Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-5352 (GCVE-0-2015-5352)
Vulnerability from cvelistv5
Published
2015-08-03 00:00
Modified
2024-08-06 06:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:41:09.541Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-2710-2", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2710-2" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20181023-0001/" }, { "name": "GLSA-201512-04", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201512-04" }, { "tags": [ "x_transferred" ], "url": "https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9\u0026id=1bf477d3cdf1a864646d59820878783d42357a1d" }, { "name": "[oss-security] 20150701 Re: CVE Request: two security issues in openSSH 6.9", "tags": [ "mailing-list", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2015/07/01/10" }, { "name": "RHSA-2016:0741", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0741.html" }, { "name": "75525", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75525" }, { "name": "1032797", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032797" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "SUSE-SU-2015:1581", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" }, { "tags": [ "x_transferred" ], "url": "http://www.openssh.com/txt/release-6.9" }, { "name": "[debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html" }, { "name": "USN-2710-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2710-1" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-13T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-2710-2", "tags": [ "vendor-advisory" ], "url": "http://www.ubuntu.com/usn/USN-2710-2" }, { "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "url": "https://security.netapp.com/advisory/ntap-20181023-0001/" }, { "name": "GLSA-201512-04", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/201512-04" }, { "url": "https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9\u0026id=1bf477d3cdf1a864646d59820878783d42357a1d" }, { "name": "[oss-security] 20150701 Re: CVE Request: two security issues in openSSH 6.9", "tags": [ "mailing-list" ], "url": "http://openwall.com/lists/oss-security/2015/07/01/10" }, { "name": "RHSA-2016:0741", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0741.html" }, { "name": "75525", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/75525" }, { "name": "1032797", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1032797" }, { "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "SUSE-SU-2015:1581", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" }, { "url": "http://www.openssh.com/txt/release-6.9" }, { "name": "[debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html" }, { "name": "USN-2710-1", "tags": [ "vendor-advisory" ], "url": "http://www.ubuntu.com/usn/USN-2710-1" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-5352", "datePublished": "2015-08-03T00:00:00", "dateReserved": "2015-07-01T00:00:00", "dateUpdated": "2024-08-06T06:41:09.541Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-5352\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-08-03T01:59:01.137\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad en la funci\u00f3n x11_open_helper en channels.c en ssh en OpenSSH en versiones anteriores a 6.9, cuando no se utiliza el modo ForwardX11Trusted, carece de una verificaci\u00f3n de tiempo l\u00edmite para conexiones X, lo que facilita a atacantes remotos eludir la restricci\u00f3n destinada al acceso a trav\u00e9s de una conexi\u00f3n fuera de la ventana de tiempo permitida.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.8\",\"matchCriteriaId\":\"00FCC2D9-B74F-4D36-BF64-B146A3976F2B\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://openwall.com/lists/oss-security/2015/07/01/10\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0741.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openssh.com/txt/release-6.9\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/75525\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id/1032797\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2710-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2710-2\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9\u0026id=1bf477d3cdf1a864646d59820878783d42357a1d\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/201512-04\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20181023-0001/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://openwall.com/lists/oss-security/2015/07/01/10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0741.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openssh.com/txt/release-6.9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/75525\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1032797\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2710-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2710-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9\u0026id=1bf477d3cdf1a864646d59820878783d42357a1d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201512-04\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20181023-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
suse-su-2015:1695-1
Vulnerability from csaf_suse
Published
2015-10-05 16:22
Modified
2015-10-05 16:22
Summary
Security update for openssh
Notes
Title of the patch
Security update for openssh
Description of the patch
OpenSSH was updated to fix several security issues and bugs.
Please note that due to a bug in the previous shipped openssh version, sshd might
not correctly restart. Please verify that the ssh daemon is running after installing
this update.
These security issues were fixed:
* CVE-2015-5352: The x11_open_helper function, when ForwardX11Trusted mode
is not used, lacked a check of the refusal deadline for X connections,
which made it easier for remote attackers to bypass intended access
restrictions via a connection outside of the permitted time window.
(bsc#936695)
* CVE-2015-5600: The kbdint_next_device function in auth2-chall.c
in sshd did not properly restrict the processing of keyboard-interactive
devices within a single connection, which made it easier for remote
attackers to conduct brute-force attacks or cause a denial of service
(CPU consumption) via a long and duplicative list in the ssh
-oKbdInteractiveDevices option, as demonstrated by a modified client
that provides a different password for each pam element on this list.
(bsc#938746)
* CVE-2015-4000: Removed and disabled weak DH groups to address LOGJAM.
(bsc#932483)
* Hardening patch to fix sftp RCE. (bsc#903649)
* CVE-2015-6563: The monitor component in sshd accepted extraneous username
data in MONITOR_REQ_PAM_INIT_CTX requests, which allowed local users to
conduct impersonation attacks by leveraging any SSH login access in
conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM
request, related to monitor.c and monitor_wrap.c.
* CVE-2015-6564: Use-after-free vulnerability in the mm_answer_pam_free_ctx
function in monitor.c in sshd might have allowed local users to gain
privileges by leveraging control of the sshd uid to send an unexpectedly
early MONITOR_REQ_PAM_FREE_CTX request.
Additional a bug was fixed that could lead to openssh not working in
chroot (bsc#947458).
Patchnames
sledsp4-openssh-12119,slessp4-openssh-12119
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssh", "title": "Title of the patch" }, { "category": "description", "text": "OpenSSH was updated to fix several security issues and bugs.\n\nPlease note that due to a bug in the previous shipped openssh version, sshd might\nnot correctly restart. Please verify that the ssh daemon is running after installing\nthis update.\n\nThese security issues were fixed:\n\n* CVE-2015-5352: The x11_open_helper function, when ForwardX11Trusted mode\n is not used, lacked a check of the refusal deadline for X connections,\n which made it easier for remote attackers to bypass intended access\n restrictions via a connection outside of the permitted time window.\n (bsc#936695)\n\n* CVE-2015-5600: The kbdint_next_device function in auth2-chall.c\n in sshd did not properly restrict the processing of keyboard-interactive\n devices within a single connection, which made it easier for remote\n attackers to conduct brute-force attacks or cause a denial of service\n (CPU consumption) via a long and duplicative list in the ssh\n -oKbdInteractiveDevices option, as demonstrated by a modified client\n that provides a different password for each pam element on this list.\n (bsc#938746)\n\n* CVE-2015-4000: Removed and disabled weak DH groups to address LOGJAM.\n (bsc#932483)\n\n* Hardening patch to fix sftp RCE. (bsc#903649)\n\n* CVE-2015-6563: The monitor component in sshd accepted extraneous username\n data in MONITOR_REQ_PAM_INIT_CTX requests, which allowed local users to\n conduct impersonation attacks by leveraging any SSH login access in\n conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM\n request, related to monitor.c and monitor_wrap.c.\n\n* CVE-2015-6564: Use-after-free vulnerability in the mm_answer_pam_free_ctx\n function in monitor.c in sshd might have allowed local users to gain\n privileges by leveraging control of the sshd uid to send an unexpectedly\n early MONITOR_REQ_PAM_FREE_CTX request.\n\nAdditional a bug was fixed that could lead to openssh not working in \nchroot (bsc#947458).\n", "title": "Description of the patch" }, { "category": "details", "text": "sledsp4-openssh-12119,slessp4-openssh-12119", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1695-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1695-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151695-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1695-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" }, { "category": "self", "summary": "SUSE Bug 903649", "url": "https://bugzilla.suse.com/903649" }, { "category": "self", "summary": "SUSE Bug 932483", "url": "https://bugzilla.suse.com/932483" }, { "category": "self", "summary": "SUSE Bug 936695", "url": "https://bugzilla.suse.com/936695" }, { "category": "self", "summary": "SUSE Bug 938746", "url": "https://bugzilla.suse.com/938746" }, { "category": "self", "summary": "SUSE Bug 939932", "url": "https://bugzilla.suse.com/939932" }, { "category": "self", "summary": "SUSE Bug 943006", "url": "https://bugzilla.suse.com/943006" }, { "category": "self", "summary": "SUSE Bug 943010", "url": "https://bugzilla.suse.com/943010" }, { "category": "self", "summary": "SUSE Bug 945484", "url": "https://bugzilla.suse.com/945484" }, { "category": "self", "summary": "SUSE Bug 945493", "url": "https://bugzilla.suse.com/945493" }, { "category": "self", "summary": "SUSE Bug 947458", "url": "https://bugzilla.suse.com/947458" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4000 page", "url": "https://www.suse.com/security/cve/CVE-2015-4000/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5352 page", "url": "https://www.suse.com/security/cve/CVE-2015-5352/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5600 page", "url": "https://www.suse.com/security/cve/CVE-2015-5600/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6563 page", "url": "https://www.suse.com/security/cve/CVE-2015-6563/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6564 page", "url": "https://www.suse.com/security/cve/CVE-2015-6564/" } ], "title": "Security update for openssh", "tracking": { "current_release_date": "2015-10-05T16:22:28Z", "generator": { "date": "2015-10-05T16:22:28Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1695-1", "initial_release_date": "2015-10-05T16:22:28Z", "revision_history": [ { "date": "2015-10-05T16:22:28Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-13.1.i586", "product": { "name": "openssh-6.6p1-13.1.i586", "product_id": "openssh-6.6p1-13.1.i586" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-13.3.i586", "product": { "name": "openssh-askpass-gnome-6.6p1-13.3.i586", "product_id": "openssh-askpass-gnome-6.6p1-13.3.i586" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-13.1.i586", "product": { "name": "openssh-helpers-6.6p1-13.1.i586", "product_id": "openssh-helpers-6.6p1-13.1.i586" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-13.1.i586", "product": { "name": "openssh-fips-6.6p1-13.1.i586", "product_id": "openssh-fips-6.6p1-13.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-13.1.ia64", "product": { "name": "openssh-6.6p1-13.1.ia64", "product_id": "openssh-6.6p1-13.1.ia64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-13.3.ia64", "product": { "name": "openssh-askpass-gnome-6.6p1-13.3.ia64", "product_id": "openssh-askpass-gnome-6.6p1-13.3.ia64" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-13.1.ia64", "product": { "name": "openssh-fips-6.6p1-13.1.ia64", "product_id": "openssh-fips-6.6p1-13.1.ia64" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-13.1.ia64", "product": { "name": "openssh-helpers-6.6p1-13.1.ia64", "product_id": "openssh-helpers-6.6p1-13.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-13.1.ppc64", "product": { "name": "openssh-6.6p1-13.1.ppc64", "product_id": "openssh-6.6p1-13.1.ppc64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-13.3.ppc64", "product": { "name": "openssh-askpass-gnome-6.6p1-13.3.ppc64", "product_id": "openssh-askpass-gnome-6.6p1-13.3.ppc64" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-13.1.ppc64", "product": { "name": "openssh-fips-6.6p1-13.1.ppc64", "product_id": "openssh-fips-6.6p1-13.1.ppc64" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-13.1.ppc64", "product": { "name": "openssh-helpers-6.6p1-13.1.ppc64", "product_id": "openssh-helpers-6.6p1-13.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-13.1.s390x", "product": { "name": "openssh-6.6p1-13.1.s390x", "product_id": "openssh-6.6p1-13.1.s390x" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-13.3.s390x", "product": { "name": "openssh-askpass-gnome-6.6p1-13.3.s390x", "product_id": "openssh-askpass-gnome-6.6p1-13.3.s390x" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-13.1.s390x", "product": { "name": "openssh-fips-6.6p1-13.1.s390x", "product_id": "openssh-fips-6.6p1-13.1.s390x" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-13.1.s390x", "product": { "name": "openssh-helpers-6.6p1-13.1.s390x", "product_id": "openssh-helpers-6.6p1-13.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-13.1.x86_64", "product": { "name": "openssh-6.6p1-13.1.x86_64", "product_id": "openssh-6.6p1-13.1.x86_64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-13.3.x86_64", "product": { "name": "openssh-askpass-gnome-6.6p1-13.3.x86_64", "product_id": "openssh-askpass-gnome-6.6p1-13.3.x86_64" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-13.1.x86_64", "product": { "name": "openssh-helpers-6.6p1-13.1.x86_64", "product_id": "openssh-helpers-6.6p1-13.1.x86_64" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-13.1.x86_64", "product": { "name": "openssh-fips-6.6p1-13.1.x86_64", "product_id": "openssh-fips-6.6p1-13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP4", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-13.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:openssh-6.6p1-13.1.i586" }, "product_reference": "openssh-6.6p1-13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-13.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:openssh-6.6p1-13.1.x86_64" }, "product_reference": "openssh-6.6p1-13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-13.3.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586" }, "product_reference": "openssh-askpass-gnome-6.6p1-13.3.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-13.3.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64" }, "product_reference": "openssh-askpass-gnome-6.6p1-13.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-13.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:openssh-helpers-6.6p1-13.1.i586" }, "product_reference": "openssh-helpers-6.6p1-13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-13.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:openssh-helpers-6.6p1-13.1.x86_64" }, "product_reference": "openssh-helpers-6.6p1-13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-13.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.i586" }, "product_reference": "openssh-6.6p1-13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-13.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.ia64" }, "product_reference": "openssh-6.6p1-13.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-13.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.ppc64" }, "product_reference": "openssh-6.6p1-13.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-13.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.s390x" }, "product_reference": "openssh-6.6p1-13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.x86_64" }, "product_reference": "openssh-6.6p1-13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-13.3.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586" }, "product_reference": "openssh-askpass-gnome-6.6p1-13.3.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-13.3.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ia64" }, "product_reference": "openssh-askpass-gnome-6.6p1-13.3.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-13.3.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ppc64" }, "product_reference": "openssh-askpass-gnome-6.6p1-13.3.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-13.3.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.s390x" }, "product_reference": "openssh-askpass-gnome-6.6p1-13.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-13.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64" }, "product_reference": "openssh-askpass-gnome-6.6p1-13.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-13.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.i586" }, "product_reference": "openssh-fips-6.6p1-13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-13.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.ia64" }, "product_reference": "openssh-fips-6.6p1-13.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-13.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.ppc64" }, "product_reference": "openssh-fips-6.6p1-13.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-13.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.s390x" }, "product_reference": "openssh-fips-6.6p1-13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.x86_64" }, "product_reference": "openssh-fips-6.6p1-13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-13.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.i586" }, "product_reference": "openssh-helpers-6.6p1-13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-13.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.ia64" }, "product_reference": "openssh-helpers-6.6p1-13.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-13.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.ppc64" }, "product_reference": "openssh-helpers-6.6p1-13.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-13.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.s390x" }, "product_reference": "openssh-helpers-6.6p1-13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.x86_64" }, "product_reference": "openssh-helpers-6.6p1-13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-13.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.i586" }, "product_reference": "openssh-6.6p1-13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-13.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.ia64" }, "product_reference": "openssh-6.6p1-13.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-13.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.ppc64" }, "product_reference": "openssh-6.6p1-13.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.s390x" }, "product_reference": "openssh-6.6p1-13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.x86_64" }, "product_reference": "openssh-6.6p1-13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-13.3.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586" }, "product_reference": "openssh-askpass-gnome-6.6p1-13.3.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-13.3.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ia64" }, "product_reference": "openssh-askpass-gnome-6.6p1-13.3.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-13.3.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ppc64" }, "product_reference": "openssh-askpass-gnome-6.6p1-13.3.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-13.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.s390x" }, "product_reference": "openssh-askpass-gnome-6.6p1-13.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-13.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64" }, "product_reference": "openssh-askpass-gnome-6.6p1-13.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-13.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.i586" }, "product_reference": "openssh-fips-6.6p1-13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-13.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.ia64" }, "product_reference": "openssh-fips-6.6p1-13.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-13.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.ppc64" }, "product_reference": "openssh-fips-6.6p1-13.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.s390x" }, "product_reference": "openssh-fips-6.6p1-13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.x86_64" }, "product_reference": "openssh-fips-6.6p1-13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-13.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.i586" }, "product_reference": "openssh-helpers-6.6p1-13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-13.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.ia64" }, "product_reference": "openssh-helpers-6.6p1-13.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-13.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.ppc64" }, "product_reference": "openssh-helpers-6.6p1-13.