Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-20685 (GCVE-0-2018-20685)
Vulnerability from cvelistv5
Published
2019-01-10 00:00
Modified
2024-08-05 12:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:05:17.712Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4387", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4387" }, { "name": "USN-3885-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/3885-1/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2" }, { "tags": [ "x_transferred" ], "url": "https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197\u0026r2=1.198\u0026f=h" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190215-0001/" }, { "name": "106531", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106531" }, { "tags": [ "x_transferred" ], "url": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt" }, { "name": "GLSA-201903-16", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201903-16" }, { "name": "[debian-lts-announce] 20190325 [SECURITY] [DLA 1728-1] openssh security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "RHSA-2019:3702", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3702" }, { "name": "GLSA-202007-53", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202007-53" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-01-10T00:00:00", "descriptions": [ { "lang": "en", "value": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-13T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-4387", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2019/dsa-4387" }, { "name": "USN-3885-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/3885-1/" }, { "url": "https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2" }, { "url": "https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197\u0026r2=1.198\u0026f=h" }, { "url": "https://security.netapp.com/advisory/ntap-20190215-0001/" }, { "name": "106531", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/106531" }, { "url": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt" }, { "name": "GLSA-201903-16", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/201903-16" }, { "name": "[debian-lts-announce] 20190325 [SECURITY] [DLA 1728-1] openssh security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html" }, { "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "RHSA-2019:3702", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3702" }, { "name": "GLSA-202007-53", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202007-53" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-20685", "datePublished": "2019-01-10T00:00:00", "dateReserved": "2019-01-10T00:00:00", "dateUpdated": "2024-08-05T12:05:17.712Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-20685\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-01-10T21:29:00.377\",\"lastModified\":\"2024-11-21T04:01:59.800\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.\"},{\"lang\":\"es\",\"value\":\"En OpenSSH 7.9, scp.c en el cliente scp permite que los servidores SSH omitan las restricciones de acceso planeadas mediante un nombre de archivo \\\".\\\" o un nombre de archivo vac\u00edo. El impacto consiste en modificar los permisos del directorio objetivo en el lado del cliente.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:N/I:P/A:N\",\"baseScore\":2.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":4.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-863\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.9\",\"matchCriteriaId\":\"52D09A55-B853-43B5-8397-E2AC6CD0EBBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:winscp:winscp:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.13\",\"matchCriteriaId\":\"3D0A98E2-B715-4EF5-9CF8-07500E119271\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85DF4B3F-4BBC-42B7-B729-096934523D63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:ontap_select_deploy:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E968916-8CE0-4165-851F-14E37ECEA948\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E94F7F59-1785-493F-91A7-5F5EA5E87E4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B7A6697-98CC-4E36-93DB-B7160F8399F9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07C312A0-CD2C-4B9C-B064-6409B25C278F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92BC9265-6959-4D37-BE5E-8C45E98992F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"831F0F47-3565-4763-B16F-C87B1FF2035E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E3F09B5-569F-4C58-9FCA-3C0953D107B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C3741B8-851F-475D-B428-523F4F722350\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6897676D-53F9-45B3-B27F-7FF9A4C58D33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E28F226A-CBC7-4A32-BE58-398FA5B42481\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76C24D94-834A-4E9D-8F73-624AFA99AAA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B09ACF2D-D83F-4A86-8185-9569605D8EE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC10D919-57FD-4725-B8D2-39ECB476902F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1272DF03-7674-4BD4-8E64-94004B195448\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"964B57CD-CB8A-4520-B358-1C93EC5EF2DC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"xcp2361\",\"matchCriteriaId\":\"271CACEB-10F5-4CA8-9C99-3274F18EE62D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fujitsu:m10-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"983D27DE-BC89-454E-AE47-95A26A3651E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"xcp2361\",\"matchCriteriaId\":\"433EEE1B-134C-48F9-8688-23C5F1ABBF0F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fujitsu:m10-4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5825AEE1-B668-40BD-86A9-2799430C742C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"xcp2361\",\"matchCriteriaId\":\"47FFEE5C-5DAE-4FAD-9651-7983DE092120\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DA2D526-BDCF-4A65-914A-B3BA3A0CD613\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"xcp2361\",\"matchCriteriaId\":\"2FD8BD3B-C35B-4C44-B5A1-FA4646ACB374\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fujitsu:m12-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE0CF40B-E5BD-4558-9321-184D58EF621D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"xcp2361\",\"matchCriteriaId\":\"66D6EF49-7094-41D9-BDF5-AE5846E37418\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fujitsu:m12-2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F3C9C09-7B2B-4DB6-8BE0-35302ED35776\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"xcp2361\",\"matchCriteriaId\":\"6593DA00-EE33-4223-BEAE-8DC629E79287\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fujitsu:m12-2s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95503CE5-1D06-4092-A60D-D310AADCAFB1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"xcp3070\",\"matchCriteriaId\":\"67E048EC-4A4F-4F0A-B0B5-F234700293DA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fujitsu:m10-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"983D27DE-BC89-454E-AE47-95A26A3651E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"xcp3070\",\"matchCriteriaId\":\"FF6FAFAE-EBA5-43D2-9CA8-ECF3DD3B285E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fujitsu:m10-4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5825AEE1-B668-40BD-86A9-2799430C742C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"xcp3070\",\"matchCriteriaId\":\"665502CB-FCC8-4619-B673-408F7190252A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DA2D526-BDCF-4A65-914A-B3BA3A0CD613\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"xcp3070\",\"matchCriteriaId\":\"665502CB-FCC8-4619-B673-408F7190252A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DA2D526-BDCF-4A65-914A-B3BA3A0CD613\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"xcp3070\",\"matchCriteriaId\":\"483F5457-7E06-46F3-A808-194289B98AFF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fujitsu:m12-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE0CF40B-E5BD-4558-9321-184D58EF621D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"xcp3070\",\"matchCriteriaId\":\"D5644E3E-941A-429A-9AFB-C1023659C1C2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fujitsu:m12-2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F3C9C09-7B2B-4DB6-8BE0-35302ED35776\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"xcp3070\",\"matchCriteriaId\":\"0C1318DD-6AF4-490D-A4AE-079BA544EF8F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fujitsu:m12-2s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95503CE5-1D06-4092-A60D-D310AADCAFB1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_x204rna_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.2.7\",\"matchCriteriaId\":\"0D3A0312-1249-4257-98F1-57E8959989C5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_x204rna:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA8B483F-0FD2-49F8-A86A-672A6E007949\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_x204rna_eec_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.2.7\",\"matchCriteriaId\":\"FC0C9671-47BB-43CB-8906-9BC2B86B3229\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_x204rna_eec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C834C295-D600-44E8-9783-49A319084F5A\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/106531\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3702\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197\u0026r2=1.198\u0026f=h\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201903-16\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202007-53\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190215-0001/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3885-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4387\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/106531\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3702\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197\u0026r2=1.198\u0026f=h\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201903-16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202007-53\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190215-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3885-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4387\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
fkie_cve-2018-20685
Vulnerability from fkie_nvd
Published
2019-01-10 21:29
Modified
2024-11-21 04:01
Severity ?
Summary
In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/106531 | Broken Link | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2019:3702 | Third Party Advisory | |
cve@mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf | Patch, Third Party Advisory | |
cve@mitre.org | https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h | Patch | |
cve@mitre.org | https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2 | Patch | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/201903-16 | Third Party Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/202007-53 | Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20190215-0001/ | Third Party Advisory | |
cve@mitre.org | https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt | Patch, Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/3885-1/ | Third Party Advisory | |
cve@mitre.org | https://www.debian.org/security/2019/dsa-4387 | Third Party Advisory | |
cve@mitre.org | https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html | Patch, Third Party Advisory | |
cve@mitre.org | https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106531 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:3702 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201903-16 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202007-53 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20190215-0001/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3885-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2019/dsa-4387 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openbsd | openssh | * | |
winscp | winscp | * | |
netapp | cloud_backup | - | |
netapp | element_software | - | |
netapp | ontap_select_deploy | - | |
netapp | steelstore_cloud_integrated_storage | - | |
netapp | storage_automation_store | - | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 18.10 | |
redhat | enterprise_linux | 7.0 | |
redhat | enterprise_linux | 8.0 | |
redhat | enterprise_linux_eus | 8.1 | |
redhat | enterprise_linux_eus | 8.2 | |
redhat | enterprise_linux_eus | 8.4 | |
redhat | enterprise_linux_eus | 8.6 | |
redhat | enterprise_linux_server_aus | 8.2 | |
redhat | enterprise_linux_server_aus | 8.4 | |
redhat | enterprise_linux_server_aus | 8.6 | |
redhat | enterprise_linux_server_tus | 8.2 | |
redhat | enterprise_linux_server_tus | 8.4 | |
redhat | enterprise_linux_server_tus | 8.6 | |
oracle | solaris | 10 | |
fujitsu | m10-1_firmware | * | |
fujitsu | m10-1 | - | |
fujitsu | m10-4_firmware | * | |
fujitsu | m10-4 | - | |
fujitsu | m10-4s_firmware | * | |
fujitsu | m10-4s | - | |
fujitsu | m12-1_firmware | * | |
fujitsu | m12-1 | - | |
fujitsu | m12-2_firmware | * | |
fujitsu | m12-2 | - | |
fujitsu | m12-2s_firmware | * | |
fujitsu | m12-2s | - | |
fujitsu | m10-1_firmware | * | |
fujitsu | m10-1 | - | |
fujitsu | m10-4_firmware | * | |
fujitsu | m10-4 | - | |
fujitsu | m10-4s_firmware | * | |
fujitsu | m10-4s | - | |
fujitsu | m10-4s_firmware | * | |
fujitsu | m10-4s | - | |
fujitsu | m12-1_firmware | * | |
fujitsu | m12-1 | - | |
fujitsu | m12-2_firmware | * | |
fujitsu | m12-2 | - | |
fujitsu | m12-2s_firmware | * | |
fujitsu | m12-2s | - | |
siemens | scalance_x204rna_firmware | * | |
siemens | scalance_x204rna | - | |
siemens | scalance_x204rna_eec_firmware | * | |
