ES:openssh-server-0:3.9p1-11.el4_7.s390", "4ES:openssh-server-0:3.9p1-11.el4_7.s390x", "4ES:openssh-server-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-0:3.9p1-11.el4_7.i386", "4WS:openssh-0:3.9p1-11.el4_7.ia64", "4WS:openssh-0:3.9p1-11.el4_7.ppc", "4WS:openssh-0:3.9p1-11.el4_7.s390", "4WS:openssh-0:3.9p1-11.el4_7.s390x", "4WS:openssh-0:3.9p1-11.el4_7.src", "4WS:openssh-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-askpass-0:3.9p1-11.el4_7.i386", "4WS:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4WS:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4WS:openssh-askpass-0:3.9p1-11.el4_7.s390", "4WS:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4WS:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-clients-0:3.9p1-11.el4_7.i386", "4WS:openssh-clients-0:3.9p1-11.el4_7.ia64", "4WS:openssh-clients-0:3.9p1-11.el4_7.ppc", "4WS:openssh-clients-0:3.9p1-11.el4_7.s390", "4WS:openssh-clients-0:3.9p1-11.el4_7.s390x", "4WS:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-server-0:3.9p1-11.el4_7.i386", "4WS:openssh-server-0:3.9p1-11.el4_7.ia64", "4WS:openssh-server-0:3.9p1-11.el4_7.ppc", "4WS:openssh-server-0:3.9p1-11.el4_7.s390", "4WS:openssh-server-0:3.9p1-11.el4_7.s390x", "4WS:openssh-server-0:3.9p1-11.el4_7.x86_64", "5Client:openssh-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-0:4.3p2-26.el5_2.1.src", "5Client:openssh-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-server-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-server-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-server-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-server-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-server-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-0:4.3p2-26.el5_2.1.src", "5Server:openssh-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-server-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-server-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-server-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-server-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-server-0:4.3p2-26.el5_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3844" }, { "category": "external", "summary": "RHBZ#1618333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618333" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3844", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3844" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3844", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3844" } ], "release_date": "2008-08-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-22T12:10:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.src", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "4AS:openssh-0:3.9p1-11.el4_7.i386", "4AS:openssh-0:3.9p1-11.el4_7.ia64", "4AS:openssh-0:3.9p1-11.el4_7.ppc", "4AS:openssh-0:3.9p1-11.el4_7.s390", "4AS:openssh-0:3.9p1-11.el4_7.s390x", "4AS:openssh-0:3.9p1-11.el4_7.src", "4AS:openssh-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-askpass-0:3.9p1-11.el4_7.i386", "4AS:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4AS:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4AS:openssh-askpass-0:3.9p1-11.el4_7.s390", "4AS:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4AS:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-clients-0:3.9p1-11.el4_7.i386", "4AS:openssh-clients-0:3.9p1-11.el4_7.ia64", "4AS:openssh-clients-0:3.9p1-11.el4_7.ppc", "4AS:openssh-clients-0:3.9p1-11.el4_7.s390", "4AS:openssh-clients-0:3.9p1-11.el4_7.s390x", "4AS:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-server-0:3.9p1-11.el4_7.i386", "4AS:openssh-server-0:3.9p1-11.el4_7.ia64", "4AS:openssh-server-0:3.9p1-11.el4_7.ppc", "4AS:openssh-server-0:3.9p1-11.el4_7.s390", "4AS:openssh-server-0:3.9p1-11.el4_7.s390x", "4AS:openssh-server-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-0:3.9p1-11.el4_7.src", "4Desktop:openssh-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-server-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-server-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-server-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-server-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-server-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-server-0:3.9p1-11.el4_7.x86_64", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.src", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "4ES:openssh-0:3.9p1-11.el4_7.i386", "4ES:openssh-0:3.9p1-11.el4_7.ia64", "4ES:openssh-0:3.9p1-11.el4_7.ppc", "4ES:openssh-0:3.9p1-11.el4_7.s390", "4ES:openssh-0:3.9p1-11.el4_7.s390x", "4ES:openssh-0:3.9p1-11.el4_7.src", "4ES:openssh-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-askpass-0:3.9p1-11.el4_7.i386", "4ES:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4ES:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4ES:openssh-askpass-0:3.9p1-11.el4_7.s390", "4ES:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4ES:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-clients-0:3.9p1-11.el4_7.i386", "4ES:openssh-clients-0:3.9p1-11.el4_7.ia64", "4ES:openssh-clients-0:3.9p1-11.el4_7.ppc", "4ES:openssh-clients-0:3.9p1-11.el4_7.s390", "4ES:openssh-clients-0:3.9p1-11.el4_7.s390x", "4ES:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-server-0:3.9p1-11.el4_7.i386", "4ES:openssh-server-0:3.9p1-11.el4_7.ia64", "4ES:openssh-server-0:3.9p1-11.el4_7.ppc", "4ES:openssh-server-0:3.9p1-11.el4_7.s390", "4ES:openssh-server-0:3.9p1-11.el4_7.s390x", "4ES:openssh-server-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-0:3.9p1-11.el4_7.i386", "4WS:openssh-0:3.9p1-11.el4_7.ia64", "4WS:openssh-0:3.9p1-11.el4_7.ppc", "4WS:openssh-0:3.9p1-11.el4_7.s390", "4WS:openssh-0:3.9p1-11.el4_7.s390x", "4WS:openssh-0:3.9p1-11.el4_7.src", "4WS:openssh-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-askpass-0:3.9p1-11.el4_7.i386", "4WS:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4WS:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4WS:openssh-askpass-0:3.9p1-11.el4_7.s390", "4WS:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4WS:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-clients-0:3.9p1-11.el4_7.i386", "4WS:openssh-clients-0:3.9p1-11.el4_7.ia64", "4WS:openssh-clients-0:3.9p1-11.el4_7.ppc", "4WS:openssh-clients-0:3.9p1-11.el4_7.s390", "4WS:openssh-clients-0:3.9p1-11.el4_7.s390x", "4WS:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-server-0:3.9p1-11.el4_7.i386", "4WS:openssh-server-0:3.9p1-11.el4_7.ia64", "4WS:openssh-server-0:3.9p1-11.el4_7.ppc", "4WS:openssh-server-0:3.9p1-11.el4_7.s390", "4WS:openssh-server-0:3.9p1-11.el4_7.s390x", "4WS:openssh-server-0:3.9p1-11.el4_7.x86_64", "5Client:openssh-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-0:4.3p2-26.el5_2.1.src", "5Client:openssh-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-server-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-server-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-server-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-server-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-server-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-0:4.3p2-26.el5_2.1.src", "5Server:openssh-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-server-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-server-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-server-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-server-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-server-0:4.3p2-26.el5_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0855" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…