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.s390x" }, "product_reference": "openssh-helpers-6.6p1-13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.x86_64" }, "product_reference": "openssh-helpers-6.6p1-13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-4000", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4000" } ], "notes": [ { "category": "general", "text": "The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the \"Logjam\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-helpers-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4000", "url": "https://www.suse.com/security/cve/CVE-2015-4000" }, { "category": "external", "summary": "SUSE Bug 1074631 for CVE-2015-4000", "url": "https://bugzilla.suse.com/1074631" }, { "category": "external", "summary": "SUSE Bug 1211968 for CVE-2015-4000", "url": "https://bugzilla.suse.com/1211968" }, { "category": "external", "summary": "SUSE Bug 931600 for CVE-2015-4000", "url": "https://bugzilla.suse.com/931600" }, { "category": "external", "summary": "SUSE Bug 931698 for CVE-2015-4000", "url": "https://bugzilla.suse.com/931698" }, { "category": "external", "summary": "SUSE Bug 931723 for CVE-2015-4000", "url": "https://bugzilla.suse.com/931723" }, { "category": "external", "summary": "SUSE Bug 931845 for CVE-2015-4000", "url": "https://bugzilla.suse.com/931845" }, { "category": "external", "summary": "SUSE Bug 932026 for CVE-2015-4000", "url": "https://bugzilla.suse.com/932026" }, { "category": "external", "summary": "SUSE Bug 932483 for CVE-2015-4000", "url": "https://bugzilla.suse.com/932483" }, { "category": "external", "summary": "SUSE Bug 934789 for CVE-2015-4000", "url": "https://bugzilla.suse.com/934789" }, { "category": "external", "summary": "SUSE Bug 935033 for CVE-2015-4000", "url": "https://bugzilla.suse.com/935033" }, { "category": "external", "summary": "SUSE Bug 935540 for CVE-2015-4000", "url": "https://bugzilla.suse.com/935540" }, { "category": "external", "summary": "SUSE Bug 935979 for CVE-2015-4000", "url": "https://bugzilla.suse.com/935979" }, { "category": "external", "summary": "SUSE Bug 937202 for CVE-2015-4000", "url": "https://bugzilla.suse.com/937202" }, { "category": "external", "summary": "SUSE Bug 937766 for CVE-2015-4000", "url": "https://bugzilla.suse.com/937766" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938248" }, { "category": "external", "summary": "SUSE Bug 938432 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938432" }, { "category": "external", "summary": "SUSE Bug 938895 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938895" }, { "category": "external", "summary": "SUSE Bug 938905 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938905" }, { "category": "external", "summary": "SUSE Bug 938906 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938906" }, { "category": "external", "summary": "SUSE Bug 938913 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938913" }, { "category": "external", "summary": "SUSE Bug 938945 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938945" }, { "category": "external", "summary": "SUSE Bug 943664 for CVE-2015-4000", "url": "https://bugzilla.suse.com/943664" }, { "category": "external", "summary": "SUSE Bug 944729 for CVE-2015-4000", "url": "https://bugzilla.suse.com/944729" }, { "category": "external", "summary": "SUSE Bug 945582 for CVE-2015-4000", "url": "https://bugzilla.suse.com/945582" }, { "category": "external", "summary": "SUSE Bug 955589 for CVE-2015-4000", "url": "https://bugzilla.suse.com/955589" }, { "category": "external", "summary": "SUSE Bug 980406 for CVE-2015-4000", "url": "https://bugzilla.suse.com/980406" }, { "category": "external", "summary": "SUSE Bug 990592 for CVE-2015-4000", "url": "https://bugzilla.suse.com/990592" }, { "category": "external", "summary": "SUSE Bug 994144 for CVE-2015-4000", "url": "https://bugzilla.suse.com/994144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-helpers-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-helpers-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-10-05T16:22:28Z", "details": "important" } ], "title": "CVE-2015-4000" }, { "cve": "CVE-2015-5352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5352" } ], "notes": [ { "category": "general", "text": "The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-helpers-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5352", "url": "https://www.suse.com/security/cve/CVE-2015-5352" }, { "category": "external", "summary": "SUSE Bug 1074631 for CVE-2015-5352", "url": "https://bugzilla.suse.com/1074631" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2015-5352", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 936695 for CVE-2015-5352", "url": "https://bugzilla.suse.com/936695" }, { "category": "external", "summary": "SUSE Bug 938277 for CVE-2015-5352", "url": "https://bugzilla.suse.com/938277" }, { "category": "external", "summary": "SUSE Bug 948086 for CVE-2015-5352", "url": "https://bugzilla.suse.com/948086" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-5352", "url": "https://bugzilla.suse.com/992991" }, { "category": "external", "summary": "SUSE Bug 996040 for CVE-2015-5352", "url": "https://bugzilla.suse.com/996040" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-helpers-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-10-05T16:22:28Z", "details": "moderate" } ], "title": "CVE-2015-5352" }, { "cve": "CVE-2015-5600", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5600" } ], "notes": [ { "category": "general", "text": "The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-helpers-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5600", "url": "https://www.suse.com/security/cve/CVE-2015-5600" }, { "category": "external", "summary": "SUSE Bug 1009988 for CVE-2015-5600", "url": "https://bugzilla.suse.com/1009988" }, { "category": "external", "summary": "SUSE Bug 1074631 for CVE-2015-5600", "url": "https://bugzilla.suse.com/1074631" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2015-5600", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 938746 for CVE-2015-5600", "url": "https://bugzilla.suse.com/938746" }, { "category": "external", "summary": "SUSE Bug 943006 for CVE-2015-5600", "url": "https://bugzilla.suse.com/943006" }, { "category": "external", "summary": "SUSE Bug 943007 for CVE-2015-5600", "url": "https://bugzilla.suse.com/943007" }, { "category": "external", "summary": "SUSE Bug 943010 for CVE-2015-5600", "url": "https://bugzilla.suse.com/943010" }, { "category": "external", "summary": "SUSE Bug 943504 for CVE-2015-5600", "url": "https://bugzilla.suse.com/943504" }, { "category": "external", "summary": "SUSE Bug 945985 for CVE-2015-5600", "url": "https://bugzilla.suse.com/945985" }, { "category": "external", "summary": "SUSE Bug 948086 for CVE-2015-5600", "url": "https://bugzilla.suse.com/948086" }, { "category": "external", "summary": "SUSE Bug 954457 for CVE-2015-5600", "url": "https://bugzilla.suse.com/954457" }, { "category": "external", "summary": "SUSE Bug 957883 for CVE-2015-5600", "url": "https://bugzilla.suse.com/957883" }, { "category": "external", "summary": "SUSE Bug 996040 for CVE-2015-5600", "url": "https://bugzilla.suse.com/996040" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-helpers-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-10-05T16:22:28Z", "details": "important" } ], "title": "CVE-2015-5600" }, { "cve": "CVE-2015-6563", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6563" } ], "notes": [ { "category": "general", "text": "The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-helpers-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6563", "url": "https://www.suse.com/security/cve/CVE-2015-6563" }, { "category": "external", "summary": "SUSE Bug 1074631 for CVE-2015-6563", "url": "https://bugzilla.suse.com/1074631" }, { "category": "external", "summary": "SUSE Bug 943006 for CVE-2015-6563", "url": "https://bugzilla.suse.com/943006" }, { "category": "external", "summary": "SUSE Bug 943007 for CVE-2015-6563", "url": "https://bugzilla.suse.com/943007" }, { "category": "external", "summary": "SUSE Bug 943010 for CVE-2015-6563", "url": "https://bugzilla.suse.com/943010" }, { "category": "external", "summary": "SUSE Bug 948086 for CVE-2015-6563", "url": "https://bugzilla.suse.com/948086" }, { "category": "external", "summary": "SUSE Bug 996040 for CVE-2015-6563", "url": "https://bugzilla.suse.com/996040" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-helpers-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-10-05T16:22:28Z", "details": "moderate" } ], "title": "CVE-2015-6563" }, { "cve": "CVE-2015-6564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6564" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-helpers-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6564", "url": "https://www.suse.com/security/cve/CVE-2015-6564" }, { "category": "external", "summary": "SUSE Bug 1074631 for CVE-2015-6564", "url": "https://bugzilla.suse.com/1074631" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2015-6564", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 942850 for CVE-2015-6564", "url": "https://bugzilla.suse.com/942850" }, { "category": "external", "summary": "SUSE Bug 943006 for CVE-2015-6564", "url": "https://bugzilla.suse.com/943006" }, { "category": "external", "summary": "SUSE Bug 943007 for CVE-2015-6564", "url": "https://bugzilla.suse.com/943007" }, { "category": "external", "summary": "SUSE Bug 943010 for CVE-2015-6564", "url": "https://bugzilla.suse.com/943010" }, { "category": "external", "summary": "SUSE Bug 948086 for CVE-2015-6564", "url": "https://bugzilla.suse.com/948086" }, { "category": "external", "summary": "SUSE Bug 996040 for CVE-2015-6564", "url": "https://bugzilla.suse.com/996040" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:openssh-helpers-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-13.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-10-05T16:22:28Z", "details": "moderate" } ], "title": "CVE-2015-6564" } ] }
suse-su-2015:1581-1
Vulnerability from csaf_suse
Published
2015-09-17 12:53
Modified
2015-09-17 12:53
Summary
Security update for openssh
Notes
Title of the patch
Security update for openssh
Description of the patch
openssh was updated to fix several security issues and bugs.
These security issues were fixed:
* CVE-2015-5352: The x11_open_helper function in channels.c in ssh
in OpenSSH when ForwardX11Trusted mode is not used, lacked a check of
the refusal deadline for X connections, which made it easier for remote
attackers to bypass intended access restrictions via a connection outside
of the permitted time window (bsc#936695).
* CVE-2015-5600: The kbdint_next_device function in auth2-chall.c
in sshd in OpenSSH did not properly restrict the processing of
keyboard-interactive devices within a single connection, which made it
easier for remote attackers to conduct brute-force attacks or cause a
denial of service (CPU consumption) via a long and duplicative list in
the ssh -oKbdInteractiveDevices option, as demonstrated by a modified
client that provides a different password for each pam element on this
list (bsc#938746).
* CVE-2015-4000: Removed and disabled weak DH groups to address LOGJAM (bsc#932483).
* Hardening patch to fix sftp RCE (bsc#903649).
* CVE-2015-6563: The monitor component in sshd in OpenSSH accepted
extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which
allowed local users to conduct impersonation attacks by leveraging any SSH
login access in conjunction with control of the sshd uid to send a crafted
MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
* CVE-2015-6564: Use-after-free vulnerability in the
mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH might
have allowed local users to gain privileges by leveraging control of the
sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
These non-security issues were fixed:
- bsc#914309: sshd inherits oom_adj -17 on SIGHUP causing DoS potential for oom_killer.
- bsc#673532: limits.conf fsize change in SLES10SP3 causing problems to WebSphere mqm user.
- bsc#916549: Fixed support for aesXXX-gcm@openssh.com.
Patchnames
sledsp3-openssh-12096,slessp3-openssh-12096
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssh", "title": "Title of the patch" }, { "category": "description", "text": "openssh was updated to fix several security issues and bugs.\n\nThese security issues were fixed:\n* CVE-2015-5352: The x11_open_helper function in channels.c in ssh\n in OpenSSH when ForwardX11Trusted mode is not used, lacked a check of\n the refusal deadline for X connections, which made it easier for remote\n attackers to bypass intended access restrictions via a connection outside\n of the permitted time window (bsc#936695).\n* CVE-2015-5600: The kbdint_next_device function in auth2-chall.c\n in sshd in OpenSSH did not properly restrict the processing of\n keyboard-interactive devices within a single connection, which made it\n easier for remote attackers to conduct brute-force attacks or cause a\n denial of service (CPU consumption) via a long and duplicative list in\n the ssh -oKbdInteractiveDevices option, as demonstrated by a modified\n client that provides a different password for each pam element on this\n list (bsc#938746).\n* CVE-2015-4000: Removed and disabled weak DH groups to address LOGJAM (bsc#932483).\n* Hardening patch to fix sftp RCE (bsc#903649).\n* CVE-2015-6563: The monitor component in sshd in OpenSSH accepted\n extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which\n allowed local users to conduct impersonation attacks by leveraging any SSH\n login access in conjunction with control of the sshd uid to send a crafted\n MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.\n* CVE-2015-6564: Use-after-free vulnerability in the\n mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH might\n have allowed local users to gain privileges by leveraging control of the\n sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.\n\nThese non-security issues were fixed:\n- bsc#914309: sshd inherits oom_adj -17 on SIGHUP causing DoS potential for oom_killer.\n- bsc#673532: limits.conf fsize change in SLES10SP3 causing problems to WebSphere mqm user.\n- bsc#916549: Fixed support for aesXXX-gcm@openssh.com.\n ", "title": "Description of the patch" }, { "category": "details", "text": "sledsp3-openssh-12096,slessp3-openssh-12096", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1581-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1581-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151581-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1581-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-September/001595.html" }, { "category": "self", "summary": "SUSE Bug 673532", "url": "https://bugzilla.suse.com/673532" }, { "category": "self", "summary": "SUSE Bug 903649", "url": "https://bugzilla.suse.com/903649" }, { "category": "self", "summary": "SUSE Bug 905118", "url": "https://bugzilla.suse.com/905118" }, { "category": "self", "summary": "SUSE Bug 914309", "url": "https://bugzilla.suse.com/914309" }, { "category": "self", "summary": "SUSE Bug 916549", "url": "https://bugzilla.suse.com/916549" }, { "category": "self", "summary": "SUSE Bug 932483", "url": "https://bugzilla.suse.com/932483" }, { "category": "self", "summary": "SUSE Bug 936695", "url": "https://bugzilla.suse.com/936695" }, { "category": "self", "summary": "SUSE Bug 938746", "url": "https://bugzilla.suse.com/938746" }, { "category": "self", "summary": "SUSE Bug 943006", "url": "https://bugzilla.suse.com/943006" }, { "category": "self", "summary": "SUSE Bug 943010", "url": "https://bugzilla.suse.com/943010" }, { "category": "self", "summary": "SUSE Bug 945493", "url": "https://bugzilla.suse.com/945493" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4000 page", "url": "https://www.suse.com/security/cve/CVE-2015-4000/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5352 page", "url": "https://www.suse.com/security/cve/CVE-2015-5352/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5600 page", "url": "https://www.suse.com/security/cve/CVE-2015-5600/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6563 page", "url": "https://www.suse.com/security/cve/CVE-2015-6563/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6564 page", "url": "https://www.suse.com/security/cve/CVE-2015-6564/" } ], "title": "Security update for openssh", "tracking": { "current_release_date": "2015-09-17T12:53:08Z", "generator": { "date": "2015-09-17T12:53:08Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1581-1", "initial_release_date": "2015-09-17T12:53:08Z", "revision_history": [ { "date": "2015-09-17T12:53:08Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openssh-6.2p2-0.21.1.i586", "product": { "name": "openssh-6.2p2-0.21.1.i586", "product_id": "openssh-6.2p2-0.21.1.i586" } }, { "category": "product_version", "name": "openssh-askpass-6.2p2-0.21.1.i586", "product": { "name": "openssh-askpass-6.2p2-0.21.1.i586", "product_id": "openssh-askpass-6.2p2-0.21.1.i586" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.2p2-0.21.3.i586", "product": { "name": "openssh-askpass-gnome-6.2p2-0.21.3.i586", "product_id": "openssh-askpass-gnome-6.2p2-0.21.3.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "openssh-6.2p2-0.21.1.ia64", "product": { "name": "openssh-6.2p2-0.21.1.ia64", "product_id": "openssh-6.2p2-0.21.1.ia64" } }, { "category": "product_version", "name": "openssh-askpass-6.2p2-0.21.1.ia64", "product": { "name": "openssh-askpass-6.2p2-0.21.1.ia64", "product_id": "openssh-askpass-6.2p2-0.21.1.ia64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.2p2-0.21.3.ia64", "product": { "name": "openssh-askpass-gnome-6.2p2-0.21.3.ia64", "product_id": "openssh-askpass-gnome-6.2p2-0.21.3.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openssh-6.2p2-0.21.1.ppc64", "product": { "name": "openssh-6.2p2-0.21.1.ppc64", "product_id": "openssh-6.2p2-0.21.1.ppc64" } }, { "category": "product_version", "name": "openssh-askpass-6.2p2-0.21.1.ppc64", "product": { "name": "openssh-askpass-6.2p2-0.21.1.ppc64", "product_id": "openssh-askpass-6.2p2-0.21.1.ppc64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "product": { "name": "openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "product_id": "openssh-askpass-gnome-6.2p2-0.21.3.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssh-6.2p2-0.21.1.s390x", "product": { "name": "openssh-6.2p2-0.21.1.s390x", "product_id": "openssh-6.2p2-0.21.1.s390x" } }, { "category": "product_version", "name": "openssh-askpass-6.2p2-0.21.1.s390x", "product": { "name": "openssh-askpass-6.2p2-0.21.1.s390x", "product_id": "openssh-askpass-6.2p2-0.21.1.s390x" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.2p2-0.21.3.s390x", "product": { "name": "openssh-askpass-gnome-6.2p2-0.21.3.s390x", "product_id": "openssh-askpass-gnome-6.2p2-0.21.3.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-6.2p2-0.21.1.x86_64", "product": { "name": "openssh-6.2p2-0.21.1.x86_64", "product_id": "openssh-6.2p2-0.21.1.x86_64" } }, { "category": "product_version", "name": "openssh-askpass-6.2p2-0.21.1.x86_64", "product": { "name": "openssh-askpass-6.2p2-0.21.1.x86_64", "product_id": "openssh-askpass-6.2p2-0.21.1.x86_64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "product": { "name": "openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "product_id": "openssh-askpass-gnome-6.2p2-0.21.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3", "product": { "name": "SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-6.2p2-0.21.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.21.1.i586" }, "product_reference": "openssh-6.2p2-0.21.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.2p2-0.21.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.21.1.x86_64" }, "product_reference": "openssh-6.2p2-0.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-6.2p2-0.21.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.21.1.i586" }, "product_reference": "openssh-askpass-6.2p2-0.21.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-6.2p2-0.21.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64" }, "product_reference": "openssh-askpass-6.2p2-0.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.2p2-0.21.3.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586" }, "product_reference": "openssh-askpass-gnome-6.2p2-0.21.3.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.2p2-0.21.3.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64" }, "product_reference": "openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.2p2-0.21.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.i586" }, "product_reference": "openssh-6.2p2-0.21.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.2p2-0.21.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.ia64" }, "product_reference": "openssh-6.2p2-0.21.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.2p2-0.21.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.ppc64" }, "product_reference": "openssh-6.2p2-0.21.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.2p2-0.21.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.s390x" }, "product_reference": "openssh-6.2p2-0.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.2p2-0.21.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.x86_64" }, "product_reference": "openssh-6.2p2-0.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-6.2p2-0.21.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.i586" }, "product_reference": "openssh-askpass-6.2p2-0.21.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-6.2p2-0.21.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.ia64" }, "product_reference": "openssh-askpass-6.2p2-0.21.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-6.2p2-0.21.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.ppc64" }, "product_reference": "openssh-askpass-6.2p2-0.21.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-6.2p2-0.21.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.s390x" }, "product_reference": "openssh-askpass-6.2p2-0.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-6.2p2-0.21.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64" }, "product_reference": "openssh-askpass-6.2p2-0.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.2p2-0.21.3.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586" }, "product_reference": "openssh-askpass-gnome-6.2p2-0.21.3.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.2p2-0.21.3.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ia64" }, "product_reference": "openssh-askpass-gnome-6.2p2-0.21.3.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.2p2-0.21.3.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ppc64" }, "product_reference": "openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.2p2-0.21.3.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.s390x" }, "product_reference": "openssh-askpass-gnome-6.2p2-0.21.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.2p2-0.21.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64" }, "product_reference": "openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.2p2-0.21.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.i586" }, "product_reference": "openssh-6.2p2-0.21.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.2p2-0.21.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.ia64" }, "product_reference": "openssh-6.2p2-0.21.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.2p2-0.21.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.ppc64" }, "product_reference": "openssh-6.2p2-0.21.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.2p2-0.21.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.s390x" }, "product_reference": "openssh-6.2p2-0.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.2p2-0.21.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.x86_64" }, "product_reference": "openssh-6.2p2-0.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-6.2p2-0.21.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.i586" }, "product_reference": "openssh-askpass-6.2p2-0.21.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-6.2p2-0.21.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.ia64" }, "product_reference": "openssh-askpass-6.2p2-0.21.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-6.2p2-0.21.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.ppc64" }, "product_reference": "openssh-askpass-6.2p2-0.21.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-6.2p2-0.21.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.s390x" }, "product_reference": "openssh-askpass-6.2p2-0.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-6.2p2-0.21.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.x86_64" }, "product_reference": "openssh-askpass-6.2p2-0.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.2p2-0.21.3.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.i586" }, "product_reference": "openssh-askpass-gnome-6.2p2-0.21.3.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.2p2-0.21.3.