siemens | scalance_x204rna_eec | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", "matchCriteriaId": "52D09A55-B853-43B5-8397-E2AC6CD0EBBC", "versionEndIncluding": "7.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:winscp:winscp:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D0A98E2-B715-4EF5-9CF8-07500E119271", "versionEndIncluding": "5.13", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*", "matchCriteriaId": "85DF4B3F-4BBC-42B7-B729-096934523D63", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:ontap_select_deploy:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E968916-8CE0-4165-851F-14E37ECEA948", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B7A6697-98CC-4E36-93DB-B7160F8399F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "92BC9265-6959-4D37-BE5E-8C45E98992F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "831F0F47-3565-4763-B16F-C87B1FF2035E", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*", "matchCriteriaId": "0E3F09B5-569F-4C58-9FCA-3C0953D107B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "6C3741B8-851F-475D-B428-523F4F722350", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "6897676D-53F9-45B3-B27F-7FF9A4C58D33", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*", "matchCriteriaId": "E28F226A-CBC7-4A32-BE58-398FA5B42481", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "76C24D94-834A-4E9D-8F73-624AFA99AAA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "B09ACF2D-D83F-4A86-8185-9569605D8EE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*", "matchCriteriaId": "AC10D919-57FD-4725-B8D2-39ECB476902F", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "1272DF03-7674-4BD4-8E64-94004B195448", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*", "matchCriteriaId": "964B57CD-CB8A-4520-B358-1C93EC5EF2DC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "271CACEB-10F5-4CA8-9C99-3274F18EE62D", "versionEndExcluding": "xcp2361", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m10-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "983D27DE-BC89-454E-AE47-95A26A3651E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "433EEE1B-134C-48F9-8688-23C5F1ABBF0F", "versionEndExcluding": "xcp2361", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m10-4:-:*:*:*:*:*:*:*", "matchCriteriaId": "5825AEE1-B668-40BD-86A9-2799430C742C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "47FFEE5C-5DAE-4FAD-9651-7983DE092120", "versionEndExcluding": "xcp2361", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DA2D526-BDCF-4A65-914A-B3BA3A0CD613", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2FD8BD3B-C35B-4C44-B5A1-FA4646ACB374", "versionEndExcluding": "xcp2361", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m12-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE0CF40B-E5BD-4558-9321-184D58EF621D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "66D6EF49-7094-41D9-BDF5-AE5846E37418", "versionEndExcluding": "xcp2361", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m12-2:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F3C9C09-7B2B-4DB6-8BE0-35302ED35776", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6593DA00-EE33-4223-BEAE-8DC629E79287", "versionEndExcluding": "xcp2361", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m12-2s:-:*:*:*:*:*:*:*", "matchCriteriaId": "95503CE5-1D06-4092-A60D-D310AADCAFB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67E048EC-4A4F-4F0A-B0B5-F234700293DA", "versionEndExcluding": "xcp3070", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m10-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "983D27DE-BC89-454E-AE47-95A26A3651E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF6FAFAE-EBA5-43D2-9CA8-ECF3DD3B285E", "versionEndExcluding": "xcp3070", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m10-4:-:*:*:*:*:*:*:*", "matchCriteriaId": "5825AEE1-B668-40BD-86A9-2799430C742C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "665502CB-FCC8-4619-B673-408F7190252A", "versionEndExcluding": "xcp3070", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DA2D526-BDCF-4A65-914A-B3BA3A0CD613", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "665502CB-FCC8-4619-B673-408F7190252A", "versionEndExcluding": "xcp3070", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DA2D526-BDCF-4A65-914A-B3BA3A0CD613", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483F5457-7E06-46F3-A808-194289B98AFF", "versionEndExcluding": "xcp3070", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m12-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE0CF40B-E5BD-4558-9321-184D58EF621D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5644E3E-941A-429A-9AFB-C1023659C1C2", "versionEndExcluding": "xcp3070", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m12-2:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F3C9C09-7B2B-4DB6-8BE0-35302ED35776", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C1318DD-6AF4-490D-A4AE-079BA544EF8F", "versionEndExcluding": "xcp3070", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m12-2s:-:*:*:*:*:*:*:*", "matchCriteriaId": "95503CE5-1D06-4092-A60D-D310AADCAFB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_x204rna_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D3A0312-1249-4257-98F1-57E8959989C5", "versionEndExcluding": "3.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_x204rna:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA8B483F-0FD2-49F8-A86A-672A6E007949", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_x204rna_eec_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC0C9671-47BB-43CB-8906-9BC2B86B3229", "versionEndExcluding": "3.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_x204rna_eec:-:*:*:*:*:*:*:*", "matchCriteriaId": "C834C295-D600-44E8-9783-49A319084F5A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side." }, { "lang": "es", "value": "En OpenSSH 7.9, scp.c en el cliente scp permite que los servidores SSH omitan las restricciones de acceso planeadas mediante un nombre de archivo \".\" o un nombre de archivo vac\u00edo. El impacto consiste en modificar los permisos del directorio objetivo en el lado del cliente." } ], "id": "CVE-2018-20685", "lastModified": "2024-11-21T04:01:59.800", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-01-10T21:29:00.377", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.securityfocus.com/bid/106531" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3702" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197\u0026r2=1.198\u0026f=h" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201903-16" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-53" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190215-0001/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3885-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4387" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.securityfocus.com/bid/106531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3702" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197\u0026r2=1.198\u0026f=h" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201903-16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190215-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3885-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
suse-su-2019:0125-2
Vulnerability from csaf_suse
Published
2019-04-29 06:02
Modified
2019-04-29 06:02
Summary
Security update for openssh
Notes
Title of the patch
Security update for openssh
Description of the patch
This update for openssh fixes the following issues:
Security issue fixed:
- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)
- CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate terminal output via the object name, e.g. by inserting ANSI escape sequences (bsc#1121816)
- CVE-2019-6110: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate stderr output, e.g. by inserting ANSI escape sequences (bsc#1121818)
- CVE-2019-6111: Fixed an issue where the scp client would allow malicious remote SSH servers to execute directory traversal attacks and overwrite files (bsc#1121821)
Patchnames
SUSE-2019-125,SUSE-SLE-SAP-12-SP1-2019-125
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssh", "title": "Title of the patch" }, { "category": "description", "text": "This update for openssh fixes the following issues:\n\nSecurity issue fixed:\n\n- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)\n- CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate terminal output via the object name, e.g. by inserting ANSI escape sequences (bsc#1121816)\n- CVE-2019-6110: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate stderr output, e.g. by inserting ANSI escape sequences (bsc#1121818)\n- CVE-2019-6111: Fixed an issue where the scp client would allow malicious remote SSH servers to execute directory traversal attacks and overwrite files (bsc#1121821)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-125,SUSE-SLE-SAP-12-SP1-2019-125", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0125-2.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0125-2", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190125-2/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0125-2", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-April/005404.html" }, { "category": "self", "summary": "SUSE Bug 1121571", "url": "https://bugzilla.suse.com/1121571" }, { "category": "self", "summary": "SUSE Bug 1121816", "url": "https://bugzilla.suse.com/1121816" }, { "category": "self", "summary": "SUSE Bug 1121818", "url": "https://bugzilla.suse.com/1121818" }, { "category": "self", "summary": "SUSE Bug 1121821", "url": "https://bugzilla.suse.com/1121821" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20685 page", "url": "https://www.suse.com/security/cve/CVE-2018-20685/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6109 page", "url": "https://www.suse.com/security/cve/CVE-2019-6109/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6110 page", "url": "https://www.suse.com/security/cve/CVE-2019-6110/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6111 page", "url": "https://www.suse.com/security/cve/CVE-2019-6111/" } ], "title": "Security update for openssh", "tracking": { "current_release_date": "2019-04-29T06:02:04Z", "generator": { "date": "2019-04-29T06:02:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0125-2", "initial_release_date": "2019-04-29T06:02:04Z", "revision_history": [ { "date": "2019-04-29T06:02:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-54.26.1.aarch64", "product": { "name": "openssh-6.6p1-54.26.1.aarch64", "product_id": "openssh-6.6p1-54.26.1.aarch64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-54.26.1.aarch64", "product": { "name": "openssh-askpass-gnome-6.6p1-54.26.1.aarch64", "product_id": "openssh-askpass-gnome-6.6p1-54.26.1.aarch64" } }, { "category": "product_version", "name": "openssh-cavs-6.6p1-54.26.1.aarch64", "product": { "name": "openssh-cavs-6.6p1-54.26.1.aarch64", "product_id": "openssh-cavs-6.6p1-54.26.1.aarch64" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-54.26.1.aarch64", "product": { "name": "openssh-fips-6.6p1-54.26.1.aarch64", "product_id": "openssh-fips-6.6p1-54.26.1.aarch64" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-54.26.1.aarch64", "product": { "name": "openssh-helpers-6.6p1-54.26.1.aarch64", "product_id": "openssh-helpers-6.6p1-54.26.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-54.26.1.i586", "product": { "name": "openssh-6.6p1-54.26.1.i586", "product_id": "openssh-6.6p1-54.26.1.i586" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-54.26.1.i586", "product": { "name": "openssh-askpass-gnome-6.6p1-54.26.1.i586", "product_id": "openssh-askpass-gnome-6.6p1-54.26.1.i586" } }, { "category": "product_version", "name": "openssh-cavs-6.6p1-54.26.1.i586", "product": { "name": "openssh-cavs-6.6p1-54.26.1.i586", "product_id": "openssh-cavs-6.6p1-54.26.1.i586" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-54.26.1.i586", "product": { "name": "openssh-fips-6.6p1-54.26.1.i586", "product_id": "openssh-fips-6.6p1-54.26.1.i586" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-54.26.1.i586", "product": { "name": "openssh-helpers-6.6p1-54.26.1.i586", "product_id": "openssh-helpers-6.6p1-54.26.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-54.26.1.ppc64le", "product": { "name": "openssh-6.6p1-54.26.1.ppc64le", "product_id": "openssh-6.6p1-54.26.1.ppc64le" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "product": { "name": "openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "product_id": "openssh-askpass-gnome-6.6p1-54.26.1.ppc64le" } }, { "category": "product_version", "name": "openssh-cavs-6.6p1-54.26.1.ppc64le", "product": { "name": "openssh-cavs-6.6p1-54.26.1.ppc64le", "product_id": "openssh-cavs-6.6p1-54.26.1.ppc64le" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-54.26.1.ppc64le", "product": { "name": "openssh-fips-6.6p1-54.26.1.ppc64le", "product_id": "openssh-fips-6.6p1-54.26.1.ppc64le" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-54.26.1.ppc64le", "product": { "name": "openssh-helpers-6.6p1-54.26.1.ppc64le", "product_id": "openssh-helpers-6.6p1-54.26.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-54.26.1.s390", "product": { "name": "openssh-6.6p1-54.26.1.s390", "product_id": "openssh-6.6p1-54.26.1.s390" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-54.26.1.s390", "product": { "name": "openssh-askpass-gnome-6.6p1-54.26.1.s390", "product_id": "openssh-askpass-gnome-6.6p1-54.26.1.s390" } }, { "category": "product_version", "name": "openssh-cavs-6.6p1-54.26.1.s390", "product": { "name": "openssh-cavs-6.6p1-54.26.1.s390", "product_id": "openssh-cavs-6.6p1-54.26.1.s390" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-54.26.1.s390", "product": { "name": "openssh-fips-6.6p1-54.26.1.s390", "product_id": "openssh-fips-6.6p1-54.26.1.s390" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-54.26.1.s390", "product": { "name": "openssh-helpers-6.6p1-54.26.1.s390", "product_id": "openssh-helpers-6.6p1-54.26.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-54.26.1.s390x", "product": { "name": "openssh-6.6p1-54.26.1.s390x", "product_id": "openssh-6.6p1-54.26.1.s390x" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-54.26.1.s390x", "product": { "name": "openssh-askpass-gnome-6.6p1-54.26.1.s390x", "product_id": "openssh-askpass-gnome-6.6p1-54.26.1.s390x" } }, { "category": "product_version", "name": "openssh-cavs-6.6p1-54.26.1.s390x", "product": { "name": "openssh-cavs-6.6p1-54.26.1.s390x", "product_id": "openssh-cavs-6.6p1-54.26.1.s390x" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-54.26.1.s390x", "product": { "name": "openssh-fips-6.6p1-54.26.1.s390x", "product_id": "openssh-fips-6.6p1-54.26.1.s390x" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-54.26.1.s390x", "product": { "name": "openssh-helpers-6.6p1-54.26.1.s390x", "product_id": "openssh-helpers-6.6p1-54.26.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-54.26.1.x86_64", "product": { "name": "openssh-6.6p1-54.26.1.x86_64", "product_id": "openssh-6.6p1-54.26.1.x86_64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "product": { "name": "openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "product_id": "openssh-askpass-gnome-6.6p1-54.26.1.x86_64" } }, { "category": "product_version", "name": "openssh-cavs-6.6p1-54.26.1.x86_64", "product": { "name": "openssh-cavs-6.6p1-54.26.1.x86_64", "product_id": "openssh-cavs-6.6p1-54.26.1.x86_64" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-54.26.1.x86_64", "product": { "name": "openssh-fips-6.6p1-54.26.1.x86_64", "product_id": "openssh-fips-6.6p1-54.26.1.x86_64" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-54.26.1.x86_64", "product": { "name": "openssh-helpers-6.6p1-54.26.1.x86_64", "product_id": "openssh-helpers-6.6p1-54.26.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-54.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-6.6p1-54.26.1.x86_64" }, "product_reference": "openssh-6.6p1-54.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-54.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-askpass-gnome-6.6p1-54.26.1.x86_64" }, "product_reference": "openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-54.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-fips-6.6p1-54.26.1.x86_64" }, "product_reference": "openssh-fips-6.6p1-54.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-54.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-helpers-6.6p1-54.26.1.x86_64" }, "product_reference": "openssh-helpers-6.6p1-54.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20685", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20685" } ], "notes": [ { "category": "general", "text": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-helpers-6.6p1-54.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20685", "url": "https://www.suse.com/security/cve/CVE-2018-20685" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1123220 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1123220" }, { "category": "external", "summary": "SUSE Bug 1131109 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1131109" }, { "category": "external", "summary": "SUSE Bug 1134932 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1134932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-helpers-6.6p1-54.