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.ia64" }, "product_reference": "openssh-askpass-gnome-6.2p2-0.21.3.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.2p2-0.21.3.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.ppc64" }, "product_reference": "openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.2p2-0.21.3.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.s390x" }, "product_reference": "openssh-askpass-gnome-6.2p2-0.21.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.2p2-0.21.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.x86_64" }, "product_reference": "openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.2p2-0.21.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.i586" }, "product_reference": "openssh-6.2p2-0.21.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.2p2-0.21.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.ia64" }, "product_reference": "openssh-6.2p2-0.21.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.2p2-0.21.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.ppc64" }, "product_reference": "openssh-6.2p2-0.21.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.2p2-0.21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.s390x" }, "product_reference": "openssh-6.2p2-0.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.2p2-0.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.x86_64" }, "product_reference": "openssh-6.2p2-0.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-6.2p2-0.21.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.i586" }, "product_reference": "openssh-askpass-6.2p2-0.21.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-6.2p2-0.21.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.ia64" }, "product_reference": "openssh-askpass-6.2p2-0.21.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-6.2p2-0.21.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.ppc64" }, "product_reference": "openssh-askpass-6.2p2-0.21.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-6.2p2-0.21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.s390x" }, "product_reference": "openssh-askpass-6.2p2-0.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-6.2p2-0.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64" }, "product_reference": "openssh-askpass-6.2p2-0.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.2p2-0.21.3.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586" }, "product_reference": "openssh-askpass-gnome-6.2p2-0.21.3.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.2p2-0.21.3.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ia64" }, "product_reference": "openssh-askpass-gnome-6.2p2-0.21.3.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.2p2-0.21.3.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ppc64" }, "product_reference": "openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.2p2-0.21.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.s390x" }, "product_reference": "openssh-askpass-gnome-6.2p2-0.21.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.2p2-0.21.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64" }, "product_reference": "openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-4000", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4000" } ], "notes": [ { "category": "general", "text": "The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the \"Logjam\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4000", "url": "https://www.suse.com/security/cve/CVE-2015-4000" }, { "category": "external", "summary": "SUSE Bug 1074631 for CVE-2015-4000", "url": "https://bugzilla.suse.com/1074631" }, { "category": "external", "summary": "SUSE Bug 1211968 for CVE-2015-4000", "url": "https://bugzilla.suse.com/1211968" }, { "category": "external", "summary": "SUSE Bug 931600 for CVE-2015-4000", "url": "https://bugzilla.suse.com/931600" }, { "category": "external", "summary": "SUSE Bug 931698 for CVE-2015-4000", "url": "https://bugzilla.suse.com/931698" }, { "category": "external", "summary": "SUSE Bug 931723 for CVE-2015-4000", "url": "https://bugzilla.suse.com/931723" }, { "category": "external", "summary": "SUSE Bug 931845 for CVE-2015-4000", "url": "https://bugzilla.suse.com/931845" }, { "category": "external", "summary": "SUSE Bug 932026 for CVE-2015-4000", "url": "https://bugzilla.suse.com/932026" }, { "category": "external", "summary": "SUSE Bug 932483 for CVE-2015-4000", "url": "https://bugzilla.suse.com/932483" }, { "category": "external", "summary": "SUSE Bug 934789 for CVE-2015-4000", "url": "https://bugzilla.suse.com/934789" }, { "category": "external", "summary": "SUSE Bug 935033 for CVE-2015-4000", "url": "https://bugzilla.suse.com/935033" }, { "category": "external", "summary": "SUSE Bug 935540 for CVE-2015-4000", "url": "https://bugzilla.suse.com/935540" }, { "category": "external", "summary": "SUSE Bug 935979 for CVE-2015-4000", "url": "https://bugzilla.suse.com/935979" }, { "category": "external", "summary": "SUSE Bug 937202 for CVE-2015-4000", "url": "https://bugzilla.suse.com/937202" }, { "category": "external", "summary": "SUSE Bug 937766 for CVE-2015-4000", "url": "https://bugzilla.suse.com/937766" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938248" }, { "category": "external", "summary": "SUSE Bug 938432 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938432" }, { "category": "external", "summary": "SUSE Bug 938895 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938895" }, { "category": "external", "summary": "SUSE Bug 938905 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938905" }, { "category": "external", "summary": "SUSE Bug 938906 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938906" }, { "category": "external", "summary": "SUSE Bug 938913 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938913" }, { "category": "external", "summary": "SUSE Bug 938945 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938945" }, { "category": "external", "summary": "SUSE Bug 943664 for CVE-2015-4000", "url": "https://bugzilla.suse.com/943664" }, { "category": "external", "summary": "SUSE Bug 944729 for CVE-2015-4000", "url": "https://bugzilla.suse.com/944729" }, { "category": "external", "summary": "SUSE Bug 945582 for CVE-2015-4000", "url": "https://bugzilla.suse.com/945582" }, { "category": "external", "summary": "SUSE Bug 955589 for CVE-2015-4000", "url": "https://bugzilla.suse.com/955589" }, { "category": "external", "summary": "SUSE Bug 980406 for CVE-2015-4000", "url": "https://bugzilla.suse.com/980406" }, { "category": "external", "summary": "SUSE Bug 990592 for CVE-2015-4000", "url": "https://bugzilla.suse.com/990592" }, { "category": "external", "summary": "SUSE Bug 994144 for CVE-2015-4000", "url": "https://bugzilla.suse.com/994144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-09-17T12:53:08Z", "details": "important" } ], "title": "CVE-2015-4000" }, { "cve": "CVE-2015-5352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5352" } ], "notes": [ { "category": "general", "text": "The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5352", "url": "https://www.suse.com/security/cve/CVE-2015-5352" }, { "category": "external", "summary": "SUSE Bug 1074631 for CVE-2015-5352", "url": "https://bugzilla.suse.com/1074631" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2015-5352", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 936695 for CVE-2015-5352", "url": "https://bugzilla.suse.com/936695" }, { "category": "external", "summary": "SUSE Bug 938277 for CVE-2015-5352", "url": "https://bugzilla.suse.com/938277" }, { "category": "external", "summary": "SUSE Bug 948086 for CVE-2015-5352", "url": "https://bugzilla.suse.com/948086" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-5352", "url": "https://bugzilla.suse.com/992991" }, { "category": "external", "summary": "SUSE Bug 996040 for CVE-2015-5352", "url": "https://bugzilla.suse.com/996040" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-09-17T12:53:08Z", "details": "moderate" } ], "title": "CVE-2015-5352" }, { "cve": "CVE-2015-5600", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5600" } ], "notes": [ { "category": "general", "text": "The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5600", "url": "https://www.suse.com/security/cve/CVE-2015-5600" }, { "category": "external", "summary": "SUSE Bug 1009988 for CVE-2015-5600", "url": "https://bugzilla.suse.com/1009988" }, { "category": "external", "summary": "SUSE Bug 1074631 for CVE-2015-5600", "url": "https://bugzilla.suse.com/1074631" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2015-5600", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 938746 for CVE-2015-5600", "url": "https://bugzilla.suse.com/938746" }, { "category": "external", "summary": "SUSE Bug 943006 for CVE-2015-5600", "url": "https://bugzilla.suse.com/943006" }, { "category": "external", "summary": "SUSE Bug 943007 for CVE-2015-5600", "url": "https://bugzilla.suse.com/943007" }, { "category": "external", "summary": "SUSE Bug 943010 for CVE-2015-5600", "url": "https://bugzilla.suse.com/943010" }, { "category": "external", "summary": "SUSE Bug 943504 for CVE-2015-5600", "url": "https://bugzilla.suse.com/943504" }, { "category": "external", "summary": "SUSE Bug 945985 for CVE-2015-5600", "url": "https://bugzilla.suse.com/945985" }, { "category": "external", "summary": "SUSE Bug 948086 for CVE-2015-5600", "url": "https://bugzilla.suse.com/948086" }, { "category": "external", "summary": "SUSE Bug 954457 for CVE-2015-5600", "url": "https://bugzilla.suse.com/954457" }, { "category": "external", "summary": "SUSE Bug 957883 for CVE-2015-5600", "url": "https://bugzilla.suse.com/957883" }, { "category": "external", "summary": "SUSE Bug 996040 for CVE-2015-5600", "url": "https://bugzilla.suse.com/996040" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-09-17T12:53:08Z", "details": "important" } ], "title": "CVE-2015-5600" }, { "cve": "CVE-2015-6563", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6563" } ], "notes": [ { "category": "general", "text": "The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6563", "url": "https://www.suse.com/security/cve/CVE-2015-6563" }, { "category": "external", "summary": "SUSE Bug 1074631 for CVE-2015-6563", "url": "https://bugzilla.suse.com/1074631" }, { "category": "external", "summary": "SUSE Bug 943006 for CVE-2015-6563", "url": "https://bugzilla.suse.com/943006" }, { "category": "external", "summary": "SUSE Bug 943007 for CVE-2015-6563", "url": "https://bugzilla.suse.com/943007" }, { "category": "external", "summary": "SUSE Bug 943010 for CVE-2015-6563", "url": "https://bugzilla.suse.com/943010" }, { "category": "external", "summary": "SUSE Bug 948086 for CVE-2015-6563", "url": "https://bugzilla.suse.com/948086" }, { "category": "external", "summary": "SUSE Bug 996040 for CVE-2015-6563", "url": "https://bugzilla.suse.com/996040" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-09-17T12:53:08Z", "details": "moderate" } ], "title": "CVE-2015-6563" }, { "cve": "CVE-2015-6564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6564" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6564", "url": "https://www.suse.com/security/cve/CVE-2015-6564" }, { "category": "external", "summary": "SUSE Bug 1074631 for CVE-2015-6564", "url": "https://bugzilla.suse.com/1074631" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2015-6564", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 942850 for CVE-2015-6564", "url": "https://bugzilla.suse.com/942850" }, { "category": "external", "summary": "SUSE Bug 943006 for CVE-2015-6564", "url": "https://bugzilla.suse.com/943006" }, { "category": "external", "summary": "SUSE Bug 943007 for CVE-2015-6564", "url": "https://bugzilla.suse.com/943007" }, { "category": "external", "summary": "SUSE Bug 943010 for CVE-2015-6564", "url": "https://bugzilla.suse.com/943010" }, { "category": "external", "summary": "SUSE Bug 948086 for CVE-2015-6564", "url": "https://bugzilla.suse.com/948086" }, { "category": "external", "summary": "SUSE Bug 996040 for CVE-2015-6564", "url": "https://bugzilla.suse.com/996040" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.21.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-09-17T12:53:08Z", "details": "moderate" } ], "title": "CVE-2015-6564" } ] }
suse-su-2015:1544-1
Vulnerability from csaf_suse
Published
2015-09-09 08:52
Modified
2015-09-09 08:52
Summary
Security update for openssh
Notes
Title of the patch
Security update for openssh
Description of the patch
openssh was updated to fix several security issues.
These security issues were fixed:
* CVE-2015-5352: The x11_open_helper function in channels.c in ssh
in OpenSSH when ForwardX11Trusted mode is not used, lacked a check of
the refusal deadline for X connections, which made it easier for remote
attackers to bypass intended access restrictions via a connection outside
of the permitted time window (bsc#936695).
* CVE-2015-5600: The kbdint_next_device function in auth2-chall.c
in sshd in OpenSSH did not properly restrict the processing of
keyboard-interactive devices within a single connection, which made it
easier for remote attackers to conduct brute-force attacks or cause a
denial of service (CPU consumption) via a long and duplicative list in
the ssh -oKbdInteractiveDevices option, as demonstrated by a modified
client that provides a different password for each pam element on this
list (bsc#938746).
* CVE-2015-4000: Removed and disabled weak DH groups to address LOGJAM (bsc#932483).
* Hardening patch to fix sftp RCE (bsc#903649).
* CVE-2015-6563: The monitor component in sshd in OpenSSH accepted
extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which
allowed local users to conduct impersonation attacks by leveraging any SSH
login access in conjunction with control of the sshd uid to send a crafted
MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c. (bsc#943010)
* CVE-2015-6564: Use-after-free vulnerability in the
mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH might
have allowed local users to gain privileges by leveraging control of the
sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request. (bsc#943006)
Also use %restart_on_update in the trigger script.
Patchnames
SUSE-SLE-DESKTOP-12-2015-526,SUSE-SLE-SERVER-12-2015-526
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssh", "title": "Title of the patch" }, { "category": "description", "text": "\nopenssh was updated to fix several security issues.\n\nThese security issues were fixed:\n* CVE-2015-5352: The x11_open_helper function in channels.c in ssh\n in OpenSSH when ForwardX11Trusted mode is not used, lacked a check of\n the refusal deadline for X connections, which made it easier for remote\n attackers to bypass intended access restrictions via a connection outside\n of the permitted time window (bsc#936695).\n* CVE-2015-5600: The kbdint_next_device function in auth2-chall.c\n in sshd in OpenSSH did not properly restrict the processing of\n keyboard-interactive devices within a single connection, which made it\n easier for remote attackers to conduct brute-force attacks or cause a\n denial of service (CPU consumption) via a long and duplicative list in\n the ssh -oKbdInteractiveDevices option, as demonstrated by a modified\n client that provides a different password for each pam element on this\n list (bsc#938746).\n* CVE-2015-4000: Removed and disabled weak DH groups to address LOGJAM (bsc#932483).\n* Hardening patch to fix sftp RCE (bsc#903649).\n* CVE-2015-6563: The monitor component in sshd in OpenSSH accepted\n extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which\n allowed local users to conduct impersonation attacks by leveraging any SSH\n login access in conjunction with control of the sshd uid to send a crafted\n MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c. (bsc#943010)\n* CVE-2015-6564: Use-after-free vulnerability in the\n mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH might\n have allowed local users to gain privileges by leveraging control of the\n sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request. (bsc#943006)\n\nAlso use %restart_on_update in the trigger script.\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-2015-526,SUSE-SLE-SERVER-12-2015-526", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1544-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1544-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151544-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1544-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-September/001589.html" }, { "category": "self", "summary": "SUSE Bug 903649", "url": "https://bugzilla.suse.com/903649" }, { "category": "self", "summary": "SUSE Bug 932483", "url": "https://bugzilla.suse.com/932483" }, { "category": "self", "summary": "SUSE Bug 936695", "url": "https://bugzilla.suse.com/936695" }, { "category": "self", "summary": "SUSE Bug 938746", "url": "https://bugzilla.suse.com/938746" }, { "category": "self", "summary": "SUSE Bug 943006", "url": "https://bugzilla.suse.com/943006" }, { "category": "self", "summary": "SUSE Bug 943010", "url": "https://bugzilla.suse.com/943010" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4000 page", "url": "https://www.suse.com/security/cve/CVE-2015-4000/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5352 page", "url": "https://www.suse.com/security/cve/CVE-2015-5352/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5600 page", "url": "https://www.suse.com/security/cve/CVE-2015-5600/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6563 page", "url": "https://www.suse.com/security/cve/CVE-2015-6563/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6564 page", "url": "https://www.suse.com/security/cve/CVE-2015-6564/" } ], "title": "Security update for openssh", "tracking": { "current_release_date": "2015-09-09T08:52:05Z", "generator": { "date": "2015-09-09T08:52:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1544-1", "initial_release_date": "2015-09-09T08:52:05Z", "revision_history": [ { "date": "2015-09-09T08:52:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-29.1.ppc64le", "product": { "name": "openssh-6.6p1-29.1.ppc64le", "product_id": "openssh-6.6p1-29.1.ppc64le" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-29.1.ppc64le", "product": { "name": "openssh-askpass-gnome-6.6p1-29.1.ppc64le", "product_id": "openssh-askpass-gnome-6.6p1-29.1.ppc64le" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-29.1.ppc64le", "product": { "name": "openssh-fips-6.6p1-29.1.ppc64le", "product_id": "openssh-fips-6.6p1-29.1.ppc64le" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-29.1.ppc64le", "product": { "name": "openssh-helpers-6.6p1-29.1.ppc64le", "product_id": "openssh-helpers-6.6p1-29.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-29.1.s390x", "product": { "name": "openssh-6.6p1-29.1.s390x", "product_id": "openssh-6.6p1-29.1.s390x" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-29.1.s390x", "product": { "name": "openssh-askpass-gnome-6.6p1-29.1.s390x", "product_id": "openssh-askpass-gnome-6.6p1-29.1.s390x" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-29.1.s390x", "product": { "name": "openssh-fips-6.6p1-29.1.s390x", "product_id": "openssh-fips-6.6p1-29.1.s390x" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-29.1.s390x", "product": { "name": "openssh-helpers-6.6p1-29.1.s390x", "product_id": "openssh-helpers-6.6p1-29.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-29.1.x86_64", "product": { "name": "openssh-6.6p1-29.1.x86_64", "product_id": "openssh-6.6p1-29.1.x86_64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-29.1.x86_64", "product": { "name": "openssh-askpass-gnome-6.6p1-29.1.x86_64", "product_id": "openssh-askpass-gnome-6.6p1-29.1.x86_64" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-29.1.x86_64", "product": { "name": "openssh-helpers-6.6p1-29.1.x86_64", "product_id": "openssh-helpers-6.6p1-29.1.x86_64" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-29.1.x86_64", "product": { "name": "openssh-fips-6.6p1-29.1.x86_64", "product_id": "openssh-fips-6.6p1-29.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12", "product": { "name": "SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:openssh-6.6p1-29.1.x86_64" }, "product_reference": "openssh-6.6p1-29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-29.1.x86_64" }, "product_reference": "openssh-askpass-gnome-6.6p1-29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-29.1.x86_64" }, "product_reference": "openssh-helpers-6.6p1-29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-29.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.ppc64le" }, "product_reference": "openssh-6.6p1-29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-29.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.s390x" }, "product_reference": "openssh-6.6p1-29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-29.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.x86_64" }, "product_reference": "openssh-6.6p1-29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-29.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le" }, "product_reference": "openssh-askpass-gnome-6.6p1-29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-29.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.s390x" }, "product_reference": "openssh-askpass-gnome-6.6p1-29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-29.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.x86_64" }, "product_reference": "openssh-askpass-gnome-6.6p1-29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-29.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.ppc64le" }, "product_reference": "openssh-fips-6.6p1-29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-29.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.s390x" }, "product_reference": "openssh-fips-6.6p1-29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-29.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.x86_64" }, "product_reference": "openssh-fips-6.6p1-29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-29.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.ppc64le" }, "product_reference": "openssh-helpers-6.6p1-29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-29.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.s390x" }, "product_reference": "openssh-helpers-6.6p1-29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-29.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.x86_64" }, "product_reference": "openssh-helpers-6.6p1-29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.ppc64le" }, "product_reference": "openssh-6.6p1-29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.s390x" }, "product_reference": "openssh-6.6p1-29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.x86_64" }, "product_reference": "openssh-6.6p1-29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le" }, "product_reference": "openssh-askpass-gnome-6.6p1-29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.s390x" }, "product_reference": "openssh-askpass-gnome-6.6p1-29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.x86_64" }, "product_reference": "openssh-askpass-gnome-6.6p1-29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.ppc64le" }, "product_reference": "openssh-fips-6.6p1-29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.s390x" }, "product_reference": "openssh-fips-6.6p1-29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.x86_64" }, "product_reference": "openssh-fips-6.6p1-29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.ppc64le" }, "product_reference": "openssh-helpers-6.6p1-29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.s390x" }, "product_reference": "openssh-helpers-6.6p1-29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.x86_64" }, "product_reference": "openssh-helpers-6.6p1-29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-4000", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4000" } ], "notes": [ { "category": "general", "text": "The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the \"Logjam\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4000", "url": "https://www.suse.com/security/cve/CVE-2015-4000" }, { "category": "external", "summary": "SUSE Bug 1074631 for CVE-2015-4000", "url": "https://bugzilla.suse.com/1074631" }, { "category": "external", "summary": "SUSE Bug 1211968 for CVE-2015-4000", "url": "https://bugzilla.suse.com/1211968" }, { "category": "external", "summary": "SUSE Bug 931600 for CVE-2015-4000", "url": "https://bugzilla.suse.com/931600" }, { "category": "external", "summary": "SUSE Bug 931698 for CVE-2015-4000", "url": "https://bugzilla.suse.com/931698" }, { "category": "external", "summary": "SUSE Bug 931723 for CVE-2015-4000", "url": "https://bugzilla.suse.com/931723" }, { "category": "external", "summary": "SUSE Bug 931845 for CVE-2015-4000", "url": "https://bugzilla.suse.com/931845" }, { "category": "external", "summary": "SUSE Bug 932026 for CVE-2015-4000", "url": "https://bugzilla.suse.com/932026" }, { "category": "external", "summary": "SUSE Bug 932483 for CVE-2015-4000", "url": "https://bugzilla.suse.com/932483" }, { "category": "external", "summary": "SUSE Bug 934789 for CVE-2015-4000", "url": "https://bugzilla.suse.com/934789" }, { "category": "external", "summary": "SUSE Bug 935033 for CVE-2015-4000", "url": "https://bugzilla.suse.com/935033" }, { "category": "external", "summary": "SUSE Bug 935540 for CVE-2015-4000", "url": "https://bugzilla.suse.com/935540" }, { "category": "external", "summary": "SUSE Bug 935979 for CVE-2015-4000", "url": "https://bugzilla.suse.com/935979" }, { "category": "external", "summary": "SUSE Bug 937202 for CVE-2015-4000", "url": "https://bugzilla.suse.com/937202" }, { "category": "external", "summary": "SUSE Bug 937766 for CVE-2015-4000", "url": "https://bugzilla.suse.com/937766" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938248" }, { "category": "external", "summary": "SUSE Bug 938432 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938432" }, { "category": "external", "summary": "SUSE Bug 938895 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938895" }, { "category": "external", "summary": "SUSE Bug 938905 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938905" }, { "category": "external", "summary": "SUSE Bug 938906 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938906" }, { "category": "external", "summary": "SUSE Bug 938913 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938913" }, { "category": "external", "summary": "SUSE Bug 938945 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938945" }, { "category": "external", "summary": "SUSE Bug 943664 for CVE-2015-4000", "url": "https://bugzilla.suse.com/943664" }, { "category": "external", "summary": "SUSE Bug 944729 for CVE-2015-4000", "url": "https://bugzilla.suse.com/944729" }, { "category": "external", "summary": "SUSE Bug 945582 for CVE-2015-4000", "url": "https://bugzilla.suse.com/945582" }, { "category": "external", "summary": "SUSE Bug 955589 for CVE-2015-4000", "url": "https://bugzilla.suse.com/955589" }, { "category": "external", "summary": "SUSE Bug 980406 for CVE-2015-4000", "url": "https://bugzilla.suse.com/980406" }, { "category": "external", "summary": "SUSE Bug 990592 for CVE-2015-4000", "url": "https://bugzilla.suse.com/990592" }, { "category": "external", "summary": "SUSE Bug 994144 for CVE-2015-4000", "url": "https://bugzilla.suse.com/994144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-09-09T08:52:05Z", "details": "important" } ], "title": "CVE-2015-4000" }, { "cve": "CVE-2015-5352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5352" } ], "notes": [ { "category": "general", "text": "The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5352", "url": "https://www.suse.com/security/cve/CVE-2015-5352" }, { "category": "external", "summary": "SUSE Bug 1074631 for CVE-2015-5352", "url": "https://bugzilla.suse.com/1074631" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2015-5352", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 936695 for CVE-2015-5352", "url": "https://bugzilla.suse.com/936695" }, { "category": "external", "summary": "SUSE Bug 938277 for CVE-2015-5352", "url": "https://bugzilla.suse.com/938277" }, { "category": "external", "summary": "SUSE Bug 948086 for CVE-2015-5352", "url": "https://bugzilla.suse.com/948086" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-5352", "url": "https://bugzilla.suse.com/992991" }, { "category": "external", "summary": "SUSE Bug 996040 for CVE-2015-5352", "url": "https://bugzilla.suse.com/996040" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-09-09T08:52:05Z", "details": "moderate" } ], "title": "CVE-2015-5352" }, { "cve": "CVE-2015-5600", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5600" } ], "notes": [ { "category": "general", "text": "The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5600", "url": "https://www.suse.com/security/cve/CVE-2015-5600" }, { "category": "external", "summary": "SUSE Bug 1009988 for CVE-2015-5600", "url": "https://bugzilla.suse.com/1009988" }, { "category": "external", "summary": "SUSE Bug 1074631 for CVE-2015-5600", "url": "https://bugzilla.suse.com/1074631" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2015-5600", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 938746 for CVE-2015-5600", "url": "https://bugzilla.suse.com/938746" }, { "category": "external", "summary": "SUSE Bug 943006 for CVE-2015-5600", "url": "https://bugzilla.suse.com/943006" }, { "category": "external", "summary": "SUSE Bug 943007 for CVE-2015-5600", "url": "https://bugzilla.suse.com/943007" }, { "category": "external", "summary": "SUSE Bug 943010 for CVE-2015-5600", "url": "https://bugzilla.suse.com/943010" }, { "category": "external", "summary": "SUSE Bug 943504 for CVE-2015-5600", "url": "https://bugzilla.suse.com/943504" }, { "category": "external", "summary": "SUSE Bug 945985 for CVE-2015-5600", "url": "https://bugzilla.suse.com/945985" }, { "category": "external", "summary": "SUSE Bug 948086 for CVE-2015-5600", "url": "https://bugzilla.suse.com/948086" }, { "category": "external", "summary": "SUSE Bug 954457 for CVE-2015-5600", "url": "https://bugzilla.suse.com/954457" }, { "category": "external", "summary": "SUSE Bug 957883 for CVE-2015-5600", "url": "https://bugzilla.suse.com/957883" }, { "category": "external", "summary": "SUSE Bug 996040 for CVE-2015-5600", "url": "https://bugzilla.suse.com/996040" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-09-09T08:52:05Z", "details": "important" } ], "title": "CVE-2015-5600" }, { "cve": "CVE-2015-6563", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6563" } ], "notes": [ { "category": "general", "text": "The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6563", "url": "https://www.suse.com/security/cve/CVE-2015-6563" }, { "category": "external", "summary": "SUSE Bug 1074631 for CVE-2015-6563", "url": "https://bugzilla.suse.com/1074631" }, { "category": "external", "summary": "SUSE Bug 943006 for CVE-2015-6563", "url": "https://bugzilla.suse.com/943006" }, { "category": "external", "summary": "SUSE Bug 943007 for CVE-2015-6563", "url": "https://bugzilla.suse.com/943007" }, { "category": "external", "summary": "SUSE Bug 943010 for CVE-2015-6563", "url": "https://bugzilla.suse.com/943010" }, { "category": "external", "summary": "SUSE Bug 948086 for CVE-2015-6563", "url": "https://bugzilla.suse.com/948086" }, { "category": "external", "summary": "SUSE Bug 996040 for CVE-2015-6563", "url": "https://bugzilla.suse.com/996040" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-09-09T08:52:05Z", "details": "moderate" } ], "title": "CVE-2015-6563" }, { "cve": "CVE-2015-6564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6564" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6564", "url": "https://www.suse.com/security/cve/CVE-2015-6564" }, { "category": "external", "summary": "SUSE Bug 1074631 for CVE-2015-6564", "url": "https://bugzilla.suse.com/1074631" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2015-6564", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 942850 for CVE-2015-6564", "url": "https://bugzilla.suse.com/942850" }, { "category": "external", "summary": "SUSE Bug 943006 for CVE-2015-6564", "url": "https://bugzilla.suse.com/943006" }, { "category": "external", "summary": "SUSE Bug 943007 for CVE-2015-6564", "url": "https://bugzilla.suse.com/943007" }, { "category": "external", "summary": "SUSE Bug 943010 for CVE-2015-6564", "url": "https://bugzilla.suse.com/943010" }, { "category": "external", "summary": "SUSE Bug 948086 for CVE-2015-6564", "url": "https://bugzilla.suse.com/948086" }, { "category": "external", "summary": "SUSE Bug 996040 for CVE-2015-6564", "url": "https://bugzilla.suse.com/996040" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-09-09T08:52:05Z", "details": "moderate" } ], "title": "CVE-2015-6564" } ] }
suse-su-2015:1840-1
Vulnerability from csaf_suse
Published
2015-10-19 16:07
Modified
2015-10-19 16:07
Summary
Security update for openssh
Notes
Title of the patch
Security update for openssh
Description of the patch
openssh was updated to fix four security issues.
These security issues were fixed:
- CVE-2015-5352: The x11_open_helper function in channels.c in ssh in OpenSSH when ForwardX11Trusted mode is not used, lacked a check of the refusal deadline for X connections, which made it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window (bsc#936695).
- CVE-2015-5600: The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH did not properly restrict the processing of keyboard-interactive devices within a single connection, which made it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list (bsc#938746).
- CVE-2015-4000: Removed and disabled weak DH groups (bsc#932483).
- Hardening patch to fix sftp RCE (bsc#903649).
These non-security issues were fixed:
- bsc#914309: sshd inherits oom_adj -17 on SIGHUP causing DoS potential for oom_killer.
- bsc#673532: limits.conf fsize change in SLES10SP3 causing problems to WebSphere mqm user.
Patchnames
slessp2-openssh-12168
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssh", "title": "Title of the patch" }, { "category": "description", "text": "openssh was updated to fix four security issues.\n\nThese security issues were fixed:\n- CVE-2015-5352: The x11_open_helper function in channels.c in ssh in OpenSSH when ForwardX11Trusted mode is not used, lacked a check of the refusal deadline for X connections, which made it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window (bsc#936695).\n- CVE-2015-5600: The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH did not properly restrict the processing of keyboard-interactive devices within a single connection, which made it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list (bsc#938746).\n- CVE-2015-4000: Removed and disabled weak DH groups (bsc#932483).\n- Hardening patch to fix sftp RCE (bsc#903649).\n\nThese non-security issues were fixed:\n- bsc#914309: sshd inherits oom_adj -17 on SIGHUP causing DoS potential for oom_killer.\n- bsc#673532: limits.conf fsize change in SLES10SP3 causing problems to WebSphere mqm user.\n ", "title": "Description of the patch" }, { "category": "details", "text": "slessp2-openssh-12168", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1840-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1840-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151840-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1840-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-October/001650.html" }, { "category": "self", "summary": "SUSE Bug 673532", "url": "https://bugzilla.suse.com/673532" }, { "category": "self", "summary": "SUSE Bug 903649", "url": "https://bugzilla.suse.com/903649" }, { "category": "self", "summary": "SUSE Bug 905118", "url": "https://bugzilla.suse.com/905118" }, { "category": "self", "summary": "SUSE Bug 914309", "url": "https://bugzilla.suse.com/914309" }, { "category": "self", "summary": "SUSE Bug 932483", "url": "https://bugzilla.suse.com/932483" }, { "category": "self", "summary": "SUSE Bug 936695", "url": "https://bugzilla.suse.com/936695" }, { "category": "self", "summary": "SUSE Bug 938746", "url": "https://bugzilla.suse.com/938746" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4000 page", "url": "https://www.suse.com/security/cve/CVE-2015-4000/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5352 page", "url": "https://www.suse.com/security/cve/CVE-2015-5352/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5600 page", "url": "https://www.suse.com/security/cve/CVE-2015-5600/" } ], "title": "Security update for openssh", "tracking": { "current_release_date": "2015-10-19T16:07:14Z", "generator": { "date": "2015-10-19T16:07:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1840-1", "initial_release_date": "2015-10-19T16:07:14Z", "revision_history": [ { "date": "2015-10-19T16:07:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openssh-5.1p1-41.69.1.i586", "product": { "name": "openssh-5.1p1-41.69.1.i586", "product_id": "openssh-5.1p1-41.69.1.i586" } }, { "category": "product_version", "name": "openssh-askpass-5.1p1-41.69.1.i586", "product": { "name": "openssh-askpass-5.1p1-41.69.1.i586", "product_id": "openssh-askpass-5.1p1-41.69.1.i586" } }, { "category": "product_version", "name": "openssh-askpass-gnome-5.1p1-41.69.4.i586", "product": { "name": "openssh-askpass-gnome-5.1p1-41.69.4.i586", "product_id": "openssh-askpass-gnome-5.1p1-41.69.4.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "openssh-5.1p1-41.69.1.s390x", "product": { "name": "openssh-5.1p1-41.69.1.s390x", "product_id": "openssh-5.1p1-41.69.1.s390x" } }, { "category": "product_version", "name": "openssh-askpass-5.1p1-41.69.1.s390x", "product": { "name": "openssh-askpass-5.1p1-41.69.1.s390x", "product_id": "openssh-askpass-5.1p1-41.69.1.s390x" } }, { "category": "product_version", "name": "openssh-askpass-gnome-5.1p1-41.69.4.s390x", "product": { "name": "openssh-askpass-gnome-5.1p1-41.69.4.s390x", "product_id": "openssh-askpass-gnome-5.1p1-41.69.4.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-5.1p1-41.69.1.x86_64", "product": { "name": "openssh-5.1p1-41.69.1.x86_64", "product_id": "openssh-5.1p1-41.69.1.x86_64" } }, { "category": "product_version", "name": "openssh-askpass-5.1p1-41.69.1.x86_64", "product": { "name": "openssh-askpass-5.1p1-41.69.1.x86_64", "product_id": "openssh-askpass-5.1p1-41.69.1.x86_64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-5.1p1-41.69.4.x86_64", "product": { "name": "openssh-askpass-gnome-5.1p1-41.69.4.x86_64", "product_id": "openssh-askpass-gnome-5.1p1-41.69.4.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-5.1p1-41.69.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.i586" }, "product_reference": "openssh-5.1p1-41.69.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-5.1p1-41.69.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.s390x" }, "product_reference": "openssh-5.1p1-41.69.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-5.1p1-41.69.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.x86_64" }, "product_reference": "openssh-5.1p1-41.69.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-5.1p1-41.69.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.i586" }, "product_reference": "openssh-askpass-5.1p1-41.69.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-5.1p1-41.69.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.s390x" }, "product_reference": "openssh-askpass-5.1p1-41.69.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-5.1p1-41.69.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.x86_64" }, "product_reference": "openssh-askpass-5.1p1-41.69.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-5.1p1-41.69.4.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.i586" }, "product_reference": "openssh-askpass-gnome-5.1p1-41.69.4.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-5.1p1-41.69.4.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.s390x" }, "product_reference": "openssh-askpass-gnome-5.1p1-41.69.4.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-5.1p1-41.69.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.x86_64" }, "product_reference": "openssh-askpass-gnome-5.1p1-41.69.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-4000", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4000" } ], "notes": [ { "category": "general", "text": "The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the \"Logjam\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4000", "url": "https://www.suse.com/security/cve/CVE-2015-4000" }, { "category": "external", "summary": "SUSE Bug 1074631 for CVE-2015-4000", "url": "https://bugzilla.suse.com/1074631" }, { "category": "external", "summary": "SUSE Bug 1211968 for CVE-2015-4000", "url": "https://bugzilla.suse.com/1211968" }, { "category": "external", "summary": "SUSE Bug 931600 for CVE-2015-4000", "url": "https://bugzilla.suse.com/931600" }, { "category": "external", "summary": "SUSE Bug 931698 for CVE-2015-4000", "url": "https://bugzilla.suse.com/931698" }, { "category": "external", "summary": "SUSE Bug 931723 for CVE-2015-4000", "url": "https://bugzilla.suse.com/931723" }, { "category": "external", "summary": "SUSE Bug 931845 for CVE-2015-4000", "url": "https://bugzilla.suse.com/931845" }, { "category": "external", "summary": "SUSE Bug 932026 for CVE-2015-4000", "url": "https://bugzilla.suse.com/932026" }, { "category": "external", "summary": "SUSE Bug 932483 for CVE-2015-4000", "url": "https://bugzilla.suse.com/932483" }, { "category": "external", "summary": "SUSE Bug 934789 for CVE-2015-4000", "url": "https://bugzilla.suse.com/934789" }, { "category": "external", "summary": "SUSE Bug 935033 for CVE-2015-4000", "url": "https://bugzilla.suse.com/935033" }, { "category": "external", "summary": "SUSE Bug 935540 for CVE-2015-4000", "url": "https://bugzilla.suse.com/935540" }, { "category": "external", "summary": "SUSE Bug 935979 for CVE-2015-4000", "url": "https://bugzilla.suse.com/935979" }, { "category": "external", "summary": "SUSE Bug 937202 for CVE-2015-4000", "url": "https://bugzilla.suse.com/937202" }, { "category": "external", "summary": "SUSE Bug 937766 for CVE-2015-4000", "url": "https://bugzilla.suse.com/937766" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938248" }, { "category": "external", "summary": "SUSE Bug 938432 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938432" }, { "category": "external", "summary": "SUSE Bug 938895 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938895" }, { "category": "external", "summary": "SUSE Bug 938905 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938905" }, { "category": "external", "summary": "SUSE Bug 938906 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938906" }, { "category": "external", "summary": "SUSE Bug 938913 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938913" }, { "category": "external", "summary": "SUSE Bug 938945 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938945" }, { "category": "external", "summary": "SUSE Bug 943664 for CVE-2015-4000", "url": "https://bugzilla.suse.com/943664" }, { "category": "external", "summary": "SUSE Bug 944729 for CVE-2015-4000", "url": "https://bugzilla.suse.com/944729" }, { "category": "external", "summary": "SUSE Bug 945582 for CVE-2015-4000", "url": "https://bugzilla.suse.com/945582" }, { "category": "external", "summary": "SUSE Bug 955589 for CVE-2015-4000", "url": "https://bugzilla.suse.com/955589" }, { "category": "external", "summary": "SUSE Bug 980406 for CVE-2015-4000", "url": "https://bugzilla.suse.com/980406" }, { "category": "external", "summary": "SUSE Bug 990592 for CVE-2015-4000", "url": "https://bugzilla.suse.com/990592" }, { "category": "external", "summary": "SUSE Bug 994144 for CVE-2015-4000", "url": "https://bugzilla.suse.com/994144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-10-19T16:07:14Z", "details": "important" } ], "title": "CVE-2015-4000" }, { "cve": "CVE-2015-5352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5352" } ], "notes": [ { "category": "general", "text": "The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5352", "url": "https://www.suse.com/security/cve/CVE-2015-5352" }, { "category": "external", "summary": "SUSE Bug 1074631 for CVE-2015-5352", "url": "https://bugzilla.suse.com/1074631" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2015-5352", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 936695 for CVE-2015-5352", "url": "https://bugzilla.suse.com/936695" }, { "category": "external", "summary": "SUSE Bug 938277 for CVE-2015-5352", "url": "https://bugzilla.suse.com/938277" }, { "category": "external", "summary": "SUSE Bug 948086 for CVE-2015-5352", "url": "https://bugzilla.suse.com/948086" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-5352", "url": "https://bugzilla.suse.com/992991" }, { "category": "external", "summary": "SUSE Bug 996040 for CVE-2015-5352", "url": "https://bugzilla.suse.com/996040" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-10-19T16:07:14Z", "details": "moderate" } ], "title": "CVE-2015-5352" }, { "cve": "CVE-2015-5600", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5600" } ], "notes": [ { "category": "general", "text": "The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5600", "url": "https://www.suse.com/security/cve/CVE-2015-5600" }, { "category": "external", "summary": "SUSE Bug 1009988 for CVE-2015-5600", "url": "https://bugzilla.suse.com/1009988" }, { "category": "external", "summary": "SUSE Bug 1074631 for CVE-2015-5600", "url": "https://bugzilla.suse.com/1074631" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2015-5600", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 938746 for CVE-2015-5600", "url": "https://bugzilla.suse.com/938746" }, { "category": "external", "summary": "SUSE Bug 943006 for CVE-2015-5600", "url": "https://bugzilla.suse.com/943006" }, { "category": "external", "summary": "SUSE Bug 943007 for CVE-2015-5600", "url": "https://bugzilla.suse.com/943007" }, { "category": "external", "summary": "SUSE Bug 943010 for CVE-2015-5600", "url": "https://bugzilla.suse.com/943010" }, { "category": "external", "summary": "SUSE Bug 943504 for CVE-2015-5600", "url": "https://bugzilla.suse.com/943504" }, { "category": "external", "summary": "SUSE Bug 945985 for CVE-2015-5600", "url": "https://bugzilla.suse.com/945985" }, { "category": "external", "summary": "SUSE Bug 948086 for CVE-2015-5600", "url": "https://bugzilla.suse.com/948086" }, { "category": "external", "summary": "SUSE Bug 954457 for CVE-2015-5600", "url": "https://bugzilla.suse.com/954457" }, { "category": "external", "summary": "SUSE Bug 957883 for CVE-2015-5600", "url": "https://bugzilla.suse.com/957883" }, { "category": "external", "summary": "SUSE Bug 996040 for CVE-2015-5600", "url": "https://bugzilla.suse.com/996040" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-10-19T16:07:14Z", "details": "important" } ], "title": "CVE-2015-5600" } ] }
fkie_cve-2015-5352
Vulnerability from fkie_nvd
Published
2015-08-03 01:59
Modified
2025-04-12 10:46
Severity ?