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-helpers-6.6p1-54.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-29T06:02:04Z", "details": "important" } ], "title": "CVE-2018-20685" }, { "cve": "CVE-2019-6109", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6109" } ], "notes": [ { "category": "general", "text": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-helpers-6.6p1-54.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6109", "url": "https://www.suse.com/security/cve/CVE-2019-6109" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121821" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 1144902 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1144902" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1148884 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1148884" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-helpers-6.6p1-54.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-helpers-6.6p1-54.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-29T06:02:04Z", "details": "moderate" } ], "title": "CVE-2019-6109" }, { "cve": "CVE-2019-6110", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6110" } ], "notes": [ { "category": "general", "text": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-helpers-6.6p1-54.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6110", "url": "https://www.suse.com/security/cve/CVE-2019-6110" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-helpers-6.6p1-54.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-helpers-6.6p1-54.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-29T06:02:04Z", "details": "moderate" } ], "title": "CVE-2019-6110" }, { "cve": "CVE-2019-6111", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6111" } ], "notes": [ { "category": "general", "text": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-helpers-6.6p1-54.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6111", "url": "https://www.suse.com/security/cve/CVE-2019-6111" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121821" }, { "category": "external", "summary": "SUSE Bug 1123028 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1123028" }, { "category": "external", "summary": "SUSE Bug 1123220 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1123220" }, { "category": "external", "summary": "SUSE Bug 1131109 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1131109" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 1144902 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1144902" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1148884 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1148884" }, { "category": "external", "summary": "SUSE Bug 1201840 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1201840" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-helpers-6.6p1-54.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-helpers-6.6p1-54.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-29T06:02:04Z", "details": "moderate" } ], "title": "CVE-2019-6111" } ] }
suse-su-2019:0126-1
Vulnerability from csaf_suse
Published
2019-01-18 13:19
Modified
2019-01-18 13:19
Summary
Security update for openssh
Notes
Title of the patch
Security update for openssh
Description of the patch
This update for openssh fixes the following issues:
Security issues fixed:
- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)
- CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate terminal output via the object name, e.g. by inserting ANSI escape sequences (bsc#1121816)
- CVE-2019-6110: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate stderr output, e.g. by inserting ANSI escape sequences (bsc#1121818)
- CVE-2019-6111: Fixed an issue where the scp client would allow malicious remote SSH servers to execute directory traversal attacks and overwrite files (bsc#1121821)
Patchnames
SUSE-2019-126,SUSE-SLE-Module-Basesystem-15-2019-126,SUSE-SLE-Module-Desktop-Applications-15-2019-126,SUSE-SLE-Module-Development-Tools-OBS-15-2019-126,SUSE-SLE-Module-Server-Applications-15-2019-126
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssh", "title": "Title of the patch" }, { "category": "description", "text": "This update for openssh fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)\n- CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate terminal output via the object name, e.g. by inserting ANSI escape sequences (bsc#1121816)\n- CVE-2019-6110: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate stderr output, e.g. by inserting ANSI escape sequences (bsc#1121818)\n- CVE-2019-6111: Fixed an issue where the scp client would allow malicious remote SSH servers to execute directory traversal attacks and overwrite files (bsc#1121821)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-126,SUSE-SLE-Module-Basesystem-15-2019-126,SUSE-SLE-Module-Desktop-Applications-15-2019-126,SUSE-SLE-Module-Development-Tools-OBS-15-2019-126,SUSE-SLE-Module-Server-Applications-15-2019-126", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0126-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0126-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190126-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0126-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-January/005046.html" }, { "category": "self", "summary": "SUSE Bug 1121571", "url": "https://bugzilla.suse.com/1121571" }, { "category": "self", "summary": "SUSE Bug 1121816", "url": "https://bugzilla.suse.com/1121816" }, { "category": "self", "summary": "SUSE Bug 1121818", "url": "https://bugzilla.suse.com/1121818" }, { "category": "self", "summary": "SUSE Bug 1121821", "url": "https://bugzilla.suse.com/1121821" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20685 page", "url": "https://www.suse.com/security/cve/CVE-2018-20685/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6109 page", "url": "https://www.suse.com/security/cve/CVE-2019-6109/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6110 page", "url": "https://www.suse.com/security/cve/CVE-2019-6110/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6111 page", "url": "https://www.suse.com/security/cve/CVE-2019-6111/" } ], "title": "Security update for openssh", "tracking": { "current_release_date": "2019-01-18T13:19:59Z", "generator": { "date": "2019-01-18T13:19:59Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0126-1", "initial_release_date": "2019-01-18T13:19:59Z", "revision_history": [ { "date": "2019-01-18T13:19:59Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openssh-7.6p1-9.13.1.aarch64", "product": { "name": "openssh-7.6p1-9.13.1.aarch64", "product_id": "openssh-7.6p1-9.13.1.aarch64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-7.6p1-9.13.1.aarch64", "product": { "name": "openssh-askpass-gnome-7.6p1-9.13.1.aarch64", "product_id": "openssh-askpass-gnome-7.6p1-9.13.1.aarch64" } }, { "category": "product_version", "name": "openssh-cavs-7.6p1-9.13.1.aarch64", "product": { "name": "openssh-cavs-7.6p1-9.13.1.aarch64", "product_id": "openssh-cavs-7.6p1-9.13.1.aarch64" } }, { "category": "product_version", "name": "openssh-fips-7.6p1-9.13.1.aarch64", "product": { "name": "openssh-fips-7.6p1-9.13.1.aarch64", "product_id": "openssh-fips-7.6p1-9.13.1.aarch64" } }, { "category": "product_version", "name": "openssh-helpers-7.6p1-9.13.1.aarch64", "product": { "name": "openssh-helpers-7.6p1-9.13.1.aarch64", "product_id": "openssh-helpers-7.6p1-9.13.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "openssh-7.6p1-9.13.1.i586", "product": { "name": "openssh-7.6p1-9.13.1.i586", "product_id": "openssh-7.6p1-9.13.1.i586" } }, { "category": "product_version", "name": "openssh-askpass-gnome-7.6p1-9.13.1.i586", "product": { "name": "openssh-askpass-gnome-7.6p1-9.13.1.i586", "product_id": "openssh-askpass-gnome-7.6p1-9.13.1.i586" } }, { "category": "product_version", "name": "openssh-cavs-7.6p1-9.13.1.i586", "product": { "name": "openssh-cavs-7.6p1-9.13.1.i586", "product_id": "openssh-cavs-7.6p1-9.13.1.i586" } }, { "category": "product_version", "name": "openssh-fips-7.6p1-9.13.1.i586", "product": { "name": "openssh-fips-7.6p1-9.13.1.i586", "product_id": "openssh-fips-7.6p1-9.13.1.i586" } }, { "category": "product_version", "name": "openssh-helpers-7.6p1-9.13.1.i586", "product": { "name": "openssh-helpers-7.6p1-9.13.1.i586", "product_id": "openssh-helpers-7.6p1-9.13.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "openssh-7.6p1-9.13.1.ppc64le", "product": { "name": "openssh-7.6p1-9.13.1.ppc64le", "product_id": "openssh-7.6p1-9.13.1.ppc64le" } }, { "category": "product_version", "name": "openssh-askpass-gnome-7.6p1-9.13.1.ppc64le", "product": { "name": "openssh-askpass-gnome-7.6p1-9.13.1.ppc64le", "product_id": "openssh-askpass-gnome-7.6p1-9.13.1.ppc64le" } }, { "category": "product_version", "name": "openssh-cavs-7.6p1-9.13.1.ppc64le", "product": { "name": "openssh-cavs-7.6p1-9.13.1.ppc64le", "product_id": "openssh-cavs-7.6p1-9.13.1.ppc64le" } }, { "category": "product_version", "name": "openssh-fips-7.6p1-9.13.1.ppc64le", "product": { "name": "openssh-fips-7.6p1-9.13.1.ppc64le", "product_id": "openssh-fips-7.6p1-9.13.1.ppc64le" } }, { "category": "product_version", "name": "openssh-helpers-7.6p1-9.13.1.ppc64le", "product": { "name": "openssh-helpers-7.6p1-9.13.1.ppc64le", "product_id": "openssh-helpers-7.6p1-9.13.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssh-7.6p1-9.13.1.s390x", "product": { "name": "openssh-7.6p1-9.13.1.s390x", "product_id": "openssh-7.6p1-9.13.1.s390x" } }, { "category": "product_version", "name": "openssh-askpass-gnome-7.6p1-9.13.1.s390x", "product": { "name": "openssh-askpass-gnome-7.6p1-9.13.1.s390x", "product_id": "openssh-askpass-gnome-7.6p1-9.13.1.s390x" } }, { "category": "product_version", "name": "openssh-cavs-7.6p1-9.13.1.s390x", "product": { "name": "openssh-cavs-7.6p1-9.13.1.s390x", "product_id": "openssh-cavs-7.6p1-9.13.1.s390x" } }, { "category": "product_version", "name": "openssh-fips-7.6p1-9.13.1.s390x", "product": { "name": "openssh-fips-7.6p1-9.13.1.s390x", "product_id": "openssh-fips-7.6p1-9.13.1.s390x" } }, { "category": "product_version", "name": "openssh-helpers-7.6p1-9.13.1.s390x", "product": { "name": "openssh-helpers-7.6p1-9.13.1.s390x", "product_id": "openssh-helpers-7.6p1-9.13.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-7.6p1-9.13.1.x86_64", "product": { "name": "openssh-7.6p1-9.13.1.x86_64", "product_id": "openssh-7.6p1-9.13.1.x86_64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-7.6p1-9.13.1.x86_64", "product": { "name": "openssh-askpass-gnome-7.6p1-9.13.1.x86_64", "product_id": "openssh-askpass-gnome-7.6p1-9.13.1.x86_64" } }, { "category": "product_version", "name": "openssh-cavs-7.6p1-9.13.1.x86_64", "product": { "name": "openssh-cavs-7.6p1-9.13.1.x86_64", "product_id": "openssh-cavs-7.6p1-9.13.1.x86_64" } }, { "category": "product_version", "name": "openssh-fips-7.6p1-9.13.1.x86_64", "product": { "name": "openssh-fips-7.6p1-9.13.1.x86_64", "product_id": "openssh-fips-7.6p1-9.13.1.x86_64" } }, { "category": "product_version", "name": "openssh-helpers-7.6p1-9.13.1.x86_64", "product": { "name": "openssh-helpers-7.6p1-9.13.1.x86_64", "product_id": "openssh-helpers-7.6p1-9.13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Desktop Applications 15", "product": { "name": "SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-desktop-applications:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Server Applications 15", "product": { "name": "SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-server-applications:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-7.6p1-9.13.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.aarch64" }, "product_reference": "openssh-7.6p1-9.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.6p1-9.13.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.ppc64le" }, "product_reference": "openssh-7.6p1-9.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.6p1-9.13.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.s390x" }, "product_reference": "openssh-7.6p1-9.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.6p1-9.13.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.x86_64" }, "product_reference": "openssh-7.6p1-9.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.6p1-9.13.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.aarch64" }, "product_reference": "openssh-helpers-7.6p1-9.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.6p1-9.13.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.ppc64le" }, "product_reference": "openssh-helpers-7.6p1-9.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.6p1-9.13.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.s390x" }, "product_reference": "openssh-helpers-7.6p1-9.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.6p1-9.13.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.x86_64" }, "product_reference": "openssh-helpers-7.6p1-9.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.6p1-9.13.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.aarch64" }, "product_reference": "openssh-askpass-gnome-7.6p1-9.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.6p1-9.13.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.ppc64le" }, "product_reference": "openssh-askpass-gnome-7.6p1-9.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.6p1-9.13.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.s390x" }, "product_reference": "openssh-askpass-gnome-7.6p1-9.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.6p1-9.13.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.x86_64" }, "product_reference": "openssh-askpass-gnome-7.6p1-9.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.6p1-9.13.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.aarch64" }, "product_reference": "openssh-fips-7.6p1-9.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.6p1-9.13.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.ppc64le" }, "product_reference": "openssh-fips-7.6p1-9.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.6p1-9.13.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.s390x" }, "product_reference": "openssh-fips-7.6p1-9.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.6p1-9.13.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.x86_64" }, "product_reference": "openssh-fips-7.6p1-9.