Summary
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html | ||
cve@mitre.org | http://openwall.com/lists/oss-security/2015/07/01/10 | ||
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2016-0741.html | ||
cve@mitre.org | http://www.openssh.com/txt/release-6.9 | Vendor Advisory | |
cve@mitre.org | http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html | ||
cve@mitre.org | http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html | ||
cve@mitre.org | http://www.securityfocus.com/bid/75525 | ||
cve@mitre.org | http://www.securitytracker.com/id/1032797 | ||
cve@mitre.org | http://www.ubuntu.com/usn/USN-2710-1 | ||
cve@mitre.org | http://www.ubuntu.com/usn/USN-2710-2 | ||
cve@mitre.org | https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d | ||
cve@mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf | ||
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html | ||
cve@mitre.org | https://security.gentoo.org/glsa/201512-04 | ||
cve@mitre.org | https://security.netapp.com/advisory/ntap-20181023-0001/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2015/07/01/10 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-0741.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openssh.com/txt/release-6.9 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/75525 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032797 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2710-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2710-2 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d | ||
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201512-04 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20181023-0001/ |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", "matchCriteriaId": "00FCC2D9-B74F-4D36-BF64-B146A3976F2B", "versionEndIncluding": "6.8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window." }, { "lang": "es", "value": "Vulnerabilidad en la funci\u00f3n x11_open_helper en channels.c en ssh en OpenSSH en versiones anteriores a 6.9, cuando no se utiliza el modo ForwardX11Trusted, carece de una verificaci\u00f3n de tiempo l\u00edmite para conexiones X, lo que facilita a atacantes remotos eludir la restricci\u00f3n destinada al acceso a trav\u00e9s de una conexi\u00f3n fuera de la ventana de tiempo permitida." } ], "id": "CVE-2015-5352", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-08-03T01:59:01.137", "references": [ { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" }, { "source": "cve@mitre.org", "url": "http://openwall.com/lists/oss-security/2015/07/01/10" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-0741.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.openssh.com/txt/release-6.9" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/75525" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1032797" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2710-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2710-2" }, { "source": "cve@mitre.org", "url": "https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9\u0026id=1bf477d3cdf1a864646d59820878783d42357a1d" }, { "source": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201512-04" }, { "source": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20181023-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2015/07/01/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0741.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.openssh.com/txt/release-6.9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75525" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032797" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2710-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2710-2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9\u0026id=1bf477d3cdf1a864646d59820878783d42357a1d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201512-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20181023-0001/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-6fpx-j7j8-53rc
Vulnerability from github
Published
2022-05-14 02:19
Modified
2025-04-12 12:50
VLAI Severity ?
Details
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
{ "affected": [], "aliases": [ "CVE-2015-5352" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2015-08-03T01:59:00Z", "severity": "MODERATE" }, "details": "The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.", "id": "GHSA-6fpx-j7j8-53rc", "modified": "2025-04-12T12:50:25Z", "published": "2022-05-14T02:19:19Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5352" }, { "type": "WEB", "url": "https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9\u0026id=1bf477d3cdf1a864646d59820878783d42357a1d" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201512-04" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20181023-0001" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" }, { "type": "WEB", "url": "http://openwall.com/lists/oss-security/2015/07/01/10" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-0741.html" }, { "type": "WEB", "url": "http://www.openssh.com/txt/release-6.9" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/75525" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1032797" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2710-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2710-2" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2015-5352
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2015-5352", "description": "The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.", "id": "GSD-2015-5352", "references": [ "https://www.suse.com/security/cve/CVE-2015-5352.html", "https://access.redhat.com/errata/RHSA-2016:0741", "https://ubuntu.com/security/CVE-2015-5352", "https://advisories.mageia.org/CVE-2015-5352.html", "https://alas.aws.amazon.com/cve/html/CVE-2015-5352.html", "https://linux.oracle.com/cve/CVE-2015-5352.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-5352" ], "details": "The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.", "id": "GSD-2015-5352", "modified": "2023-12-13T01:20:06.173973Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-5352", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-2710-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2710-2" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "https://security.netapp.com/advisory/ntap-20181023-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20181023-0001/" }, { "name": "GLSA-201512-04", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201512-04" }, { "name": "https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9\u0026id=1bf477d3cdf1a864646d59820878783d42357a1d", "refsource": "CONFIRM", "url": "https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9\u0026id=1bf477d3cdf1a864646d59820878783d42357a1d" }, { "name": "[oss-security] 20150701 Re: CVE Request: two security issues in openSSH 6.9", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2015/07/01/10" }, { "name": "RHSA-2016:0741", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0741.html" }, { "name": "75525", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75525" }, { "name": "1032797", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032797" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "SUSE-SU-2015:1581", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" }, { "name": "http://www.openssh.com/txt/release-6.9", "refsource": "CONFIRM", "url": "http://www.openssh.com/txt/release-6.9" }, { "name": "[debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html" }, { "name": "USN-2710-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2710-1" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.8", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-5352" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-264" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.openssh.com/txt/release-6.9", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://www.openssh.com/txt/release-6.9" }, { "name": "[oss-security] 20150701 Re: CVE Request: two security issues in openSSH 6.9", "refsource": "MLIST", "tags": [], "url": "http://openwall.com/lists/oss-security/2015/07/01/10" }, { "name": "https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9\u0026id=1bf477d3cdf1a864646d59820878783d42357a1d", "refsource": "CONFIRM", "tags": [], "url": "https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9\u0026id=1bf477d3cdf1a864646d59820878783d42357a1d" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "75525", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/75525" }, { "name": "GLSA-201512-04", "refsource": "GENTOO", "tags": [], "url": "https://security.gentoo.org/glsa/201512-04" }, { "name": "SUSE-SU-2015:1581", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" }, { "name": "USN-2710-2", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2710-2" }, { "name": "USN-2710-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2710-1" }, { "name": "1032797", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1032797" }, { "name": "RHSA-2016:0741", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0741.html" }, { "name": "[debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update", "refsource": "MLIST", "tags": [], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html" }, { "name": "https://security.netapp.com/advisory/ntap-20181023-0001/", "refsource": "CONFIRM", "tags": [], "url": "https://security.netapp.com/advisory/ntap-20181023-0001/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", "refsource": "CONFIRM", "tags": [], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2022-12-13T12:15Z", "publishedDate": "2015-08-03T01:59Z" } } }
rhsa-2016:0741
Vulnerability from csaf_redhat
Published
2016-05-10 18:29
Modified
2024-11-22 09:34
Summary
Red Hat Security Advisory: openssh security, bug fix, and enhancement update
Notes
Topic
An update for openssh is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Security Fix(es):
* It was found that the OpenSSH client did not properly enforce the ForwardX11Timeout setting. A malicious or compromised remote X application could possibly use this flaw to establish a trusted connection to the local X server, even if only untrusted X11 forwarding was requested. (CVE-2015-5352)
* A flaw was found in the way OpenSSH handled PAM authentication when using privilege separation. An attacker with valid credentials on the system and able to fully compromise a non-privileged pre-authentication process using a different flaw could use this flaw to authenticate as other users. (CVE-2015-6563)
* A use-after-free flaw was found in OpenSSH. An attacker able to fully compromise a non-privileged pre-authentication process using a different flaw could possibly cause sshd to crash or execute arbitrary code with root privileges. (CVE-2015-6564)
* An access flaw was discovered in OpenSSH; the OpenSSH client did not correctly handle failures to generate authentication cookies for untrusted X11 forwarding. A malicious or compromised remote X application could possibly use this flaw to establish a trusted connection to the local X server, even if only untrusted X11 forwarding was requested. (CVE-2016-1908)
For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.8 Release Notes and Red Hat Enterprise Linux 6.8 Technical Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openssh is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.\n\nSecurity Fix(es):\n\n* It was found that the OpenSSH client did not properly enforce the ForwardX11Timeout setting. A malicious or compromised remote X application could possibly use this flaw to establish a trusted connection to the local X server, even if only untrusted X11 forwarding was requested. (CVE-2015-5352)\n\n* A flaw was found in the way OpenSSH handled PAM authentication when using privilege separation. An attacker with valid credentials on the system and able to fully compromise a non-privileged pre-authentication process using a different flaw could use this flaw to authenticate as other users. (CVE-2015-6563)\n\n* A use-after-free flaw was found in OpenSSH. An attacker able to fully compromise a non-privileged pre-authentication process using a different flaw could possibly cause sshd to crash or execute arbitrary code with root privileges. (CVE-2015-6564)\n\n* An access flaw was discovered in OpenSSH; the OpenSSH client did not correctly handle failures to generate authentication cookies for untrusted X11 forwarding. A malicious or compromised remote X application could possibly use this flaw to establish a trusted connection to the local X server, even if only untrusted X11 forwarding was requested. (CVE-2016-1908)\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 6.8 Release Notes and Red Hat Enterprise Linux 6.8 Technical Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0741", "url": "https://access.redhat.com/errata/RHSA-2016:0741" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.8_Release_Notes/index.html", "url": "https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.8_Release_Notes/index.html" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.8_Technical_Notes/index.html", "url": "https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.8_Technical_Notes/index.html" }, { "category": "external", "summary": "1211673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211673" }, { "category": "external", "summary": "1218070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218070" }, { "category": "external", "summary": "1219820", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219820" }, { "category": "external", "summary": "1238231", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1238231" }, { "category": "external", "summary": "1252844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252844" }, { "category": "external", "summary": "1252852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252852" }, { "category": "external", "summary": "1298741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298741" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0741.json" } ], "title": "Red Hat Security Advisory: openssh security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T09:34:21+00:00", "generator": { "date": "2024-11-22T09:34:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:0741", "initial_release_date": "2016-05-10T18:29:45+00:00", "revision_history": [ { "date": "2016-05-10T18:29:45+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-05-10T18:29:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:34:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "product": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "product_id": "pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.9.3-117.el6?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-0:5.3p1-117.el6.x86_64", "product": { "name": "openssh-askpass-0:5.3p1-117.el6.x86_64", "product_id": "openssh-askpass-0:5.3p1-117.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@5.3p1-117.el6?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-ldap-0:5.3p1-117.el6.x86_64", "product": { "name": "openssh-ldap-0:5.3p1-117.el6.x86_64", "product_id": "openssh-ldap-0:5.3p1-117.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-ldap@5.3p1-117.el6?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:5.3p1-117.el6.x86_64", "product": { "name": "openssh-debuginfo-0:5.3p1-117.el6.x86_64", "product_id": "openssh-debuginfo-0:5.3p1-117.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@5.3p1-117.el6?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-0:5.3p1-117.el6.x86_64", "product": { "name": "openssh-0:5.3p1-117.el6.x86_64", "product_id": "openssh-0:5.3p1-117.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@5.3p1-117.el6?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-server-0:5.3p1-117.el6.x86_64", "product": { "name": "openssh-server-0:5.3p1-117.el6.x86_64", "product_id": "openssh-server-0:5.3p1-117.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@5.3p1-117.el6?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-clients-0:5.3p1-117.el6.x86_64", "product": { "name": "openssh-clients-0:5.3p1-117.el6.x86_64", "product_id": "openssh-clients-0:5.3p1-117.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@5.3p1-117.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssh-debuginfo-0:5.3p1-117.el6.i686", "product": { "name": "openssh-debuginfo-0:5.3p1-117.el6.i686", "product_id": "openssh-debuginfo-0:5.3p1-117.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@5.3p1-117.el6?arch=i686" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "product": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "product_id": "pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.9.3-117.el6?arch=i686" } } }, { "category": "product_version", "name": "openssh-ldap-0:5.3p1-117.el6.i686", "product": { "name": "openssh-ldap-0:5.3p1-117.el6.i686", "product_id": "openssh-ldap-0:5.3p1-117.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-ldap@5.3p1-117.el6?arch=i686" } } }, { "category": "product_version", "name": "openssh-server-0:5.3p1-117.el6.i686", "product": { "name": "openssh-server-0:5.3p1-117.el6.i686", "product_id": "openssh-server-0:5.3p1-117.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@5.3p1-117.el6?arch=i686" } } }, { "category": "product_version", "name": "openssh-0:5.3p1-117.el6.i686", "product": { "name": "openssh-0:5.3p1-117.el6.i686", "product_id": "openssh-0:5.3p1-117.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@5.3p1-117.el6?arch=i686" } } }, { "category": "product_version", "name": "openssh-askpass-0:5.3p1-117.el6.i686", "product": { "name": "openssh-askpass-0:5.3p1-117.el6.i686", "product_id": "openssh-askpass-0:5.3p1-117.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@5.3p1-117.el6?arch=i686" } } }, { "category": "product_version", "name": "openssh-clients-0:5.3p1-117.el6.i686", "product": { "name": "openssh-clients-0:5.3p1-117.el6.i686", "product_id": "openssh-clients-0:5.3p1-117.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@5.3p1-117.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssh-clients-0:5.3p1-117.el6.s390x", "product": { "name": "openssh-clients-0:5.3p1-117.el6.s390x", "product_id": "openssh-clients-0:5.3p1-117.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@5.3p1-117.el6?arch=s390x" } } }, { "category": "product_version", "name": "openssh-server-0:5.3p1-117.el6.s390x", "product": { "name": "openssh-server-0:5.3p1-117.el6.s390x", "product_id": "openssh-server-0:5.3p1-117.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@5.3p1-117.el6?arch=s390x" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:5.3p1-117.el6.s390x", "product": { "name": "openssh-debuginfo-0:5.3p1-117.el6.s390x", "product_id": "openssh-debuginfo-0:5.3p1-117.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@5.3p1-117.el6?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-0:5.3p1-117.el6.s390x", "product": { "name": "openssh-askpass-0:5.3p1-117.el6.s390x", "product_id": "openssh-askpass-0:5.3p1-117.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@5.3p1-117.el6?arch=s390x" } } }, { "category": "product_version", "name": "openssh-0:5.3p1-117.el6.s390x", "product": { "name": "openssh-0:5.3p1-117.el6.s390x", "product_id": "openssh-0:5.3p1-117.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@5.3p1-117.el6?arch=s390x" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "product": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "product_id": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.9.3-117.el6?arch=s390x" } } }, { "category": "product_version", "name": "openssh-ldap-0:5.3p1-117.el6.s390x", "product": { "name": "openssh-ldap-0:5.3p1-117.el6.s390x", "product_id": "openssh-ldap-0:5.3p1-117.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-ldap@5.3p1-117.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:5.3p1-117.el6.ppc64", "product": { "name": "openssh-askpass-0:5.3p1-117.el6.ppc64", "product_id": "openssh-askpass-0:5.3p1-117.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@5.3p1-117.el6?arch=ppc64" } } }, { "category": "product_version", "name": "openssh-server-0:5.3p1-117.el6.ppc64", "product": { "name": "openssh-server-0:5.3p1-117.el6.ppc64", "product_id": "openssh-server-0:5.3p1-117.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@5.3p1-117.el6?arch=ppc64" } } }, { "category": "product_version", "name": "openssh-clients-0:5.3p1-117.el6.ppc64", "product": { "name": "openssh-clients-0:5.3p1-117.el6.ppc64", "product_id": "openssh-clients-0:5.3p1-117.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@5.3p1-117.el6?arch=ppc64" } } }, { "category": "product_version", "name": "openssh-0:5.3p1-117.el6.ppc64", "product": { "name": "openssh-0:5.3p1-117.el6.ppc64", "product_id": "openssh-0:5.3p1-117.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@5.3p1-117.el6?arch=ppc64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:5.3p1-117.el6.ppc64", "product": { "name": "openssh-debuginfo-0:5.3p1-117.el6.ppc64", "product_id": "openssh-debuginfo-0:5.3p1-117.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@5.3p1-117.el6?arch=ppc64" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "product": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "product_id": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.9.3-117.el6?arch=ppc64" } } }, { "category": "product_version", "name": "openssh-ldap-0:5.3p1-117.el6.ppc64", "product": { "name": "openssh-ldap-0:5.3p1-117.el6.ppc64", "product_id": "openssh-ldap-0:5.3p1-117.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-ldap@5.3p1-117.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssh-0:5.3p1-117.el6.src", "product": { "name": "openssh-0:5.3p1-117.el6.src", "product_id": "openssh-0:5.3p1-117.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@5.3p1-117.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "product": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "product_id": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.9.3-117.el6?arch=ppc" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:5.3p1-117.el6.ppc", "product": { "name": "openssh-debuginfo-0:5.3p1-117.el6.ppc", "product_id": "openssh-debuginfo-0:5.3p1-117.el6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@5.3p1-117.el6?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "product": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "product_id": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.9.3-117.el6?arch=s390" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:5.3p1-117.el6.s390", "product": { "name": "openssh-debuginfo-0:5.3p1-117.el6.s390", "product_id": "openssh-debuginfo-0:5.3p1-117.el6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@5.3p1-117.el6?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-0:5.3p1-117.el6.src" }, "product_reference": "openssh-0:5.3p1-117.el6.src", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-askpass-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-askpass-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-askpass-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-askpass-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-clients-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-clients-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-clients-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-clients-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-ldap-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-ldap-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-ldap-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-ldap-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-server-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-server-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-server-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-server-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-server-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-server-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-server-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-server-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-0:5.3p1-117.el6.src" }, "product_reference": "openssh-0:5.3p1-117.el6.