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20685", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20685" } ], "notes": [ { "category": "general", "text": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20685", "url": "https://www.suse.com/security/cve/CVE-2018-20685" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1123220 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1123220" }, { "category": "external", "summary": "SUSE Bug 1131109 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1131109" }, { "category": "external", "summary": "SUSE Bug 1134932 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1134932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-01-18T13:19:59Z", "details": "important" } ], "title": "CVE-2018-20685" }, { "cve": "CVE-2019-6109", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6109" } ], "notes": [ { "category": "general", "text": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6109", "url": "https://www.suse.com/security/cve/CVE-2019-6109" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121821" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 1144902 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1144902" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1148884 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1148884" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-01-18T13:19:59Z", "details": "moderate" } ], "title": "CVE-2019-6109" }, { "cve": "CVE-2019-6110", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6110" } ], "notes": [ { "category": "general", "text": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6110", "url": "https://www.suse.com/security/cve/CVE-2019-6110" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-01-18T13:19:59Z", "details": "moderate" } ], "title": "CVE-2019-6110" }, { "cve": "CVE-2019-6111", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6111" } ], "notes": [ { "category": "general", "text": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6111", "url": "https://www.suse.com/security/cve/CVE-2019-6111" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121821" }, { "category": "external", "summary": "SUSE Bug 1123028 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1123028" }, { "category": "external", "summary": "SUSE Bug 1123220 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1123220" }, { "category": "external", "summary": "SUSE Bug 1131109 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1131109" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 1144902 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1144902" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1148884 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1148884" }, { "category": "external", "summary": "SUSE Bug 1201840 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1201840" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:openssh-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:openssh-helpers-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:openssh-askpass-gnome-7.6p1-9.13.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:openssh-fips-7.6p1-9.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-01-18T13:19:59Z", "details": "moderate" } ], "title": "CVE-2019-6111" } ] }
suse-su-2019:0132-1
Vulnerability from csaf_suse
Published
2019-01-21 08:35
Modified
2019-01-21 08:35
Summary
Security update for openssh
Notes
Title of the patch
Security update for openssh
Description of the patch
This update for openssh fixes the following issues:
Security issue fixed:
- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)
- CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate terminal output via the object name, e.g. by inserting ANSI escape sequences (bsc#1121816)
- CVE-2019-6110: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate stderr output, e.g. by inserting ANSI escape sequences (bsc#1121818)
- CVE-2019-6111: Fixed an issue where the scp client would allow malicious remote SSH servers to execute directory traversal attacks and overwrite files (bsc#1121821)
Patchnames
SUSE-2019-132,SUSE-OpenStack-Cloud-7-2019-132,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-132,SUSE-SLE-DESKTOP-12-SP3-2019-132,SUSE-SLE-DESKTOP-12-SP4-2019-132,SUSE-SLE-SAP-12-SP2-2019-132,SUSE-SLE-SERVER-12-SP2-2019-132,SUSE-SLE-SERVER-12-SP2-BCL-2019-132,SUSE-SLE-SERVER-12-SP3-2019-132,SUSE-SLE-SERVER-12-SP4-2019-132,SUSE-Storage-4-2019-132
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssh", "title": "Title of the patch" }, { "category": "description", "text": "This update for openssh fixes the following issues:\n\nSecurity issue fixed:\n\n- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)\n- CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate terminal output via the object name, e.g. by inserting ANSI escape sequences (bsc#1121816)\n- CVE-2019-6110: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate stderr output, e.g. by inserting ANSI escape sequences (bsc#1121818)\n- CVE-2019-6111: Fixed an issue where the scp client would allow malicious remote SSH servers to execute directory traversal attacks and overwrite files (bsc#1121821)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-132,SUSE-OpenStack-Cloud-7-2019-132,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-132,SUSE-SLE-DESKTOP-12-SP3-2019-132,SUSE-SLE-DESKTOP-12-SP4-2019-132,SUSE-SLE-SAP-12-SP2-2019-132,SUSE-SLE-SERVER-12-SP2-2019-132,SUSE-SLE-SERVER-12-SP2-BCL-2019-132,SUSE-SLE-SERVER-12-SP3-2019-132,SUSE-SLE-SERVER-12-SP4-2019-132,SUSE-Storage-4-2019-132", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0132-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0132-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190132-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0132-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-January/005051.html" }, { "category": "self", "summary": "SUSE Bug 1121571", "url": "https://bugzilla.suse.com/1121571" }, { "category": "self", "summary": "SUSE Bug 1121816", "url": "https://bugzilla.suse.com/1121816" }, { "category": "self", "summary": "SUSE Bug 1121818", "url": "https://bugzilla.suse.com/1121818" }, { "category": "self", "summary": "SUSE Bug 1121821", "url": "https://bugzilla.suse.com/1121821" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20685 page", "url": "https://www.suse.com/security/cve/CVE-2018-20685/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6109 page", "url": "https://www.suse.com/security/cve/CVE-2019-6109/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6110 page", "url": "https://www.suse.com/security/cve/CVE-2019-6110/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6111 page", "url": "https://www.suse.com/security/cve/CVE-2019-6111/" } ], "title": "Security update for openssh", "tracking": { "current_release_date": "2019-01-21T08:35:19Z", "generator": { "date": "2019-01-21T08:35:19Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0132-1", "initial_release_date": "2019-01-21T08:35:19Z", "revision_history": [ { "date": "2019-01-21T08:35:19Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openssh-7.2p2-74.35.1.aarch64", "product": { "name": "openssh-7.2p2-74.35.1.aarch64", "product_id": "openssh-7.2p2-74.35.1.aarch64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "product": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "product_id": "openssh-askpass-gnome-7.2p2-74.35.1.aarch64" } }, { "category": "product_version", "name": "openssh-cavs-7.2p2-74.35.1.aarch64", "product": { "name": "openssh-cavs-7.2p2-74.35.1.aarch64", "product_id": "openssh-cavs-7.2p2-74.35.1.aarch64" } }, { "category": "product_version", "name": "openssh-fips-7.2p2-74.35.1.aarch64", "product": { "name": "openssh-fips-7.2p2-74.35.1.aarch64", "product_id": "openssh-fips-7.2p2-74.35.1.aarch64" } }, { "category": "product_version", "name": "openssh-helpers-7.2p2-74.35.1.aarch64", "product": { "name": "openssh-helpers-7.2p2-74.35.1.aarch64", "product_id": "openssh-helpers-7.2p2-74.35.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "openssh-7.2p2-74.35.1.i586", "product": { "name": "openssh-7.2p2-74.35.1.i586", "product_id": "openssh-7.2p2-74.35.1.i586" } }, { "category": "product_version", "name": "openssh-askpass-gnome-7.2p2-74.35.1.i586", "product": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.i586", "product_id": "openssh-askpass-gnome-7.2p2-74.35.1.i586" } }, { "category": "product_version", "name": "openssh-cavs-7.2p2-74.35.1.i586", "product": { "name": "openssh-cavs-7.2p2-74.35.1.i586", "product_id": "openssh-cavs-7.2p2-74.35.1.i586" } }, { "category": "product_version", "name": "openssh-fips-7.2p2-74.35.1.i586", "product": { "name": "openssh-fips-7.2p2-74.35.1.i586", "product_id": "openssh-fips-7.2p2-74.35.1.i586" } }, { "category": "product_version", "name": "openssh-helpers-7.2p2-74.35.1.i586", "product": { "name": "openssh-helpers-7.2p2-74.35.1.i586", "product_id": "openssh-helpers-7.2p2-74.35.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "openssh-7.2p2-74.35.1.ppc64le", "product": { "name": "openssh-7.2p2-74.35.1.ppc64le", "product_id": "openssh-7.2p2-74.35.1.ppc64le" } }, { "category": "product_version", "name": "openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "product": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "product_id": "openssh-askpass-gnome-7.2p2-74.35.1.ppc64le" } }, { "category": "product_version", "name": "openssh-cavs-7.2p2-74.35.1.ppc64le", "product": { "name": "openssh-cavs-7.2p2-74.35.1.ppc64le", "product_id": "openssh-cavs-7.2p2-74.35.1.ppc64le" } }, { "category": "product_version", "name": "openssh-fips-7.2p2-74.35.1.ppc64le", "product": { "name": "openssh-fips-7.2p2-74.35.1.ppc64le", "product_id": "openssh-fips-7.2p2-74.35.1.ppc64le" } }, { "category": "product_version", "name": "openssh-helpers-7.2p2-74.35.1.ppc64le", "product": { "name": "openssh-helpers-7.2p2-74.35.1.ppc64le", "product_id": "openssh-helpers-7.2p2-74.35.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssh-7.2p2-74.35.1.s390", "product": { "name": "openssh-7.2p2-74.35.1.s390", "product_id": "openssh-7.2p2-74.35.1.s390" } }, { "category": "product_version", "name": "openssh-askpass-gnome-7.2p2-74.35.1.s390", "product": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.s390", "product_id": "openssh-askpass-gnome-7.2p2-74.35.1.s390" } }, { "category": "product_version", "name": "openssh-cavs-7.2p2-74.35.1.s390", "product": { "name": "openssh-cavs-7.2p2-74.35.1.s390", "product_id": "openssh-cavs-7.2p2-74.35.1.s390" } }, { "category": "product_version", "name": "openssh-fips-7.2p2-74.35.1.s390", "product": { "name": "openssh-fips-7.2p2-74.35.1.s390", "product_id": "openssh-fips-7.2p2-74.35.1.s390" } }, { "category": "product_version", "name": "openssh-helpers-7.2p2-74.35.1.s390", "product": { "name": "openssh-helpers-7.2p2-74.35.1.s390", "product_id": "openssh-helpers-7.2p2-74.35.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "openssh-7.2p2-74.35.1.s390x", "product": { "name": "openssh-7.2p2-74.35.1.s390x", "product_id": "openssh-7.2p2-74.35.1.s390x" } }, { "category": "product_version", "name": "openssh-askpass-gnome-7.2p2-74.35.1.s390x", "product": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.s390x", "product_id": "openssh-askpass-gnome-7.2p2-74.35.1.s390x" } }, { "category": "product_version", "name": "openssh-cavs-7.2p2-74.35.1.s390x", "product": { "name": "openssh-cavs-7.2p2-74.35.1.s390x", "product_id": "openssh-cavs-7.2p2-74.35.1.s390x" } }, { "category": "product_version", "name": "openssh-fips-7.2p2-74.35.1.s390x", "product": { "name": "openssh-fips-7.2p2-74.35.1.s390x", "product_id": "openssh-fips-7.2p2-74.35.1.s390x" } }, { "category": "product_version", "name": "openssh-helpers-7.2p2-74.35.1.s390x", "product": { "name": "openssh-helpers-7.2p2-74.35.1.s390x", "product_id": "openssh-helpers-7.2p2-74.35.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-7.2p2-74.35.1.x86_64", "product": { "name": "openssh-7.2p2-74.35.1.x86_64", "product_id": "openssh-7.2p2-74.35.1.x86_64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "product": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "product_id": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64" } }, { "category": "product_version", "name": "openssh-cavs-7.2p2-74.35.1.x86_64", "product": { "name": "openssh-cavs-7.2p2-74.35.1.x86_64", "product_id": "openssh-cavs-7.2p2-74.35.1.x86_64" } }, { "category": "product_version", "name": "openssh-fips-7.2p2-74.35.1.x86_64", "product": { "name": "openssh-fips-7.2p2-74.35.1.x86_64", "product_id": "openssh-fips-7.2p2-74.35.1.x86_64" } }, { "category": "product_version", "name": "openssh-helpers-7.2p2-74.35.1.x86_64", "product": { "name": "openssh-helpers-7.2p2-74.35.1.x86_64", "product_id": "openssh-helpers-7.2p2-74.35.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP4", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4", "product": { "name": "SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 4", "product": { "name": "SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.s390x" }, "product_reference": "openssh-7.2p2-74.35.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.s390x" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.s390x" }, "product_reference": "openssh-fips-7.2p2-74.35.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-fips-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.s390x" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:openssh-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:openssh-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.ppc64le" }, "product_reference": "openssh-7.2p2-74.35.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.ppc64le" }, "product_reference": "openssh-fips-7.2p2-74.35.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-fips-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.ppc64le" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.ppc64le" }, "product_reference": "openssh-7.2p2-74.35.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.s390x" }, "product_reference": "openssh-7.2p2-74.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.s390x" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.ppc64le" }, "product_reference": "openssh-fips-7.2p2-74.35.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.s390x" }, "product_reference": "openssh-fips-7.2p2-74.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-fips-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.ppc64le" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.s390x" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-askpass-gnome-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-fips-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-fips-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-helpers-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.aarch64" }, "product_reference": "openssh-7.2p2-74.35.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.ppc64le" }, "product_reference": "openssh-7.2p2-74.35.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.s390x" }, "product_reference": "openssh-7.2p2-74.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64" }, "product_reference": "openssh-fips-7.2p2-74.35.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le" }, "product_reference": "openssh-fips-7.2p2-74.35.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.s390x" }, "product_reference": "openssh-fips-7.2p2-74.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-fips-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.aarch64" }, "product_reference": "openssh-7.2p2-74.35.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.ppc64le" }, "product_reference": "openssh-7.2p2-74.35.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.s390x" }, "product_reference": "openssh-7.2p2-74.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64" }, "product_reference": "openssh-fips-7.2p2-74.35.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le" }, "product_reference": "openssh-fips-7.2p2-74.35.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.s390x" }, "product_reference": "openssh-fips-7.2p2-74.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-fips-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.aarch64" }, "product_reference": "openssh-7.2p2-74.35.