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-askpass-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-askpass-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-askpass-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-askpass-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-clients-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-clients-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-clients-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-clients-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-debuginfo-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-debuginfo-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-ldap-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-ldap-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-ldap-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-ldap-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-server-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-server-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-server-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-server-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-server-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-server-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-server-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-server-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.i686" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-0:5.3p1-117.el6.src" }, "product_reference": "openssh-0:5.3p1-117.el6.src", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-server-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-server-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-server-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-server-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-0:5.3p1-117.el6.src" }, "product_reference": "openssh-0:5.3p1-117.el6.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-clients-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-clients-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-clients-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-clients-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-server-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-server-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-server-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-server-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-server-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-server-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-server-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-server-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.i686" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-0:5.3p1-117.el6.src" }, "product_reference": "openssh-0:5.3p1-117.el6.src", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-askpass-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-askpass-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-askpass-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-askpass-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-clients-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-clients-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-clients-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-clients-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-ldap-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-ldap-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-ldap-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-ldap-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-server-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-server-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-server-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-server-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-server-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-server-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-server-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-server-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-0:5.3p1-117.el6.src" }, "product_reference": "openssh-0:5.3p1-117.el6.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-askpass-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-askpass-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-askpass-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-askpass-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-clients-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-clients-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-clients-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-clients-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-debuginfo-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-debuginfo-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-ldap-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-ldap-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-ldap-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-ldap-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-server-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-server-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-server-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-server-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-server-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-server-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-server-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-server-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.i686" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-0:5.3p1-117.el6.src" }, "product_reference": "openssh-0:5.3p1-117.el6.src", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-server-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-server-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-server-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-server-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-server-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-server-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-server-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-server-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-0:5.3p1-117.el6.src" }, "product_reference": "openssh-0:5.3p1-117.el6.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-askpass-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-askpass-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-askpass-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-askpass-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-askpass-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-clients-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-clients-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-clients-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-clients-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-clients-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-debuginfo-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-ldap-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-ldap-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-ldap-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-ldap-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-ldap-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-server-0:5.3p1-117.el6.i686" }, "product_reference": "openssh-server-0:5.3p1-117.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-server-0:5.3p1-117.el6.ppc64" }, "product_reference": "openssh-server-0:5.3p1-117.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-server-0:5.3p1-117.el6.s390x" }, "product_reference": "openssh-server-0:5.3p1-117.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-117.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-server-0:5.3p1-117.el6.x86_64" }, "product_reference": "openssh-server-0:5.3p1-117.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.i686" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-5352", "discovery_date": "2015-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1238231" } ], "notes": [ { "category": "description", "text": "It was found that the OpenSSH client did not properly enforce the ForwardX11Timeout setting. A malicious or compromised remote X application could possibly use this flaw to establish a trusted connection to the local X server, even if only untrusted X11 forwarding was requested.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssh: XSECURITY restrictions bypass under certain conditions in ssh(1)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of openssh package as shipped with Red Hat Enterprise Linux 7. This issue affects the version of openssh package as shipped with Red Hat Enterprise Linux 5 and 6.\n\nRed Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:openssh-0:5.3p1-117.el6.i686", "6Client-optional:openssh-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-0:5.3p1-117.el6.src", "6Client-optional:openssh-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Client-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-server-0:5.3p1-117.el6.i686", "6Client-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Client:openssh-0:5.3p1-117.el6.i686", "6Client:openssh-0:5.3p1-117.el6.ppc64", "6Client:openssh-0:5.3p1-117.el6.s390x", "6Client:openssh-0:5.3p1-117.el6.src", "6Client:openssh-0:5.3p1-117.el6.x86_64", "6Client:openssh-askpass-0:5.3p1-117.el6.i686", "6Client:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Client:openssh-askpass-0:5.3p1-117.el6.s390x", "6Client:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Client:openssh-clients-0:5.3p1-117.el6.i686", "6Client:openssh-clients-0:5.3p1-117.el6.ppc64", "6Client:openssh-clients-0:5.3p1-117.el6.s390x", "6Client:openssh-clients-0:5.3p1-117.el6.x86_64", "6Client:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Client:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Client:openssh-ldap-0:5.3p1-117.el6.i686", "6Client:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Client:openssh-ldap-0:5.3p1-117.el6.s390x", "6Client:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Client:openssh-server-0:5.3p1-117.el6.i686", "6Client:openssh-server-0:5.3p1-117.el6.ppc64", "6Client:openssh-server-0:5.3p1-117.el6.s390x", "6Client:openssh-server-0:5.3p1-117.el6.x86_64", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.src", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6ComputeNode:openssh-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-0:5.3p1-117.el6.src", "6ComputeNode:openssh-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-server-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-server-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-server-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-server-0:5.3p1-117.el6.x86_64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Server-optional:openssh-0:5.3p1-117.el6.i686", "6Server-optional:openssh-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-0:5.3p1-117.el6.src", "6Server-optional:openssh-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Server-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-server-0:5.3p1-117.el6.i686", "6Server-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Server:openssh-0:5.3p1-117.el6.i686", "6Server:openssh-0:5.3p1-117.el6.ppc64", "6Server:openssh-0:5.3p1-117.el6.s390x", "6Server:openssh-0:5.3p1-117.el6.src", "6Server:openssh-0:5.3p1-117.el6.x86_64", "6Server:openssh-askpass-0:5.3p1-117.el6.i686", "6Server:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Server:openssh-askpass-0:5.3p1-117.el6.s390x", "6Server:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Server:openssh-clients-0:5.3p1-117.el6.i686", "6Server:openssh-clients-0:5.3p1-117.el6.ppc64", "6Server:openssh-clients-0:5.3p1-117.el6.s390x", "6Server:openssh-clients-0:5.3p1-117.el6.x86_64", "6Server:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Server:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Server:openssh-ldap-0:5.3p1-117.el6.i686", "6Server:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Server:openssh-ldap-0:5.3p1-117.el6.s390x", "6Server:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Server:openssh-server-0:5.3p1-117.el6.i686", "6Server:openssh-server-0:5.3p1-117.el6.ppc64", "6Server:openssh-server-0:5.3p1-117.el6.s390x", "6Server:openssh-server-0:5.3p1-117.el6.x86_64", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Workstation-optional:openssh-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-0:5.3p1-117.el6.src", "6Workstation-optional:openssh-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Workstation:openssh-0:5.3p1-117.el6.i686", "6Workstation:openssh-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-0:5.3p1-117.el6.s390x", "6Workstation:openssh-0:5.3p1-117.el6.src", "6Workstation:openssh-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-askpass-0:5.3p1-117.el6.i686", "6Workstation:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-askpass-0:5.3p1-117.el6.s390x", "6Workstation:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-clients-0:5.3p1-117.el6.i686", "6Workstation:openssh-clients-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-clients-0:5.3p1-117.el6.s390x", "6Workstation:openssh-clients-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-ldap-0:5.3p1-117.el6.i686", "6Workstation:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-ldap-0:5.3p1-117.el6.s390x", "6Workstation:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-server-0:5.3p1-117.el6.i686", "6Workstation:openssh-server-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-server-0:5.3p1-117.el6.s390x", "6Workstation:openssh-server-0:5.3p1-117.el6.x86_64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-5352" }, { "category": "external", "summary": "RHBZ#1238231", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1238231" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-5352", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5352" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5352", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5352" }, { "category": "external", "summary": "https://thejh.net/written-stuff/openssh-6.8-xsecurity", "url": "https://thejh.net/written-stuff/openssh-6.8-xsecurity" } ], "release_date": "2015-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-10T18:29:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the OpenSSH server daemon (sshd) will be restarted automatically.", "product_ids": [ "6Client-optional:openssh-0:5.3p1-117.el6.i686", "6Client-optional:openssh-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-0:5.3p1-117.el6.src", "6Client-optional:openssh-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Client-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-server-0:5.3p1-117.el6.i686", "6Client-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Client:openssh-0:5.3p1-117.el6.i686", "6Client:openssh-0:5.3p1-117.el6.ppc64", "6Client:openssh-0:5.3p1-117.el6.s390x", "6Client:openssh-0:5.3p1-117.el6.src", "6Client:openssh-0:5.3p1-117.el6.x86_64", "6Client:openssh-askpass-0:5.3p1-117.el6.i686", "6Client:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Client:openssh-askpass-0:5.3p1-117.el6.s390x", "6Client:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Client:openssh-clients-0:5.3p1-117.el6.i686", "6Client:openssh-clients-0:5.3p1-117.el6.ppc64", "6Client:openssh-clients-0:5.3p1-117.el6.s390x", "6Client:openssh-clients-0:5.3p1-117.el6.x86_64", "6Client:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Client:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Client:openssh-ldap-0:5.3p1-117.el6.i686", "6Client:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Client:openssh-ldap-0:5.3p1-117.el6.s390x", "6Client:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Client:openssh-server-0:5.3p1-117.el6.i686", "6Client:openssh-server-0:5.3p1-117.el6.ppc64", "6Client:openssh-server-0:5.3p1-117.el6.s390x", "6Client:openssh-server-0:5.3p1-117.el6.x86_64", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.src", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6ComputeNode:openssh-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-0:5.3p1-117.el6.src", "6ComputeNode:openssh-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-server-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-server-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-server-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-server-0:5.3p1-117.el6.x86_64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Server-optional:openssh-0:5.3p1-117.el6.i686", "6Server-optional:openssh-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-0:5.3p1-117.el6.src", "6Server-optional:openssh-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Server-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-server-0:5.3p1-117.el6.i686", "6Server-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Server:openssh-0:5.3p1-117.el6.i686", "6Server:openssh-0:5.3p1-117.el6.ppc64", "6Server:openssh-0:5.3p1-117.el6.s390x", "6Server:openssh-0:5.3p1-117.el6.src", "6Server:openssh-0:5.3p1-117.el6.x86_64", "6Server:openssh-askpass-0:5.3p1-117.el6.i686", "6Server:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Server:openssh-askpass-0:5.3p1-117.el6.s390x", "6Server:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Server:openssh-clients-0:5.3p1-117.el6.i686", "6Server:openssh-clients-0:5.3p1-117.el6.ppc64", "6Server:openssh-clients-0:5.3p1-117.el6.s390x", "6Server:openssh-clients-0:5.3p1-117.el6.x86_64", "6Server:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Server:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Server:openssh-ldap-0:5.3p1-117.el6.i686", "6Server:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Server:openssh-ldap-0:5.3p1-117.el6.s390x", "6Server:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Server:openssh-server-0:5.3p1-117.el6.i686", "6Server:openssh-server-0:5.3p1-117.el6.ppc64", "6Server:openssh-server-0:5.3p1-117.el6.s390x", "6Server:openssh-server-0:5.3p1-117.el6.x86_64", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Workstation-optional:openssh-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-0:5.3p1-117.el6.src", "6Workstation-optional:openssh-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Workstation:openssh-0:5.3p1-117.el6.i686", "6Workstation:openssh-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-0:5.3p1-117.el6.s390x", "6Workstation:openssh-0:5.3p1-117.el6.src", "6Workstation:openssh-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-askpass-0:5.3p1-117.el6.i686", "6Workstation:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-askpass-0:5.3p1-117.el6.s390x", "6Workstation:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-clients-0:5.3p1-117.el6.i686", "6Workstation:openssh-clients-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-clients-0:5.3p1-117.el6.s390x", "6Workstation:openssh-clients-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-ldap-0:5.3p1-117.el6.i686", "6Workstation:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-ldap-0:5.3p1-117.el6.s390x", "6Workstation:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-server-0:5.3p1-117.el6.i686", "6Workstation:openssh-server-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-server-0:5.3p1-117.el6.s390x", "6Workstation:openssh-server-0:5.3p1-117.el6.x86_64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0741" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:P", "version": "2.0" }, "products": [ "6Client-optional:openssh-0:5.3p1-117.el6.i686", "6Client-optional:openssh-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-0:5.3p1-117.el6.src", "6Client-optional:openssh-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Client-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-server-0:5.3p1-117.el6.i686", "6Client-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Client:openssh-0:5.3p1-117.el6.i686", "6Client:openssh-0:5.3p1-117.el6.ppc64", "6Client:openssh-0:5.3p1-117.el6.s390x", "6Client:openssh-0:5.3p1-117.el6.src", "6Client:openssh-0:5.3p1-117.el6.x86_64", "6Client:openssh-askpass-0:5.3p1-117.el6.i686", "6Client:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Client:openssh-askpass-0:5.3p1-117.el6.s390x", "6Client:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Client:openssh-clients-0:5.3p1-117.el6.i686", "6Client:openssh-clients-0:5.3p1-117.el6.ppc64", "6Client:openssh-clients-0:5.3p1-117.el6.s390x", "6Client:openssh-clients-0:5.3p1-117.el6.x86_64", "6Client:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Client:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Client:openssh-ldap-0:5.3p1-117.el6.i686", "6Client:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Client:openssh-ldap-0:5.3p1-117.el6.s390x", "6Client:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Client:openssh-server-0:5.3p1-117.el6.i686", "6Client:openssh-server-0:5.3p1-117.el6.ppc64", "6Client:openssh-server-0:5.3p1-117.el6.s390x", "6Client:openssh-server-0:5.3p1-117.el6.x86_64", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.src", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6ComputeNode:openssh-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-0:5.3p1-117.el6.src", "6ComputeNode:openssh-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-server-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-server-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-server-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-server-0:5.3p1-117.el6.x86_64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Server-optional:openssh-0:5.3p1-117.el6.i686", "6Server-optional:openssh-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-0:5.3p1-117.el6.src", "6Server-optional:openssh-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Server-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-server-0:5.3p1-117.el6.i686", "6Server-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Server:openssh-0:5.3p1-117.el6.i686", "6Server:openssh-0:5.3p1-117.el6.ppc64", "6Server:openssh-0:5.3p1-117.el6.s390x", "6Server:openssh-0:5.3p1-117.el6.src", "6Server:openssh-0:5.3p1-117.el6.x86_64", "6Server:openssh-askpass-0:5.3p1-117.el6.i686", "6Server:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Server:openssh-askpass-0:5.3p1-117.el6.s390x", "6Server:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Server:openssh-clients-0:5.3p1-117.el6.i686", "6Server:openssh-clients-0:5.3p1-117.el6.ppc64", "6Server:openssh-clients-0:5.3p1-117.el6.s390x", "6Server:openssh-clients-0:5.3p1-117.el6.x86_64", "6Server:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Server:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Server:openssh-ldap-0:5.3p1-117.el6.i686", "6Server:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Server:openssh-ldap-0:5.3p1-117.el6.s390x", "6Server:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Server:openssh-server-0:5.3p1-117.el6.i686", "6Server:openssh-server-0:5.3p1-117.el6.ppc64", "6Server:openssh-server-0:5.3p1-117.el6.s390x", "6Server:openssh-server-0:5.3p1-117.el6.x86_64", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Workstation-optional:openssh-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-0:5.3p1-117.el6.src", "6Workstation-optional:openssh-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Workstation:openssh-0:5.3p1-117.el6.i686", "6Workstation:openssh-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-0:5.3p1-117.el6.s390x", "6Workstation:openssh-0:5.3p1-117.el6.src", "6Workstation:openssh-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-askpass-0:5.3p1-117.el6.i686", "6Workstation:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-askpass-0:5.3p1-117.el6.s390x", "6Workstation:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-clients-0:5.3p1-117.el6.i686", "6Workstation:openssh-clients-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-clients-0:5.3p1-117.el6.s390x", "6Workstation:openssh-clients-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-ldap-0:5.3p1-117.el6.i686", "6Workstation:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-ldap-0:5.3p1-117.el6.s390x", "6Workstation:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-server-0:5.3p1-117.el6.i686", "6Workstation:openssh-server-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-server-0:5.3p1-117.el6.s390x", "6Workstation:openssh-server-0:5.3p1-117.el6.x86_64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssh: XSECURITY restrictions bypass under certain conditions in ssh(1)" }, { "cve": "CVE-2015-6563", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "discovery_date": "2015-08-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1252844" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way OpenSSH handled PAM authentication when using privilege separation. An attacker with valid credentials on the system and able to fully compromise a non-privileged pre-authentication process using a different flaw could use this flaw to authenticate as other users.