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.ppc64le" }, "product_reference": "openssh-7.2p2-74.35.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.s390x" }, "product_reference": "openssh-7.2p2-74.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64" }, "product_reference": "openssh-fips-7.2p2-74.35.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le" }, "product_reference": "openssh-fips-7.2p2-74.35.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.s390x" }, "product_reference": "openssh-fips-7.2p2-74.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-fips-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.aarch64" }, "product_reference": "openssh-7.2p2-74.35.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.ppc64le" }, "product_reference": "openssh-7.2p2-74.35.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.s390x" }, "product_reference": "openssh-7.2p2-74.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64" }, "product_reference": "openssh-fips-7.2p2-74.35.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le" }, "product_reference": "openssh-fips-7.2p2-74.35.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.s390x" }, "product_reference": "openssh-fips-7.2p2-74.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-fips-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-74.35.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:openssh-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-74.35.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:openssh-fips-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-fips-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-74.35.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:openssh-helpers-7.2p2-74.35.1.x86_64" }, "product_reference": "openssh-helpers-7.2p2-74.35.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20685", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20685" } ], "notes": [ { "category": "general", "text": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:openssh-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20685", "url": "https://www.suse.com/security/cve/CVE-2018-20685" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1123220 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1123220" }, { "category": "external", "summary": "SUSE Bug 1131109 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1131109" }, { "category": "external", "summary": "SUSE Bug 1134932 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1134932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:openssh-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:openssh-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-01-21T08:35:19Z", "details": "important" } ], "title": "CVE-2018-20685" }, { "cve": "CVE-2019-6109", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6109" } ], "notes": [ { "category": "general", "text": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:openssh-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6109", "url": "https://www.suse.com/security/cve/CVE-2019-6109" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121821" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 1144902 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1144902" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1148884 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1148884" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:openssh-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:openssh-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-01-21T08:35:19Z", "details": "moderate" } ], "title": "CVE-2019-6109" }, { "cve": "CVE-2019-6110", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6110" } ], "notes": [ { "category": "general", "text": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:openssh-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6110", "url": "https://www.suse.com/security/cve/CVE-2019-6110" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:openssh-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:openssh-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-01-21T08:35:19Z", "details": "moderate" } ], "title": "CVE-2019-6110" }, { "cve": "CVE-2019-6111", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6111" } ], "notes": [ { "category": "general", "text": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:openssh-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6111", "url": "https://www.suse.com/security/cve/CVE-2019-6111" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121821" }, { "category": "external", "summary": "SUSE Bug 1123028 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1123028" }, { "category": "external", "summary": "SUSE Bug 1123220 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1123220" }, { "category": "external", "summary": "SUSE Bug 1131109 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1131109" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 1144902 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1144902" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1148884 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1148884" }, { "category": "external", "summary": "SUSE Bug 1201840 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1201840" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:openssh-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:openssh-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Enterprise Storage 4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssh-helpers-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-askpass-gnome-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-fips-7.2p2-74.35.1.x86_64", "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.s390x", "SUSE OpenStack Cloud 7:openssh-helpers-7.2p2-74.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-01-21T08:35:19Z", "details": "moderate" } ], "title": "CVE-2019-6111" } ] }
suse-su-2019:13931-1
Vulnerability from csaf_suse
Published
2019-01-18 15:30
Modified
2019-01-18 15:30
Summary
Security update for openssh
Notes
Title of the patch
Security update for openssh
Description of the patch
This update for openssh fixes the following issues:
Security issue fixed:
- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)
- CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate terminal output via the object name, e.g. by inserting ANSI escape sequences (bsc#1121816)
- CVE-2019-6110: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate stderr output, e.g. by inserting ANSI escape sequences (bsc#1121818)
- CVE-2019-6111: Fixed an issue where the scp client would allow malicious remote SSH servers to execute directory traversal attacks and overwrite files (bsc#1121821)
Patchnames
slessp4-openssh-13931
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssh", "title": "Title of the patch" }, { "category": "description", "text": "This update for openssh fixes the following issues:\n\nSecurity issue fixed:\n\n- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)\n- CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate terminal output via the object name, e.g. by inserting ANSI escape sequences (bsc#1121816)\n- CVE-2019-6110: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate stderr output, e.g. by inserting ANSI escape sequences (bsc#1121818)\n- CVE-2019-6111: Fixed an issue where the scp client would allow malicious remote SSH servers to execute directory traversal attacks and overwrite files (bsc#1121821)\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp4-openssh-13931", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_13931-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:13931-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-201913931-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:13931-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-January/005049.html" }, { "category": "self", "summary": "SUSE Bug 1121571", "url": "https://bugzilla.suse.com/1121571" }, { "category": "self", "summary": "SUSE Bug 1121816", "url": "https://bugzilla.suse.com/1121816" }, { "category": "self", "summary": "SUSE Bug 1121818", "url": "https://bugzilla.suse.com/1121818" }, { "category": "self", "summary": "SUSE Bug 1121821", "url": "https://bugzilla.suse.com/1121821" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20685 page", "url": "https://www.suse.com/security/cve/CVE-2018-20685/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6109 page", "url": "https://www.suse.com/security/cve/CVE-2019-6109/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6110 page", "url": "https://www.suse.com/security/cve/CVE-2019-6110/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6111 page", "url": "https://www.suse.com/security/cve/CVE-2019-6111/" } ], "title": "Security update for openssh", "tracking": { "current_release_date": "2019-01-18T15:30:38Z", "generator": { "date": "2019-01-18T15:30:38Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:13931-1", "initial_release_date": "2019-01-18T15:30:38Z", "revision_history": [ { "date": "2019-01-18T15:30:38Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-36.12.1.i586", "product": { "name": "openssh-6.6p1-36.12.1.i586", "product_id": "openssh-6.6p1-36.12.1.i586" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-36.12.1.i586", "product": { "name": "openssh-askpass-gnome-6.6p1-36.12.1.i586", "product_id": "openssh-askpass-gnome-6.6p1-36.12.1.i586" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-36.12.1.i586", "product": { "name": "openssh-fips-6.6p1-36.12.1.i586", "product_id": "openssh-fips-6.6p1-36.12.1.i586" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-36.12.1.i586", "product": { "name": "openssh-helpers-6.6p1-36.12.1.i586", "product_id": "openssh-helpers-6.6p1-36.12.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-36.12.1.ia64", "product": { "name": "openssh-6.6p1-36.12.1.ia64", "product_id": "openssh-6.6p1-36.12.1.ia64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-36.12.1.ia64", "product": { "name": "openssh-askpass-gnome-6.6p1-36.12.1.ia64", "product_id": "openssh-askpass-gnome-6.6p1-36.12.1.ia64" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-36.12.1.ia64", "product": { "name": "openssh-fips-6.6p1-36.12.1.ia64", "product_id": "openssh-fips-6.6p1-36.12.1.ia64" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-36.12.1.ia64", "product": { "name": "openssh-helpers-6.6p1-36.12.1.ia64", "product_id": "openssh-helpers-6.6p1-36.12.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-36.12.1.ppc64", "product": { "name": "openssh-6.6p1-36.12.1.ppc64", "product_id": "openssh-6.6p1-36.12.1.ppc64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "product": { "name": "openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "product_id": "openssh-askpass-gnome-6.6p1-36.12.1.ppc64" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-36.12.1.ppc64", "product": { "name": "openssh-fips-6.6p1-36.12.1.ppc64", "product_id": "openssh-fips-6.6p1-36.12.1.ppc64" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-36.12.1.ppc64", "product": { "name": "openssh-helpers-6.6p1-36.12.1.ppc64", "product_id": "openssh-helpers-6.6p1-36.12.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-36.12.1.s390x", "product": { "name": "openssh-6.6p1-36.12.1.s390x", "product_id": "openssh-6.6p1-36.12.1.s390x" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-36.12.1.s390x", "product": { "name": "openssh-askpass-gnome-6.6p1-36.12.1.s390x", "product_id": "openssh-askpass-gnome-6.6p1-36.12.1.s390x" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-36.12.1.s390x", "product": { "name": "openssh-fips-6.6p1-36.12.1.s390x", "product_id": "openssh-fips-6.6p1-36.12.1.s390x" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-36.12.1.s390x", "product": { "name": "openssh-helpers-6.6p1-36.12.1.s390x", "product_id": "openssh-helpers-6.6p1-36.12.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-36.12.1.x86_64", "product": { "name": "openssh-6.6p1-36.12.1.x86_64", "product_id": "openssh-6.6p1-36.12.1.x86_64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "product": { "name": "openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "product_id": "openssh-askpass-gnome-6.6p1-36.12.1.x86_64" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-36.12.1.x86_64", "product": { "name": "openssh-fips-6.6p1-36.12.1.x86_64", "product_id": "openssh-fips-6.6p1-36.12.1.x86_64" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-36.12.1.x86_64", "product": { "name": "openssh-helpers-6.6p1-36.12.1.x86_64", "product_id": "openssh-helpers-6.6p1-36.12.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-36.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.i586" }, "product_reference": "openssh-6.6p1-36.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-36.12.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ia64" }, "product_reference": "openssh-6.6p1-36.12.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-36.12.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ppc64" }, "product_reference": "openssh-6.6p1-36.12.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-36.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.s390x" }, "product_reference": "openssh-6.6p1-36.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-36.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.x86_64" }, "product_reference": "openssh-6.6p1-36.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-36.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586" }, "product_reference": "openssh-askpass-gnome-6.6p1-36.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-36.12.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64" }, "product_reference": "openssh-askpass-gnome-6.6p1-36.12.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-36.12.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64" }, "product_reference": "openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-36.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x" }, "product_reference": "openssh-askpass-gnome-6.6p1-36.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-36.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64" }, "product_reference": "openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-36.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.i586" }, "product_reference": "openssh-fips-6.6p1-36.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-36.12.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ia64" }, "product_reference": "openssh-fips-6.6p1-36.12.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-36.12.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64" }, "product_reference": "openssh-fips-6.6p1-36.12.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-36.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.s390x" }, "product_reference": "openssh-fips-6.6p1-36.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-36.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64" }, "product_reference": "openssh-fips-6.6p1-36.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-36.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.i586" }, "product_reference": "openssh-helpers-6.6p1-36.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-36.12.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64" }, "product_reference": "openssh-helpers-6.6p1-36.12.