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssh: Privilege separation weakness related to PAM support", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:openssh-0:5.3p1-117.el6.i686", "6Client-optional:openssh-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-0:5.3p1-117.el6.src", "6Client-optional:openssh-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Client-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-server-0:5.3p1-117.el6.i686", "6Client-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Client:openssh-0:5.3p1-117.el6.i686", "6Client:openssh-0:5.3p1-117.el6.ppc64", "6Client:openssh-0:5.3p1-117.el6.s390x", "6Client:openssh-0:5.3p1-117.el6.src", "6Client:openssh-0:5.3p1-117.el6.x86_64", "6Client:openssh-askpass-0:5.3p1-117.el6.i686", "6Client:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Client:openssh-askpass-0:5.3p1-117.el6.s390x", "6Client:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Client:openssh-clients-0:5.3p1-117.el6.i686", "6Client:openssh-clients-0:5.3p1-117.el6.ppc64", "6Client:openssh-clients-0:5.3p1-117.el6.s390x", "6Client:openssh-clients-0:5.3p1-117.el6.x86_64", "6Client:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Client:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Client:openssh-ldap-0:5.3p1-117.el6.i686", "6Client:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Client:openssh-ldap-0:5.3p1-117.el6.s390x", "6Client:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Client:openssh-server-0:5.3p1-117.el6.i686", "6Client:openssh-server-0:5.3p1-117.el6.ppc64", "6Client:openssh-server-0:5.3p1-117.el6.s390x", "6Client:openssh-server-0:5.3p1-117.el6.x86_64", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.src", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6ComputeNode:openssh-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-0:5.3p1-117.el6.src", "6ComputeNode:openssh-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-server-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-server-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-server-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-server-0:5.3p1-117.el6.x86_64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Server-optional:openssh-0:5.3p1-117.el6.i686", "6Server-optional:openssh-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-0:5.3p1-117.el6.src", "6Server-optional:openssh-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Server-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-server-0:5.3p1-117.el6.i686", "6Server-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Server:openssh-0:5.3p1-117.el6.i686", "6Server:openssh-0:5.3p1-117.el6.ppc64", "6Server:openssh-0:5.3p1-117.el6.s390x", "6Server:openssh-0:5.3p1-117.el6.src", "6Server:openssh-0:5.3p1-117.el6.x86_64", "6Server:openssh-askpass-0:5.3p1-117.el6.i686", "6Server:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Server:openssh-askpass-0:5.3p1-117.el6.s390x", "6Server:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Server:openssh-clients-0:5.3p1-117.el6.i686", "6Server:openssh-clients-0:5.3p1-117.el6.ppc64", "6Server:openssh-clients-0:5.3p1-117.el6.s390x", "6Server:openssh-clients-0:5.3p1-117.el6.x86_64", "6Server:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Server:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Server:openssh-ldap-0:5.3p1-117.el6.i686", "6Server:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Server:openssh-ldap-0:5.3p1-117.el6.s390x", "6Server:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Server:openssh-server-0:5.3p1-117.el6.i686", "6Server:openssh-server-0:5.3p1-117.el6.ppc64", "6Server:openssh-server-0:5.3p1-117.el6.s390x", "6Server:openssh-server-0:5.3p1-117.el6.x86_64", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Workstation-optional:openssh-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-0:5.3p1-117.el6.src", "6Workstation-optional:openssh-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Workstation:openssh-0:5.3p1-117.el6.i686", "6Workstation:openssh-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-0:5.3p1-117.el6.s390x", "6Workstation:openssh-0:5.3p1-117.el6.src", "6Workstation:openssh-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-askpass-0:5.3p1-117.el6.i686", "6Workstation:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-askpass-0:5.3p1-117.el6.s390x", "6Workstation:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-clients-0:5.3p1-117.el6.i686", "6Workstation:openssh-clients-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-clients-0:5.3p1-117.el6.s390x", "6Workstation:openssh-clients-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-ldap-0:5.3p1-117.el6.i686", "6Workstation:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-ldap-0:5.3p1-117.el6.s390x", "6Workstation:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-server-0:5.3p1-117.el6.i686", "6Workstation:openssh-server-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-server-0:5.3p1-117.el6.s390x", "6Workstation:openssh-server-0:5.3p1-117.el6.x86_64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-6563" }, { "category": "external", "summary": "RHBZ#1252844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252844" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-6563", "url": "https://www.cve.org/CVERecord?id=CVE-2015-6563" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-6563", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6563" }, { "category": "external", "summary": "http://www.openssh.com/txt/release-7.0", "url": "http://www.openssh.com/txt/release-7.0" } ], "release_date": "2015-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-10T18:29:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the OpenSSH server daemon (sshd) will be restarted automatically.", "product_ids": [ "6Client-optional:openssh-0:5.3p1-117.el6.i686", "6Client-optional:openssh-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-0:5.3p1-117.el6.src", "6Client-optional:openssh-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Client-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-server-0:5.3p1-117.el6.i686", "6Client-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Client:openssh-0:5.3p1-117.el6.i686", "6Client:openssh-0:5.3p1-117.el6.ppc64", "6Client:openssh-0:5.3p1-117.el6.s390x", "6Client:openssh-0:5.3p1-117.el6.src", "6Client:openssh-0:5.3p1-117.el6.x86_64", "6Client:openssh-askpass-0:5.3p1-117.el6.i686", "6Client:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Client:openssh-askpass-0:5.3p1-117.el6.s390x", "6Client:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Client:openssh-clients-0:5.3p1-117.el6.i686", "6Client:openssh-clients-0:5.3p1-117.el6.ppc64", "6Client:openssh-clients-0:5.3p1-117.el6.s390x", "6Client:openssh-clients-0:5.3p1-117.el6.x86_64", "6Client:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Client:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Client:openssh-ldap-0:5.3p1-117.el6.i686", "6Client:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Client:openssh-ldap-0:5.3p1-117.el6.s390x", "6Client:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Client:openssh-server-0:5.3p1-117.el6.i686", "6Client:openssh-server-0:5.3p1-117.el6.ppc64", "6Client:openssh-server-0:5.3p1-117.el6.s390x", "6Client:openssh-server-0:5.3p1-117.el6.x86_64", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.src", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6ComputeNode:openssh-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-0:5.3p1-117.el6.src", "6ComputeNode:openssh-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-server-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-server-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-server-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-server-0:5.3p1-117.el6.x86_64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Server-optional:openssh-0:5.3p1-117.el6.i686", "6Server-optional:openssh-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-0:5.3p1-117.el6.src", "6Server-optional:openssh-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Server-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-server-0:5.3p1-117.el6.i686", "6Server-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Server:openssh-0:5.3p1-117.el6.i686", "6Server:openssh-0:5.3p1-117.el6.ppc64", "6Server:openssh-0:5.3p1-117.el6.s390x", "6Server:openssh-0:5.3p1-117.el6.src", "6Server:openssh-0:5.3p1-117.el6.x86_64", "6Server:openssh-askpass-0:5.3p1-117.el6.i686", "6Server:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Server:openssh-askpass-0:5.3p1-117.el6.s390x", "6Server:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Server:openssh-clients-0:5.3p1-117.el6.i686", "6Server:openssh-clients-0:5.3p1-117.el6.ppc64", "6Server:openssh-clients-0:5.3p1-117.el6.s390x", "6Server:openssh-clients-0:5.3p1-117.el6.x86_64", "6Server:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Server:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Server:openssh-ldap-0:5.3p1-117.el6.i686", "6Server:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Server:openssh-ldap-0:5.3p1-117.el6.s390x", "6Server:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Server:openssh-server-0:5.3p1-117.el6.i686", "6Server:openssh-server-0:5.3p1-117.el6.ppc64", "6Server:openssh-server-0:5.3p1-117.el6.s390x", "6Server:openssh-server-0:5.3p1-117.el6.x86_64", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Workstation-optional:openssh-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-0:5.3p1-117.el6.src", "6Workstation-optional:openssh-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Workstation:openssh-0:5.3p1-117.el6.i686", "6Workstation:openssh-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-0:5.3p1-117.el6.s390x", "6Workstation:openssh-0:5.3p1-117.el6.src", "6Workstation:openssh-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-askpass-0:5.3p1-117.el6.i686", "6Workstation:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-askpass-0:5.3p1-117.el6.s390x", "6Workstation:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-clients-0:5.3p1-117.el6.i686", "6Workstation:openssh-clients-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-clients-0:5.3p1-117.el6.s390x", "6Workstation:openssh-clients-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-ldap-0:5.3p1-117.el6.i686", "6Workstation:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-ldap-0:5.3p1-117.el6.s390x", "6Workstation:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-server-0:5.3p1-117.el6.i686", "6Workstation:openssh-server-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-server-0:5.3p1-117.el6.s390x", "6Workstation:openssh-server-0:5.3p1-117.el6.x86_64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0741" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client-optional:openssh-0:5.3p1-117.el6.i686", "6Client-optional:openssh-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-0:5.3p1-117.el6.src", "6Client-optional:openssh-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Client-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-server-0:5.3p1-117.el6.i686", "6Client-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Client:openssh-0:5.3p1-117.el6.i686", "6Client:openssh-0:5.3p1-117.el6.ppc64", "6Client:openssh-0:5.3p1-117.el6.s390x", "6Client:openssh-0:5.3p1-117.el6.src", "6Client:openssh-0:5.3p1-117.el6.x86_64", "6Client:openssh-askpass-0:5.3p1-117.el6.i686", "6Client:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Client:openssh-askpass-0:5.3p1-117.el6.s390x", "6Client:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Client:openssh-clients-0:5.3p1-117.el6.i686", "6Client:openssh-clients-0:5.3p1-117.el6.ppc64", "6Client:openssh-clients-0:5.3p1-117.el6.s390x", "6Client:openssh-clients-0:5.3p1-117.el6.x86_64", "6Client:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Client:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Client:openssh-ldap-0:5.3p1-117.el6.i686", "6Client:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Client:openssh-ldap-0:5.3p1-117.el6.s390x", "6Client:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Client:openssh-server-0:5.3p1-117.el6.i686", "6Client:openssh-server-0:5.3p1-117.el6.ppc64", "6Client:openssh-server-0:5.3p1-117.el6.s390x", "6Client:openssh-server-0:5.3p1-117.el6.x86_64", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.src", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6ComputeNode:openssh-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-0:5.3p1-117.el6.src", "6ComputeNode:openssh-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-server-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-server-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-server-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-server-0:5.3p1-117.el6.x86_64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Server-optional:openssh-0:5.3p1-117.el6.i686", "6Server-optional:openssh-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-0:5.3p1-117.el6.src", "6Server-optional:openssh-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Server-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-server-0:5.3p1-117.el6.i686", "6Server-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Server:openssh-0:5.3p1-117.el6.i686", "6Server:openssh-0:5.3p1-117.el6.ppc64", "6Server:openssh-0:5.3p1-117.el6.s390x", "6Server:openssh-0:5.3p1-117.el6.src", "6Server:openssh-0:5.3p1-117.el6.x86_64", "6Server:openssh-askpass-0:5.3p1-117.el6.i686", "6Server:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Server:openssh-askpass-0:5.3p1-117.el6.s390x", "6Server:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Server:openssh-clients-0:5.3p1-117.el6.i686", "6Server:openssh-clients-0:5.3p1-117.el6.ppc64", "6Server:openssh-clients-0:5.3p1-117.el6.s390x", "6Server:openssh-clients-0:5.3p1-117.el6.x86_64", "6Server:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Server:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Server:openssh-ldap-0:5.3p1-117.el6.i686", "6Server:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Server:openssh-ldap-0:5.3p1-117.el6.s390x", "6Server:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Server:openssh-server-0:5.3p1-117.el6.i686", "6Server:openssh-server-0:5.3p1-117.el6.ppc64", "6Server:openssh-server-0:5.3p1-117.el6.s390x", "6Server:openssh-server-0:5.3p1-117.el6.x86_64", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Workstation-optional:openssh-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-0:5.3p1-117.el6.src", "6Workstation-optional:openssh-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Workstation:openssh-0:5.3p1-117.el6.i686", "6Workstation:openssh-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-0:5.3p1-117.el6.s390x", "6Workstation:openssh-0:5.3p1-117.el6.src", "6Workstation:openssh-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-askpass-0:5.3p1-117.el6.i686", "6Workstation:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-askpass-0:5.3p1-117.el6.s390x", "6Workstation:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-clients-0:5.3p1-117.el6.i686", "6Workstation:openssh-clients-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-clients-0:5.3p1-117.el6.s390x", "6Workstation:openssh-clients-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-ldap-0:5.3p1-117.el6.i686", "6Workstation:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-ldap-0:5.3p1-117.el6.s390x", "6Workstation:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-server-0:5.3p1-117.el6.i686", "6Workstation:openssh-server-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-server-0:5.3p1-117.el6.s390x", "6Workstation:openssh-server-0:5.3p1-117.el6.x86_64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssh: Privilege separation weakness related to PAM support" }, { "cve": "CVE-2015-6564", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2015-08-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1252852" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in OpenSSH. An attacker able to fully compromise a non-privileged pre-authentication process using a different flaw could possibly cause sshd to crash or execute arbitrary code with root privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssh: Use-after-free bug related to PAM support", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:openssh-0:5.3p1-117.el6.i686", "6Client-optional:openssh-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-0:5.3p1-117.el6.src", "6Client-optional:openssh-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Client-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-server-0:5.3p1-117.el6.i686", "6Client-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Client:openssh-0:5.3p1-117.el6.i686", "6Client:openssh-0:5.3p1-117.el6.ppc64", "6Client:openssh-0:5.3p1-117.el6.s390x", "6Client:openssh-0:5.3p1-117.el6.src", "6Client:openssh-0:5.3p1-117.el6.x86_64", "6Client:openssh-askpass-0:5.3p1-117.el6.i686", "6Client:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Client:openssh-askpass-0:5.3p1-117.el6.s390x", "6Client:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Client:openssh-clients-0:5.3p1-117.el6.i686", "6Client:openssh-clients-0:5.3p1-117.el6.ppc64", "6Client:openssh-clients-0:5.3p1-117.el6.s390x", "6Client:openssh-clients-0:5.3p1-117.el6.x86_64", "6Client:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Client:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Client:openssh-ldap-0:5.3p1-117.el6.i686", "6Client:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Client:openssh-ldap-0:5.3p1-117.el6.s390x", "6Client:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Client:openssh-server-0:5.3p1-117.el6.i686", "6Client:openssh-server-0:5.3p1-117.el6.ppc64", "6Client:openssh-server-0:5.3p1-117.el6.s390x", "6Client:openssh-server-0:5.3p1-117.el6.x86_64", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.src", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6ComputeNode:openssh-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-0:5.3p1-117.el6.src", "6ComputeNode:openssh-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-server-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-server-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-server-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-server-0:5.3p1-117.el6.x86_64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Server-optional:openssh-0:5.3p1-117.el6.i686", "6Server-optional:openssh-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-0:5.3p1-117.el6.src", "6Server-optional:openssh-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Server-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-server-0:5.3p1-117.el6.i686", "6Server-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Server:openssh-0:5.3p1-117.el6.i686", "6Server:openssh-0:5.3p1-117.el6.ppc64", "6Server:openssh-0:5.3p1-117.el6.s390x", "6Server:openssh-0:5.3p1-117.el6.src", "6Server:openssh-0:5.3p1-117.el6.x86_64", "6Server:openssh-askpass-0:5.3p1-117.el6.i686", "6Server:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Server:openssh-askpass-0:5.3p1-117.el6.s390x", "6Server:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Server:openssh-clients-0:5.3p1-117.el6.i686", "6Server:openssh-clients-0:5.3p1-117.el6.ppc64", "6Server:openssh-clients-0:5.3p1-117.el6.s390x", "6Server:openssh-clients-0:5.3p1-117.el6.x86_64", "6Server:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Server:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Server:openssh-ldap-0:5.3p1-117.el6.i686", "6Server:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Server:openssh-ldap-0:5.3p1-117.el6.s390x", "6Server:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Server:openssh-server-0:5.3p1-117.el6.i686", "6Server:openssh-server-0:5.3p1-117.el6.ppc64", "6Server:openssh-server-0:5.3p1-117.el6.s390x", "6Server:openssh-server-0:5.3p1-117.el6.x86_64", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Workstation-optional:openssh-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-0:5.3p1-117.el6.src", "6Workstation-optional:openssh-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Workstation:openssh-0:5.3p1-117.el6.i686", "6Workstation:openssh-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-0:5.3p1-117.el6.s390x", "6Workstation:openssh-0:5.3p1-117.el6.src", "6Workstation:openssh-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-askpass-0:5.3p1-117.el6.i686", "6Workstation:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-askpass-0:5.3p1-117.el6.s390x", "6Workstation:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-clients-0:5.3p1-117.el6.i686", "6Workstation:openssh-clients-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-clients-0:5.3p1-117.el6.s390x", "6Workstation:openssh-clients-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-ldap-0:5.3p1-117.el6.i686", "6Workstation:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-ldap-0:5.3p1-117.el6.s390x", "6Workstation:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-server-0:5.3p1-117.el6.i686", "6Workstation:openssh-server-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-server-0:5.3p1-117.el6.s390x", "6Workstation:openssh-server-0:5.3p1-117.el6.x86_64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-6564" }, { "category": "external", "summary": "RHBZ#1252852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252852" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-6564", "url": "https://www.cve.org/CVERecord?id=CVE-2015-6564" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-6564", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6564" }, { "category": "external", "summary": "http://www.openssh.com/txt/release-7.0", "url": "http://www.openssh.com/txt/release-7.0" } ], "release_date": "2015-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-10T18:29:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the OpenSSH server daemon (sshd) will be restarted automatically.", "product_ids": [ "6Client-optional:openssh-0:5.3p1-117.el6.i686", "6Client-optional:openssh-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-0:5.3p1-117.el6.src", "6Client-optional:openssh-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Client-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-server-0:5.3p1-117.el6.i686", "6Client-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Client:openssh-0:5.3p1-117.el6.i686", "6Client:openssh-0:5.3p1-117.el6.ppc64", "6Client:openssh-0:5.3p1-117.el6.s390x", "6Client:openssh-0:5.3p1-117.el6.src", "6Client:openssh-0:5.3p1-117.el6.x86_64", "6Client:openssh-askpass-0:5.3p1-117.el6.i686", "6Client:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Client:openssh-askpass-0:5.3p1-117.el6.s390x", "6Client:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Client:openssh-clients-0:5.3p1-117.el6.i686", "6Client:openssh-clients-0:5.3p1-117.el6.ppc64", "6Client:openssh-clients-0:5.3p1-117.el6.s390x", "6Client:openssh-clients-0:5.3p1-117.el6.x86_64", "6Client:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Client:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Client:openssh-ldap-0:5.3p1-117.el6.i686", "6Client:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Client:openssh-ldap-0:5.3p1-117.el6.s390x", "6Client:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Client:openssh-server-0:5.3p1-117.el6.i686", "6Client:openssh-server-0:5.3p1-117.el6.ppc64", "6Client:openssh-server-0:5.3p1-117.el6.s390x", "6Client:openssh-server-0:5.3p1-117.el6.x86_64", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.src", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6ComputeNode:openssh-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-0:5.3p1-117.el6.src", "6ComputeNode:openssh-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-server-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-server-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-server-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-server-0:5.3p1-117.el6.x86_64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Server-optional:openssh-0:5.3p1-117.el6.i686", "6Server-optional:openssh-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-0:5.3p1-117.el6.src", "6Server-optional:openssh-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Server-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-server-0:5.3p1-117.el6.i686", "6Server-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Server:openssh-0:5.3p1-117.el6.i686", "6Server:openssh-0:5.3p1-117.el6.ppc64", "6Server:openssh-0:5.3p1-117.el6.s390x", "6Server:openssh-0:5.3p1-117.el6.src", "6Server:openssh-0:5.3p1-117.el6.x86_64", "6Server:openssh-askpass-0:5.3p1-117.el6.i686", "6Server:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Server:openssh-askpass-0:5.3p1-117.el6.s390x", "6Server:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Server:openssh-clients-0:5.3p1-117.el6.i686", "6Server:openssh-clients-0:5.3p1-117.el6.ppc64", "6Server:openssh-clients-0:5.3p1-117.el6.s390x", "6Server:openssh-clients-0:5.3p1-117.el6.x86_64", "6Server:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Server:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Server:openssh-ldap-0:5.3p1-117.el6.i686", "6Server:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Server:openssh-ldap-0:5.3p1-117.el6.s390x", "6Server:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Server:openssh-server-0:5.3p1-117.el6.i686", "6Server:openssh-server-0:5.3p1-117.el6.ppc64", "6Server:openssh-server-0:5.3p1-117.el6.s390x", "6Server:openssh-server-0:5.3p1-117.el6.x86_64", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Workstation-optional:openssh-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-0:5.3p1-117.el6.src", "6Workstation-optional:openssh-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Workstation:openssh-0:5.3p1-117.el6.i686", "6Workstation:openssh-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-0:5.3p1-117.el6.s390x", "6Workstation:openssh-0:5.3p1-117.el6.src", "6Workstation:openssh-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-askpass-0:5.3p1-117.el6.i686", "6Workstation:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-askpass-0:5.3p1-117.el6.s390x", "6Workstation:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-clients-0:5.3p1-117.el6.i686", "6Workstation:openssh-clients-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-clients-0:5.3p1-117.el6.s390x", "6Workstation:openssh-clients-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-ldap-0:5.3p1-117.el6.i686", "6Workstation:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-ldap-0:5.3p1-117.el6.s390x", "6Workstation:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-server-0:5.3p1-117.el6.i686", "6Workstation:openssh-server-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-server-0:5.3p1-117.el6.s390x", "6Workstation:openssh-server-0:5.3p1-117.el6.x86_64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0741" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Client-optional:openssh-0:5.3p1-117.el6.i686", "6Client-optional:openssh-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-0:5.3p1-117.el6.src", "6Client-optional:openssh-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Client-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-server-0:5.3p1-117.el6.i686", "6Client-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Client:openssh-0:5.3p1-117.el6.i686", "6Client:openssh-0:5.3p1-117.el6.ppc64", "6Client:openssh-0:5.3p1-117.el6.s390x", "6Client:openssh-0:5.3p1-117.el6.src", "6Client:openssh-0:5.3p1-117.el6.x86_64", "6Client:openssh-askpass-0:5.3p1-117.el6.i686", "6Client:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Client:openssh-askpass-0:5.3p1-117.el6.s390x", "6Client:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Client:openssh-clients-0:5.3p1-117.el6.i686", "6Client:openssh-clients-0:5.3p1-117.el6.ppc64", "6Client:openssh-clients-0:5.3p1-117.el6.s390x", "6Client:openssh-clients-0:5.3p1-117.el6.x86_64", "6Client:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Client:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Client:openssh-ldap-0:5.3p1-117.el6.i686", "6Client:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Client:openssh-ldap-0:5.3p1-117.el6.s390x", "6Client:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Client:openssh-server-0:5.3p1-117.el6.i686", "6Client:openssh-server-0:5.3p1-117.el6.ppc64", "6Client:openssh-server-0:5.3p1-117.el6.s390x", "6Client:openssh-server-0:5.3p1-117.el6.x86_64", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.src", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6ComputeNode:openssh-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-0:5.3p1-117.el6.src", "6ComputeNode:openssh-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-server-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-server-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-server-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-server-0:5.3p1-117.el6.x86_64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Server-optional:openssh-0:5.3p1-117.el6.i686", "6Server-optional:openssh-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-0:5.3p1-117.el6.src", "6Server-optional:openssh-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Server-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-server-0:5.3p1-117.el6.i686", "6Server-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Server:openssh-0:5.3p1-117.el6.i686", "6Server:openssh-0:5.3p1-117.el6.ppc64", "6Server:openssh-0:5.3p1-117.el6.s390x", "6Server:openssh-0:5.3p1-117.el6.src", "6Server:openssh-0:5.3p1-117.el6.x86_64", "6Server:openssh-askpass-0:5.3p1-117.el6.i686", "6Server:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Server:openssh-askpass-0:5.3p1-117.el6.s390x", "6Server:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Server:openssh-clients-0:5.3p1-117.el6.i686", "6Server:openssh-clients-0:5.3p1-117.el6.ppc64", "6Server:openssh-clients-0:5.3p1-117.el6.s390x", "6Server:openssh-clients-0:5.3p1-117.el6.x86_64", "6Server:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Server:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Server:openssh-ldap-0:5.3p1-117.el6.i686", "6Server:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Server:openssh-ldap-0:5.3p1-117.el6.s390x", "6Server:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Server:openssh-server-0:5.3p1-117.el6.i686", "6Server:openssh-server-0:5.3p1-117.el6.ppc64", "6Server:openssh-server-0:5.3p1-117.el6.s390x", "6Server:openssh-server-0:5.3p1-117.el6.x86_64", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Workstation-optional:openssh-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-0:5.3p1-117.el6.src", "6Workstation-optional:openssh-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Workstation:openssh-0:5.3p1-117.el6.i686", "6Workstation:openssh-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-0:5.3p1-117.el6.s390x", "6Workstation:openssh-0:5.3p1-117.el6.src", "6Workstation:openssh-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-askpass-0:5.3p1-117.el6.i686", "6Workstation:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-askpass-0:5.3p1-117.el6.s390x", "6Workstation:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-clients-0:5.3p1-117.el6.i686", "6Workstation:openssh-clients-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-clients-0:5.3p1-117.el6.s390x", "6Workstation:openssh-clients-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-ldap-0:5.3p1-117.el6.i686", "6Workstation:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-ldap-0:5.3p1-117.el6.s390x", "6Workstation:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-server-0:5.3p1-117.el6.i686", "6Workstation:openssh-server-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-server-0:5.3p1-117.el6.s390x", "6Workstation:openssh-server-0:5.3p1-117.el6.x86_64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssh: Use-after-free bug related to PAM support" }, { "cve": "CVE-2016-1908", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-10-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1298741" } ], "notes": [ { "category": "description", "text": "An access flaw was discovered in OpenSSH; the OpenSSH client did not correctly handle failures to generate authentication cookies for untrusted X11 forwarding. A malicious or compromised remote X application could possibly use this flaw to establish a trusted connection to the local X server, even if only untrusted X11 forwarding was requested.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssh: possible fallback from untrusted to trusted X11 forwarding", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:openssh-0:5.3p1-117.el6.i686", "6Client-optional:openssh-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-0:5.3p1-117.el6.src", "6Client-optional:openssh-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Client-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-server-0:5.3p1-117.el6.i686", "6Client-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Client:openssh-0:5.3p1-117.el6.i686", "6Client:openssh-0:5.3p1-117.el6.ppc64", "6Client:openssh-0:5.3p1-117.el6.s390x", "6Client:openssh-0:5.3p1-117.el6.src", "6Client:openssh-0:5.3p1-117.el6.x86_64", "6Client:openssh-askpass-0:5.3p1-117.el6.i686", "6Client:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Client:openssh-askpass-0:5.3p1-117.el6.s390x", "6Client:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Client:openssh-clients-0:5.3p1-117.el6.i686", "6Client:openssh-clients-0:5.3p1-117.el6.ppc64", "6Client:openssh-clients-0:5.3p1-117.el6.s390x", "6Client:openssh-clients-0:5.3p1-117.el6.x86_64", "6Client:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Client:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Client:openssh-ldap-0:5.3p1-117.el6.i686", "6Client:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Client:openssh-ldap-0:5.3p1-117.el6.s390x", "6Client:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Client:openssh-server-0:5.3p1-117.el6.i686", "6Client:openssh-server-0:5.3p1-117.el6.ppc64", "6Client:openssh-server-0:5.3p1-117.el6.s390x", "6Client:openssh-server-0:5.3p1-117.el6.x86_64", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.src", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6ComputeNode:openssh-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-0:5.3p1-117.el6.src", "6ComputeNode:openssh-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-server-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-server-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-server-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-server-0:5.3p1-117.el6.x86_64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Server-optional:openssh-0:5.3p1-117.el6.i686", "6Server-optional:openssh-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-0:5.3p1-117.el6.src", "6Server-optional:openssh-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Server-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-server-0:5.3p1-117.el6.i686", "6Server-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Server:openssh-0:5.3p1-117.el6.i686", "6Server:openssh-0:5.3p1-117.el6.ppc64", "6Server:openssh-0:5.3p1-117.el6.s390x", "6Server:openssh-0:5.3p1-117.el6.src", "6Server:openssh-0:5.3p1-117.el6.x86_64", "6Server:openssh-askpass-0:5.3p1-117.el6.i686", "6Server:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Server:openssh-askpass-0:5.3p1-117.el6.s390x", "6Server:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Server:openssh-clients-0:5.3p1-117.el6.i686", "6Server:openssh-clients-0:5.3p1-117.el6.ppc64", "6Server:openssh-clients-0:5.3p1-117.el6.s390x", "6Server:openssh-clients-0:5.3p1-117.el6.x86_64", "6Server:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Server:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Server:openssh-ldap-0:5.3p1-117.el6.i686", "6Server:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Server:openssh-ldap-0:5.3p1-117.el6.s390x", "6Server:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Server:openssh-server-0:5.3p1-117.el6.i686", "6Server:openssh-server-0:5.3p1-117.el6.ppc64", "6Server:openssh-server-0:5.3p1-117.el6.s390x", "6Server:openssh-server-0:5.3p1-117.el6.x86_64", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Workstation-optional:openssh-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-0:5.3p1-117.el6.src", "6Workstation-optional:openssh-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Workstation:openssh-0:5.3p1-117.el6.i686", "6Workstation:openssh-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-0:5.3p1-117.el6.s390x", "6Workstation:openssh-0:5.3p1-117.el6.src", "6Workstation:openssh-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-askpass-0:5.3p1-117.el6.i686", "6Workstation:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-askpass-0:5.3p1-117.el6.s390x", "6Workstation:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-clients-0:5.3p1-117.el6.i686", "6Workstation:openssh-clients-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-clients-0:5.3p1-117.el6.s390x", "6Workstation:openssh-clients-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-ldap-0:5.3p1-117.el6.i686", "6Workstation:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-ldap-0:5.3p1-117.el6.s390x", "6Workstation:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-server-0:5.3p1-117.el6.i686", "6Workstation:openssh-server-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-server-0:5.3p1-117.el6.s390x", "6Workstation:openssh-server-0:5.3p1-117.el6.x86_64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1908" }, { "category": "external", "summary": "RHBZ#1298741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1908", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1908" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1908", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1908" } ], "release_date": "2016-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-10T18:29:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the OpenSSH server daemon (sshd) will be restarted automatically.", "product_ids": [ "6Client-optional:openssh-0:5.3p1-117.el6.i686", "6Client-optional:openssh-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-0:5.3p1-117.el6.src", "6Client-optional:openssh-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Client-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-server-0:5.3p1-117.el6.i686", "6Client-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Client:openssh-0:5.3p1-117.el6.i686", "6Client:openssh-0:5.3p1-117.el6.ppc64", "6Client:openssh-0:5.3p1-117.el6.s390x", "6Client:openssh-0:5.3p1-117.el6.src", "6Client:openssh-0:5.3p1-117.el6.x86_64", "6Client:openssh-askpass-0:5.3p1-117.el6.i686", "6Client:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Client:openssh-askpass-0:5.3p1-117.el6.s390x", "6Client:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Client:openssh-clients-0:5.3p1-117.el6.i686", "6Client:openssh-clients-0:5.3p1-117.el6.ppc64", "6Client:openssh-clients-0:5.3p1-117.el6.s390x", "6Client:openssh-clients-0:5.3p1-117.el6.x86_64", "6Client:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Client:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Client:openssh-ldap-0:5.3p1-117.el6.i686", "6Client:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Client:openssh-ldap-0:5.3p1-117.el6.s390x", "6Client:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Client:openssh-server-0:5.3p1-117.el6.i686", "6Client:openssh-server-0:5.3p1-117.el6.ppc64", "6Client:openssh-server-0:5.3p1-117.el6.s390x", "6Client:openssh-server-0:5.3p1-117.el6.x86_64", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.src", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6ComputeNode:openssh-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-0:5.3p1-117.el6.src", "6ComputeNode:openssh-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-server-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-server-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-server-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-server-0:5.3p1-117.el6.x86_64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Server-optional:openssh-0:5.3p1-117.el6.i686", "6Server-optional:openssh-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-0:5.3p1-117.el6.src", "6Server-optional:openssh-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Server-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-server-0:5.3p1-117.el6.i686", "6Server-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Server:openssh-0:5.3p1-117.el6.i686", "6Server:openssh-0:5.3p1-117.el6.ppc64", "6Server:openssh-0:5.3p1-117.el6.s390x", "6Server:openssh-0:5.3p1-117.el6.src", "6Server:openssh-0:5.3p1-117.el6.x86_64", "6Server:openssh-askpass-0:5.3p1-117.el6.i686", "6Server:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Server:openssh-askpass-0:5.3p1-117.el6.s390x", "6Server:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Server:openssh-clients-0:5.3p1-117.el6.i686", "6Server:openssh-clients-0:5.3p1-117.el6.ppc64", "6Server:openssh-clients-0:5.3p1-117.el6.s390x", "6Server:openssh-clients-0:5.3p1-117.el6.x86_64", "6Server:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Server:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Server:openssh-ldap-0:5.3p1-117.el6.i686", "6Server:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Server:openssh-ldap-0:5.3p1-117.el6.s390x", "6Server:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Server:openssh-server-0:5.3p1-117.el6.i686", "6Server:openssh-server-0:5.3p1-117.el6.ppc64", "6Server:openssh-server-0:5.3p1-117.el6.s390x", "6Server:openssh-server-0:5.3p1-117.el6.x86_64", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Workstation-optional:openssh-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-0:5.3p1-117.el6.src", "6Workstation-optional:openssh-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Workstation:openssh-0:5.3p1-117.el6.i686", "6Workstation:openssh-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-0:5.3p1-117.el6.s390x", "6Workstation:openssh-0:5.3p1-117.el6.src", "6Workstation:openssh-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-askpass-0:5.3p1-117.el6.i686", "6Workstation:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-askpass-0:5.3p1-117.el6.s390x", "6Workstation:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-clients-0:5.3p1-117.el6.i686", "6Workstation:openssh-clients-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-clients-0:5.3p1-117.el6.s390x", "6Workstation:openssh-clients-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-ldap-0:5.3p1-117.el6.i686", "6Workstation:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-ldap-0:5.3p1-117.el6.s390x", "6Workstation:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-server-0:5.3p1-117.el6.i686", "6Workstation:openssh-server-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-server-0:5.3p1-117.el6.s390x", "6Workstation:openssh-server-0:5.3p1-117.el6.x86_64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0741" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Client-optional:openssh-0:5.3p1-117.el6.i686", "6Client-optional:openssh-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-0:5.3p1-117.el6.src", "6Client-optional:openssh-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Client-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Client-optional:openssh-server-0:5.3p1-117.el6.i686", "6Client-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Client-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Client-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Client:openssh-0:5.3p1-117.el6.i686", "6Client:openssh-0:5.3p1-117.el6.ppc64", "6Client:openssh-0:5.3p1-117.el6.s390x", "6Client:openssh-0:5.3p1-117.el6.src", "6Client:openssh-0:5.3p1-117.el6.x86_64", "6Client:openssh-askpass-0:5.3p1-117.el6.i686", "6Client:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Client:openssh-askpass-0:5.3p1-117.el6.s390x", "6Client:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Client:openssh-clients-0:5.3p1-117.el6.i686", "6Client:openssh-clients-0:5.3p1-117.el6.ppc64", "6Client:openssh-clients-0:5.3p1-117.el6.s390x", "6Client:openssh-clients-0:5.3p1-117.el6.x86_64", "6Client:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Client:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Client:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Client:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Client:openssh-ldap-0:5.3p1-117.el6.i686", "6Client:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Client:openssh-ldap-0:5.3p1-117.el6.s390x", "6Client:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Client:openssh-server-0:5.3p1-117.el6.i686", "6Client:openssh-server-0:5.3p1-117.el6.ppc64", "6Client:openssh-server-0:5.3p1-117.el6.s390x", "6Client:openssh-server-0:5.3p1-117.el6.x86_64", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Client:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.src", "6ComputeNode-optional:openssh-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.i686", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.s390x", "6ComputeNode-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6ComputeNode:openssh-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-0:5.3p1-117.el6.src", "6ComputeNode:openssh-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-askpass-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-clients-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-ldap-0:5.3p1-117.el6.x86_64", "6ComputeNode:openssh-server-0:5.3p1-117.el6.i686", "6ComputeNode:openssh-server-0:5.3p1-117.el6.ppc64", "6ComputeNode:openssh-server-0:5.3p1-117.el6.s390x", "6ComputeNode:openssh-server-0:5.3p1-117.el6.x86_64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Server-optional:openssh-0:5.3p1-117.el6.i686", "6Server-optional:openssh-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-0:5.3p1-117.el6.src", "6Server-optional:openssh-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Server-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Server-optional:openssh-server-0:5.3p1-117.el6.i686", "6Server-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Server-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Server-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Server:openssh-0:5.3p1-117.el6.i686", "6Server:openssh-0:5.3p1-117.el6.ppc64", "6Server:openssh-0:5.3p1-117.el6.s390x", "6Server:openssh-0:5.3p1-117.el6.src", "6Server:openssh-0:5.3p1-117.el6.x86_64", "6Server:openssh-askpass-0:5.3p1-117.el6.i686", "6Server:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Server:openssh-askpass-0:5.3p1-117.el6.s390x", "6Server:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Server:openssh-clients-0:5.3p1-117.el6.i686", "6Server:openssh-clients-0:5.3p1-117.el6.ppc64", "6Server:openssh-clients-0:5.3p1-117.el6.s390x", "6Server:openssh-clients-0:5.3p1-117.el6.x86_64", "6Server:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Server:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Server:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Server:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Server:openssh-ldap-0:5.3p1-117.el6.i686", "6Server:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Server:openssh-ldap-0:5.3p1-117.el6.s390x", "6Server:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Server:openssh-server-0:5.3p1-117.el6.i686", "6Server:openssh-server-0:5.3p1-117.el6.ppc64", "6Server:openssh-server-0:5.3p1-117.el6.s390x", "6Server:openssh-server-0:5.3p1-117.el6.x86_64", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Server:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Workstation-optional:openssh-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-0:5.3p1-117.el6.src", "6Workstation-optional:openssh-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-clients-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.i686", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.ppc64", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.s390x", "6Workstation-optional:openssh-server-0:5.3p1-117.el6.x86_64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64", "6Workstation:openssh-0:5.3p1-117.el6.i686", "6Workstation:openssh-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-0:5.3p1-117.el6.s390x", "6Workstation:openssh-0:5.3p1-117.el6.src", "6Workstation:openssh-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-askpass-0:5.3p1-117.el6.i686", "6Workstation:openssh-askpass-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-askpass-0:5.3p1-117.el6.s390x", "6Workstation:openssh-askpass-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-clients-0:5.3p1-117.el6.i686", "6Workstation:openssh-clients-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-clients-0:5.3p1-117.el6.s390x", "6Workstation:openssh-clients-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.i686", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.s390x", "6Workstation:openssh-debuginfo-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-ldap-0:5.3p1-117.el6.i686", "6Workstation:openssh-ldap-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-ldap-0:5.3p1-117.el6.s390x", "6Workstation:openssh-ldap-0:5.3p1-117.el6.x86_64", "6Workstation:openssh-server-0:5.3p1-117.el6.i686", "6Workstation:openssh-server-0:5.3p1-117.el6.ppc64", "6Workstation:openssh-server-0:5.3p1-117.el6.s390x", "6Workstation:openssh-server-0:5.3p1-117.el6.x86_64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.i686", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.ppc64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.s390x", "6Workstation:pam_ssh_agent_auth-0:0.9.3-117.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssh: possible fallback from untrusted to trusted X11 forwarding" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…