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-36.12.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64" }, "product_reference": "openssh-helpers-6.6p1-36.12.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-36.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x" }, "product_reference": "openssh-helpers-6.6p1-36.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-36.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64" }, "product_reference": "openssh-helpers-6.6p1-36.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-36.12.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.i586" }, "product_reference": "openssh-6.6p1-36.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-36.12.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ia64" }, "product_reference": "openssh-6.6p1-36.12.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-36.12.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ppc64" }, "product_reference": "openssh-6.6p1-36.12.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-36.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.s390x" }, "product_reference": "openssh-6.6p1-36.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-36.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.x86_64" }, "product_reference": "openssh-6.6p1-36.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-36.12.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586" }, "product_reference": "openssh-askpass-gnome-6.6p1-36.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-36.12.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64" }, "product_reference": "openssh-askpass-gnome-6.6p1-36.12.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-36.12.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64" }, "product_reference": "openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-36.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x" }, "product_reference": "openssh-askpass-gnome-6.6p1-36.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-36.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64" }, "product_reference": "openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-36.12.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.i586" }, "product_reference": "openssh-fips-6.6p1-36.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-36.12.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ia64" }, "product_reference": "openssh-fips-6.6p1-36.12.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-36.12.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64" }, "product_reference": "openssh-fips-6.6p1-36.12.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-36.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.s390x" }, "product_reference": "openssh-fips-6.6p1-36.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-36.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64" }, "product_reference": "openssh-fips-6.6p1-36.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-36.12.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.i586" }, "product_reference": "openssh-helpers-6.6p1-36.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-36.12.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64" }, "product_reference": "openssh-helpers-6.6p1-36.12.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-36.12.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64" }, "product_reference": "openssh-helpers-6.6p1-36.12.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-36.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x" }, "product_reference": "openssh-helpers-6.6p1-36.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-36.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64" }, "product_reference": "openssh-helpers-6.6p1-36.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20685", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20685" } ], "notes": [ { "category": "general", "text": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20685", "url": "https://www.suse.com/security/cve/CVE-2018-20685" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1123220 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1123220" }, { "category": "external", "summary": "SUSE Bug 1131109 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1131109" }, { "category": "external", "summary": "SUSE Bug 1134932 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1134932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-01-18T15:30:38Z", "details": "important" } ], "title": "CVE-2018-20685" }, { "cve": "CVE-2019-6109", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6109" } ], "notes": [ { "category": "general", "text": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6109", "url": "https://www.suse.com/security/cve/CVE-2019-6109" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121821" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 1144902 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1144902" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1148884 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1148884" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-01-18T15:30:38Z", "details": "moderate" } ], "title": "CVE-2019-6109" }, { "cve": "CVE-2019-6110", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6110" } ], "notes": [ { "category": "general", "text": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6110", "url": "https://www.suse.com/security/cve/CVE-2019-6110" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-01-18T15:30:38Z", "details": "moderate" } ], "title": "CVE-2019-6110" }, { "cve": "CVE-2019-6111", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6111" } ], "notes": [ { "category": "general", "text": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6111", "url": "https://www.suse.com/security/cve/CVE-2019-6111" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121821" }, { "category": "external", "summary": "SUSE Bug 1123028 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1123028" }, { "category": "external", "summary": "SUSE Bug 1123220 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1123220" }, { "category": "external", "summary": "SUSE Bug 1131109 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1131109" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 1144902 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1144902" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1148884 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1148884" }, { "category": "external", "summary": "SUSE Bug 1201840 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1201840" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-askpass-gnome-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-fips-6.6p1-36.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssh-helpers-6.6p1-36.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-01-18T15:30:38Z", "details": "moderate" } ], "title": "CVE-2019-6111" } ] }
suse-su-2019:0125-1
Vulnerability from csaf_suse
Published
2019-01-18 13:19
Modified
2019-01-18 13:19
Summary
Security update for openssh
Notes
Title of the patch
Security update for openssh
Description of the patch
This update for openssh fixes the following issues:
Security issue fixed:
- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)
- CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate terminal output via the object name, e.g. by inserting ANSI escape sequences (bsc#1121816)
- CVE-2019-6110: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate stderr output, e.g. by inserting ANSI escape sequences (bsc#1121818)
- CVE-2019-6111: Fixed an issue where the scp client would allow malicious remote SSH servers to execute directory traversal attacks and overwrite files (bsc#1121821)
Patchnames
SUSE-2019-125,SUSE-SLE-SERVER-12-2019-125,SUSE-SLE-SERVER-12-SP1-2019-125
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssh", "title": "Title of the patch" }, { "category": "description", "text": "This update for openssh fixes the following issues:\n\nSecurity issue fixed:\n\n- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)\n- CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate terminal output via the object name, e.g. by inserting ANSI escape sequences (bsc#1121816)\n- CVE-2019-6110: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate stderr output, e.g. by inserting ANSI escape sequences (bsc#1121818)\n- CVE-2019-6111: Fixed an issue where the scp client would allow malicious remote SSH servers to execute directory traversal attacks and overwrite files (bsc#1121821)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-125,SUSE-SLE-SERVER-12-2019-125,SUSE-SLE-SERVER-12-SP1-2019-125", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0125-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0125-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190125-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0125-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-January/005045.html" }, { "category": "self", "summary": "SUSE Bug 1121571", "url": "https://bugzilla.suse.com/1121571" }, { "category": "self", "summary": "SUSE Bug 1121816", "url": "https://bugzilla.suse.com/1121816" }, { "category": "self", "summary": "SUSE Bug 1121818", "url": "https://bugzilla.suse.com/1121818" }, { "category": "self", "summary": "SUSE Bug 1121821", "url": "https://bugzilla.suse.com/1121821" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20685 page", "url": "https://www.suse.com/security/cve/CVE-2018-20685/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6109 page", "url": "https://www.suse.com/security/cve/CVE-2019-6109/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6110 page", "url": "https://www.suse.com/security/cve/CVE-2019-6110/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6111 page", "url": "https://www.suse.com/security/cve/CVE-2019-6111/" } ], "title": "Security update for openssh", "tracking": { "current_release_date": "2019-01-18T13:19:17Z", "generator": { "date": "2019-01-18T13:19:17Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0125-1", "initial_release_date": "2019-01-18T13:19:17Z", "revision_history": [ { "date": "2019-01-18T13:19:17Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-54.26.1.aarch64", "product": { "name": "openssh-6.6p1-54.26.1.aarch64", "product_id": "openssh-6.6p1-54.26.1.aarch64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-54.26.1.aarch64", "product": { "name": "openssh-askpass-gnome-6.6p1-54.26.1.aarch64", "product_id": "openssh-askpass-gnome-6.6p1-54.26.1.aarch64" } }, { "category": "product_version", "name": "openssh-cavs-6.6p1-54.26.1.aarch64", "product": { "name": "openssh-cavs-6.6p1-54.26.1.aarch64", "product_id": "openssh-cavs-6.6p1-54.26.1.aarch64" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-54.26.1.aarch64", "product": { "name": "openssh-fips-6.6p1-54.26.1.aarch64", "product_id": "openssh-fips-6.6p1-54.26.1.aarch64" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-54.26.1.aarch64", "product": { "name": "openssh-helpers-6.6p1-54.26.1.aarch64", "product_id": "openssh-helpers-6.6p1-54.26.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-54.26.1.i586", "product": { "name": "openssh-6.6p1-54.26.1.i586", "product_id": "openssh-6.6p1-54.26.1.i586" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-54.26.1.i586", "product": { "name": "openssh-askpass-gnome-6.6p1-54.26.1.i586", "product_id": "openssh-askpass-gnome-6.6p1-54.26.1.i586" } }, { "category": "product_version", "name": "openssh-cavs-6.6p1-54.26.1.i586", "product": { "name": "openssh-cavs-6.6p1-54.26.1.i586", "product_id": "openssh-cavs-6.6p1-54.26.1.i586" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-54.26.1.i586", "product": { "name": "openssh-fips-6.6p1-54.26.1.i586", "product_id": "openssh-fips-6.6p1-54.26.1.i586" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-54.26.1.i586", "product": { "name": "openssh-helpers-6.6p1-54.26.1.i586", "product_id": "openssh-helpers-6.6p1-54.26.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-54.26.1.ppc64le", "product": { "name": "openssh-6.6p1-54.26.1.ppc64le", "product_id": "openssh-6.6p1-54.26.1.ppc64le" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "product": { "name": "openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "product_id": "openssh-askpass-gnome-6.6p1-54.26.1.ppc64le" } }, { "category": "product_version", "name": "openssh-cavs-6.6p1-54.26.1.ppc64le", "product": { "name": "openssh-cavs-6.6p1-54.26.1.ppc64le", "product_id": "openssh-cavs-6.6p1-54.26.1.ppc64le" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-54.26.1.ppc64le", "product": { "name": "openssh-fips-6.6p1-54.26.1.ppc64le", "product_id": "openssh-fips-6.6p1-54.26.1.ppc64le" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-54.26.1.ppc64le", "product": { "name": "openssh-helpers-6.6p1-54.26.1.ppc64le", "product_id": "openssh-helpers-6.6p1-54.26.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-54.26.1.s390", "product": { "name": "openssh-6.6p1-54.26.1.s390", "product_id": "openssh-6.6p1-54.26.1.s390" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-54.26.1.s390", "product": { "name": "openssh-askpass-gnome-6.6p1-54.26.1.s390", "product_id": "openssh-askpass-gnome-6.6p1-54.26.1.s390" } }, { "category": "product_version", "name": "openssh-cavs-6.6p1-54.26.1.s390", "product": { "name": "openssh-cavs-6.6p1-54.26.1.s390", "product_id": "openssh-cavs-6.6p1-54.26.1.s390" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-54.26.1.s390", "product": { "name": "openssh-fips-6.6p1-54.26.1.s390", "product_id": "openssh-fips-6.6p1-54.26.1.s390" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-54.26.1.s390", "product": { "name": "openssh-helpers-6.6p1-54.26.1.s390", "product_id": "openssh-helpers-6.6p1-54.26.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-54.26.1.s390x", "product": { "name": "openssh-6.6p1-54.26.1.s390x", "product_id": "openssh-6.6p1-54.26.1.s390x" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-54.26.1.s390x", "product": { "name": "openssh-askpass-gnome-6.6p1-54.26.1.s390x", "product_id": "openssh-askpass-gnome-6.6p1-54.26.1.s390x" } }, { "category": "product_version", "name": "openssh-cavs-6.6p1-54.26.1.s390x", "product": { "name": "openssh-cavs-6.6p1-54.26.1.s390x", "product_id": "openssh-cavs-6.6p1-54.26.1.s390x" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-54.26.1.s390x", "product": { "name": "openssh-fips-6.6p1-54.26.1.s390x", "product_id": "openssh-fips-6.6p1-54.26.1.s390x" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-54.26.1.s390x", "product": { "name": "openssh-helpers-6.6p1-54.26.1.s390x", "product_id": "openssh-helpers-6.6p1-54.26.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-6.6p1-54.26.1.x86_64", "product": { "name": "openssh-6.6p1-54.26.1.x86_64", "product_id": "openssh-6.6p1-54.26.1.x86_64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "product": { "name": "openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "product_id": "openssh-askpass-gnome-6.6p1-54.26.1.x86_64" } }, { "category": "product_version", "name": "openssh-cavs-6.6p1-54.26.1.x86_64", "product": { "name": "openssh-cavs-6.6p1-54.26.1.x86_64", "product_id": "openssh-cavs-6.6p1-54.26.1.x86_64" } }, { "category": "product_version", "name": "openssh-fips-6.6p1-54.26.1.x86_64", "product": { "name": "openssh-fips-6.6p1-54.26.1.x86_64", "product_id": "openssh-fips-6.6p1-54.26.1.x86_64" } }, { "category": "product_version", "name": "openssh-helpers-6.6p1-54.26.1.x86_64", "product": { "name": "openssh-helpers-6.6p1-54.26.1.x86_64", "product_id": "openssh-helpers-6.6p1-54.26.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-54.26.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.ppc64le" }, "product_reference": "openssh-6.6p1-54.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-54.26.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.s390x" }, "product_reference": "openssh-6.6p1-54.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-54.26.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.x86_64" }, "product_reference": "openssh-6.6p1-54.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-54.26.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le" }, "product_reference": "openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-54.26.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x" }, "product_reference": "openssh-askpass-gnome-6.6p1-54.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-54.26.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64" }, "product_reference": "openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-54.26.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le" }, "product_reference": "openssh-fips-6.6p1-54.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-54.26.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.s390x" }, "product_reference": "openssh-fips-6.6p1-54.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-54.26.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.x86_64" }, "product_reference": "openssh-fips-6.6p1-54.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-54.26.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le" }, "product_reference": "openssh-helpers-6.6p1-54.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-54.26.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.s390x" }, "product_reference": "openssh-helpers-6.6p1-54.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-54.26.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64" }, "product_reference": "openssh-helpers-6.6p1-54.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-54.26.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.ppc64le" }, "product_reference": "openssh-6.6p1-54.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-54.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.s390x" }, "product_reference": "openssh-6.6p1-54.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-6.6p1-54.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.x86_64" }, "product_reference": "openssh-6.6p1-54.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-54.26.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le" }, "product_reference": "openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-54.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x" }, "product_reference": "openssh-askpass-gnome-6.6p1-54.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-6.6p1-54.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64" }, "product_reference": "openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-54.26.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le" }, "product_reference": "openssh-fips-6.6p1-54.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-54.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.s390x" }, "product_reference": "openssh-fips-6.6p1-54.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-6.6p1-54.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.x86_64" }, "product_reference": "openssh-fips-6.6p1-54.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-54.26.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le" }, "product_reference": "openssh-helpers-6.6p1-54.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-54.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.s390x" }, "product_reference": "openssh-helpers-6.6p1-54.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-6.6p1-54.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64" }, "product_reference": "openssh-helpers-6.6p1-54.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20685", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20685" } ], "notes": [ { "category": "general", "text": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20685", "url": "https://www.suse.com/security/cve/CVE-2018-20685" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1123220 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1123220" }, { "category": "external", "summary": "SUSE Bug 1131109 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1131109" }, { "category": "external", "summary": "SUSE Bug 1134932 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1134932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-01-18T13:19:17Z", "details": "important" } ], "title": "CVE-2018-20685" }, { "cve": "CVE-2019-6109", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6109" } ], "notes": [ { "category": "general", "text": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6109", "url": "https://www.suse.com/security/cve/CVE-2019-6109" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121821" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 1144902 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1144902" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1148884 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1148884" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-01-18T13:19:17Z", "details": "moderate" } ], "title": "CVE-2019-6109" }, { "cve": "CVE-2019-6110", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6110" } ], "notes": [ { "category": "general", "text": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6110", "url": "https://www.suse.com/security/cve/CVE-2019-6110" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-01-18T13:19:17Z", "details": "moderate" } ], "title": "CVE-2019-6110" }, { "cve": "CVE-2019-6111", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6111" } ], "notes": [ { "category": "general", "text": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6111", "url": "https://www.suse.com/security/cve/CVE-2019-6111" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121821" }, { "category": "external", "summary": "SUSE Bug 1123028 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1123028" }, { "category": "external", "summary": "SUSE Bug 1123220 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1123220" }, { "category": "external", "summary": "SUSE Bug 1131109 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1131109" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 1144902 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1144902" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1148884 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1148884" }, { "category": "external", "summary": "SUSE Bug 1201840 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1201840" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-askpass-gnome-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-fips-6.6p1-54.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssh-helpers-6.6p1-54.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-01-18T13:19:17Z", "details": "moderate" } ], "title": "CVE-2019-6111" } ] }
wid-sec-w-2024-0872
Vulnerability from csaf_certbund
Published
2019-01-10 23:00
Modified
2024-05-07 22:00
Summary
OpenSSH: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
OpenSSH ist eine Open Source Implementierung des Secure Shell Protokolls.
Angriff
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in OpenSSH ausnutzen, um Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "OpenSSH ist eine Open Source Implementierung des Secure Shell Protokolls.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in OpenSSH ausnutzen, um Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0872 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2024-0872.json" }, { "category": "self", "summary": "WID-SEC-2024-0872 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0872" }, { "category": "external", "summary": "NATIONAL VULNERABILITY DATABASE vom 2019-01-10", "url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-20685" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2019-9EB0AE6296 vom 2019-01-15", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2019-9eb0ae6296" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2019-F6FF819834 vom 2019-01-15", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2019-f6ff819834" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:0126-1 vom 2019-01-18", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190126-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:0125-1 vom 2019-01-18", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190125-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:13931-1 vom 2019-01-20", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-201913931-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:0132-1 vom 2019-01-22", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190132-1.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3885-1 vom 2019-02-08", "url": "https://usn.ubuntu.com/3885-1/" }, { "category": "external", "summary": "Debian Security Advisory DSA-4387 vom 2019-02-10", "url": "https://www.debian.org/security/2019/dsa-4387" }, { "category": "external", "summary": "Arch Linux Security Advisory ASA-201904-11 vom 2019-04-24", "url": "https://security.archlinux.org/ASA-201904-11" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:0125-2 vom 2019-04-29", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190125-2.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:3702 vom 2019-11-05", "url": "https://access.redhat.com/errata/RHSA-2019:3702" }, { "category": "external", "summary": "PaloAlto Security Advisories", "url": "https://security.paloaltonetworks.com/PAN-SA-2020-0002" }, { "category": "external", "summary": "F5 Security Advisory K11315080 vom 2020-04-22", "url": "https://support.f5.com/csp/article/K11315080" }, { "category": "external", "summary": "GENTOO Security Advisory GLSA-202007-53 vom 2020-07-28", "url": "https://security.gentoo.org/glsa/202007-53" }, { "category": "external", "summary": "HPE Security Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbux04025en_us" }, { "category": "external", "summary": "SEM 2024.2 release notes vom 2024-04-17", "url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2024-2_release_notes.htm" }, { "category": "external", "summary": "### vom 2024-04-17", "url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2024-2_release_notes.htm" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-198 vom 2024-05-08", "url": "https://www.dell.com/support/kbdoc/000224827/dsa-2024-=" } ], "source_lang": "en-US", "title": "OpenSSH: Schwachstelle erm\u00f6glicht Umgehen von Sicherheitsvorkehrungen", "tracking": { "current_release_date": "2024-05-07T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:07:41.112+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-0872", "initial_release_date": "2019-01-10T23:00:00.000+00:00", "revision_history": [ { "date": "2019-01-10T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2019-01-14T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2019-01-20T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-01-21T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-02-07T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2019-02-10T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2019-04-24T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Arch Linux aufgenommen" }, { "date": "2019-04-29T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-11-05T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-04-08T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Palo Alto Networks aufgenommen" }, { "date": "2020-04-22T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2020-07-28T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von GENTOO aufgenommen" }, { "date": "2020-08-09T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2024-04-16T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates aufgenommen" }, { "date": "2024-05-07T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Dell aufgenommen" } ], "status": "final", "version": "15" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "virtual", "product": { "name": "Dell NetWorker virtual", "product_id": "T034583", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:virtual" } } } ], "category": "product_name", "name": "NetWorker" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "EMC Avamar", "product": { "name": "EMC Avamar", "product_id": "T014381", "product_identification_helper": { "cpe": "cpe:/a:emc:avamar:-" } } } ], "category": "vendor", "name": "EMC" }, { "branches": [ { "category": "product_name", "name": "F5 BIG-IP", "product": { "name": "F5 BIG-IP", "product_id": "T001663", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:-" } } } ], "category": "vendor", "name": "F5" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "HPE HP-UX", "product": { "name": "HPE HP-UX", "product_id": "4871", "product_identification_helper": { "cpe": "cpe:/o:hp:hp-ux:-" } } } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "category": "product_name", "name": "Open Source Arch Linux", "product": { "name": "Open Source Arch Linux", "product_id": "T013312", "product_identification_helper": { "cpe": "cpe:/o:archlinux:archlinux:-" } } }, { "branches": [ { "category": "product_version", "name": "7.9", "product": { "name": "Open Source OpenSSH 7.9", "product_id": "8223", "product_identification_helper": { "cpe": "cpe:/a:openbsd:openssh:-" } } } ], "category": "product_name", "name": "OpenSSH" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "PaloAlto Networks PAN-OS", "product": { "name": "PaloAlto Networks PAN-OS", "product_id": "T012790", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:-" } } } ], "category": "vendor", "name": "PaloAlto Networks" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2024.2", "product": { "name": "SolarWinds Security Event Manager \u003c2024.2", "product_id": "T034244" } } ], "category": "product_name", "name": "Security Event Manager" } ], "category": "vendor", "name": "SolarWinds" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20685", "notes": [ { "category": "description", "text": "Es existiert eine nicht n\u00e4her beschriebene Schwachstelle in OpenSSH. Die Schwachstelle befindet sich in SCP Client in [scp.c]. Ein Angreifer kann diese nutzen und durch \u00dcbermittlung des Dateinamens \".\" oder eines leeren Dateinamens Zugriffsbeschr\u00e4nkungen umgehen." } ], "product_status": { "known_affected": [ "8223", "67646", "4871", "T013312", "T034583", "T012167", "T034244", "T012790", "T014381", "2951", "T002207", "T000126", "T001663" ] }, "release_date": "2019-01-10T23:00:00.000+00:00", "title": "CVE-2018-20685" } ] }
wid-sec-w-2024-1082
Vulnerability from csaf_certbund
Published
2024-05-09 22:00
Modified
2024-05-09 22:00
Summary
Juniper JUNOS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
JUNOS ist das "Juniper Network Operating System", das in Juniper Appliances verwendet wird.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS im Zusammenhang mit OpenSSH ausnutzen, um Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen oder Dateien zu manipulieren.
Betroffene Betriebssysteme
- Juniper Appliance
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS im Zusammenhang mit OpenSSH ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren oder Dateien zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- Juniper Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1082 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1082.json" }, { "category": "self", "summary": "WID-SEC-2024-1082 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1082" }, { "category": "external", "summary": "Juniper Security Advisory vom 2024-05-09", "url": "https://supportportal.juniper.net/s/article/2024-05-Reference-Advisory-Junos-OS-and-Junos-OS-Evolved-Multiple-CVEs-reported-in-OpenSSH" } ], "source_lang": "en-US", "title": "Juniper JUNOS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-09T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:08:45.014+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-1082", "initial_release_date": "2024-05-09T22:00:00.000+00:00", "revision_history": [ { "date": "2024-05-09T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e=19.4R1", "product": { "name": "Juniper JUNOS \u003e=19.4R1", "product_id": "T034677" } }, { "category": "product_version_range", "name": "Evolved \u003e=22.3R1", "product": { "name": "Juniper JUNOS Evolved \u003e=22.3R1", "product_id": "T034678" } } ], "category": "product_name", "name": "JUNOS" } ], "category": "vendor", "name": "Juniper" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-20012", "notes": [ { "category": "description", "text": "In Juniper JUNOS bestehen mehrere Schwachstellen in Bezug auf OpenSSH. Diese Fehler bestehen aufgrund verschiedener sicherheitsrelevanter Probleme wie einer fehlenden Zeichenkodierung, einem nicht ausreichend vertrauensw\u00fcrdigen Suchpfad oder einer unzul\u00e4ssigen Verhinderung von Schreiboperationen und mehr. Ein anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-05-09T22:00:00.000+00:00", "title": "CVE-2016-20012" }, { "cve": "CVE-2017-15906", "notes": [ { "category": "description", "text": "In Juniper JUNOS bestehen mehrere Schwachstellen in Bezug auf OpenSSH. Diese Fehler bestehen aufgrund verschiedener sicherheitsrelevanter Probleme wie einer fehlenden Zeichenkodierung, einem nicht ausreichend vertrauensw\u00fcrdigen Suchpfad oder einer unzul\u00e4ssigen Verhinderung von Schreiboperationen und mehr. Ein anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-05-09T22:00:00.000+00:00", "title": "CVE-2017-15906" }, { "cve": "CVE-2018-15473", "notes": [ { "category": "description", "text": "In Juniper JUNOS bestehen mehrere Schwachstellen in Bezug auf OpenSSH. Diese Fehler bestehen aufgrund verschiedener sicherheitsrelevanter Probleme wie einer fehlenden Zeichenkodierung, einem nicht ausreichend vertrauensw\u00fcrdigen Suchpfad oder einer unzul\u00e4ssigen Verhinderung von Schreiboperationen und mehr. Ein anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-05-09T22:00:00.000+00:00", "title": "CVE-2018-15473" }, { "cve": "CVE-2018-15919", "notes": [ { "category": "description", "text": "In Juniper JUNOS bestehen mehrere Schwachstellen in Bezug auf OpenSSH. Diese Fehler bestehen aufgrund verschiedener sicherheitsrelevanter Probleme wie einer fehlenden Zeichenkodierung, einem nicht ausreichend vertrauensw\u00fcrdigen Suchpfad oder einer unzul\u00e4ssigen Verhinderung von Schreiboperationen und mehr. Ein anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-05-09T22:00:00.000+00:00", "title": "CVE-2018-15919" }, { "cve": "CVE-2018-20685", "notes": [ { "category": "description", "text": "In Juniper JUNOS bestehen mehrere Schwachstellen in Bezug auf OpenSSH. Diese Fehler bestehen aufgrund verschiedener sicherheitsrelevanter Probleme wie einer fehlenden Zeichenkodierung, einem nicht ausreichend vertrauensw\u00fcrdigen Suchpfad oder einer unzul\u00e4ssigen Verhinderung von Schreiboperationen und mehr. Ein anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-05-09T22:00:00.000+00:00", "title": "CVE-2018-20685" }, { "cve": "CVE-2019-6109", "notes": [ { "category": "description", "text": "In Juniper JUNOS bestehen mehrere Schwachstellen in Bezug auf OpenSSH. Diese Fehler bestehen aufgrund verschiedener sicherheitsrelevanter Probleme wie einer fehlenden Zeichenkodierung, einem nicht ausreichend vertrauensw\u00fcrdigen Suchpfad oder einer unzul\u00e4ssigen Verhinderung von Schreiboperationen und mehr. Ein anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-05-09T22:00:00.000+00:00", "title": "CVE-2019-6109" }, { "cve": "CVE-2019-6110", "notes": [ { "category": "description", "text": "In Juniper JUNOS bestehen mehrere Schwachstellen in Bezug auf OpenSSH. Diese Fehler bestehen aufgrund verschiedener sicherheitsrelevanter Probleme wie einer fehlenden Zeichenkodierung, einem nicht ausreichend vertrauensw\u00fcrdigen Suchpfad oder einer unzul\u00e4ssigen Verhinderung von Schreiboperationen und mehr. Ein anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-05-09T22:00:00.000+00:00", "title": "CVE-2019-6110" }, { "cve": "CVE-2019-6111", "notes": [ { "category": "description", "text": "In Juniper JUNOS bestehen mehrere Schwachstellen in Bezug auf OpenSSH. Diese Fehler bestehen aufgrund verschiedener sicherheitsrelevanter Probleme wie einer fehlenden Zeichenkodierung, einem nicht ausreichend vertrauensw\u00fcrdigen Suchpfad oder einer unzul\u00e4ssigen Verhinderung von Schreiboperationen und mehr. Ein anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-05-09T22:00:00.000+00:00", "title": "CVE-2019-6111" }, { "cve": "CVE-2020-12062", "notes": [ { "category": "description", "text": "In Juniper JUNOS bestehen mehrere Schwachstellen in Bezug auf OpenSSH. Diese Fehler bestehen aufgrund verschiedener sicherheitsrelevanter Probleme wie einer fehlenden Zeichenkodierung, einem nicht ausreichend vertrauensw\u00fcrdigen Suchpfad oder einer unzul\u00e4ssigen Verhinderung von Schreiboperationen und mehr. Ein anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-05-09T22:00:00.000+00:00", "title": "CVE-2020-12062" }, { "cve": "CVE-2020-14145", "notes": [ { "category": "description", "text": "In Juniper JUNOS bestehen mehrere Schwachstellen in Bezug auf OpenSSH. Diese Fehler bestehen aufgrund verschiedener sicherheitsrelevanter Probleme wie einer fehlenden Zeichenkodierung, einem nicht ausreichend vertrauensw\u00fcrdigen Suchpfad oder einer unzul\u00e4ssigen Verhinderung von Schreiboperationen und mehr. Ein anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-05-09T22:00:00.000+00:00", "title": "CVE-2020-14145" }, { "cve": "CVE-2020-15778", "notes": [ { "category": "description", "text": "In Juniper JUNOS bestehen mehrere Schwachstellen in Bezug auf OpenSSH. Diese Fehler bestehen aufgrund verschiedener sicherheitsrelevanter Probleme wie einer fehlenden Zeichenkodierung, einem nicht ausreichend vertrauensw\u00fcrdigen Suchpfad oder einer unzul\u00e4ssigen Verhinderung von Schreiboperationen und mehr. Ein anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-05-09T22:00:00.000+00:00", "title": "CVE-2020-15778" }, { "cve": "CVE-2021-28041", "notes": [ { "category": "description", "text": "In Juniper JUNOS bestehen mehrere Schwachstellen in Bezug auf OpenSSH. Diese Fehler bestehen aufgrund verschiedener sicherheitsrelevanter Probleme wie einer fehlenden Zeichenkodierung, einem nicht ausreichend vertrauensw\u00fcrdigen Suchpfad oder einer unzul\u00e4ssigen Verhinderung von Schreiboperationen und mehr. Ein anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-05-09T22:00:00.000+00:00", "title": "CVE-2021-28041" }, { "cve": "CVE-2021-36368", "notes": [ { "category": "description", "text": "In Juniper JUNOS bestehen mehrere Schwachstellen in Bezug auf OpenSSH. Diese Fehler bestehen aufgrund verschiedener sicherheitsrelevanter Probleme wie einer fehlenden Zeichenkodierung, einem nicht ausreichend vertrauensw\u00fcrdigen Suchpfad oder einer unzul\u00e4ssigen Verhinderung von Schreiboperationen und mehr. Ein anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-05-09T22:00:00.000+00:00", "title": "CVE-2021-36368" }, { "cve": "CVE-2021-41617", "notes": [ { "category": "description", "text": "In Juniper JUNOS bestehen mehrere Schwachstellen in Bezug auf OpenSSH. Diese Fehler bestehen aufgrund verschiedener sicherheitsrelevanter Probleme wie einer fehlenden Zeichenkodierung, einem nicht ausreichend vertrauensw\u00fcrdigen Suchpfad oder einer unzul\u00e4ssigen Verhinderung von Schreiboperationen und mehr. Ein anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-05-09T22:00:00.000+00:00", "title": "CVE-2021-41617" }, { "cve": "CVE-2023-28531", "notes": [ { "category": "description", "text": "In Juniper JUNOS bestehen mehrere Schwachstellen in Bezug auf OpenSSH. Diese Fehler bestehen aufgrund verschiedener sicherheitsrelevanter Probleme wie einer fehlenden Zeichenkodierung, einem nicht ausreichend vertrauensw\u00fcrdigen Suchpfad oder einer unzul\u00e4ssigen Verhinderung von Schreiboperationen und mehr. Ein anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-05-09T22:00:00.000+00:00", "title": "CVE-2023-28531" }, { "cve": "CVE-2023-38408", "notes": [ { "category": "description", "text": "In Juniper JUNOS bestehen mehrere Schwachstellen in Bezug auf OpenSSH. Diese Fehler bestehen aufgrund verschiedener sicherheitsrelevanter Probleme wie einer fehlenden Zeichenkodierung, einem nicht ausreichend vertrauensw\u00fcrdigen Suchpfad oder einer unzul\u00e4ssigen Verhinderung von Schreiboperationen und mehr. Ein anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-05-09T22:00:00.000+00:00", "title": "CVE-2023-38408" }, { "cve": "CVE-2023-48795", "notes": [ { "category": "description", "text": "In Juniper JUNOS bestehen mehrere Schwachstellen in Bezug auf OpenSSH. Diese Fehler bestehen aufgrund verschiedener sicherheitsrelevanter Probleme wie einer fehlenden Zeichenkodierung, einem nicht ausreichend vertrauensw\u00fcrdigen Suchpfad oder einer unzul\u00e4ssigen Verhinderung von Schreiboperationen und mehr. Ein anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-05-09T22:00:00.000+00:00", "title": "CVE-2023-48795" }, { "cve": "CVE-2023-51384", "notes": [ { "category": "description", "text": "In Juniper JUNOS bestehen mehrere Schwachstellen in Bezug auf OpenSSH. Diese Fehler bestehen aufgrund verschiedener sicherheitsrelevanter Probleme wie einer fehlenden Zeichenkodierung, einem nicht ausreichend vertrauensw\u00fcrdigen Suchpfad oder einer unzul\u00e4ssigen Verhinderung von Schreiboperationen und mehr. Ein anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-05-09T22:00:00.000+00:00", "title": "CVE-2023-51384" }, { "cve": "CVE-2023-51385", "notes": [ { "category": "description", "text": "In Juniper JUNOS bestehen mehrere Schwachstellen in Bezug auf OpenSSH. Diese Fehler bestehen aufgrund verschiedener sicherheitsrelevanter Probleme wie einer fehlenden Zeichenkodierung, einem nicht ausreichend vertrauensw\u00fcrdigen Suchpfad oder einer unzul\u00e4ssigen Verhinderung von Schreiboperationen und mehr. Ein anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-05-09T22:00:00.000+00:00", "title": "CVE-2023-51385" } ] }
opensuse-su-2019:0091-1
Vulnerability from csaf_opensuse
Published
2019-03-23 10:50
Modified
2019-03-23 10:50
Summary
Security update for openssh
Notes
Title of the patch
Security update for openssh
Description of the patch
This update for openssh fixes the following issues:
Security issues fixed:
- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)
- CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate terminal output via the object name, e.g. by inserting ANSI escape sequences (bsc#1121816)
- CVE-2019-6110: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate stderr output, e.g. by inserting ANSI escape sequences (bsc#1121818)
- CVE-2019-6111: Fixed an issue where the scp client would allow malicious remote SSH servers to execute directory traversal attacks and overwrite files (bsc#1121821)
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2019-91
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssh", "title": "Title of the patch" }, { "category": "description", "text": "This update for openssh fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)\n- CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate terminal output via the object name, e.g. by inserting ANSI escape sequences (bsc#1121816)\n- CVE-2019-6110: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate stderr output, e.g. by inserting ANSI escape sequences (bsc#1121818)\n- CVE-2019-6111: Fixed an issue where the scp client would allow malicious remote SSH servers to execute directory traversal attacks and overwrite files (bsc#1121821)\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-91", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_0091-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:0091-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2MNLMLCJQ4RNIHX2VZUWA6ZK3G7XMXKU/#2MNLMLCJQ4RNIHX2VZUWA6ZK3G7XMXKU" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:0091-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2MNLMLCJQ4RNIHX2VZUWA6ZK3G7XMXKU/#2MNLMLCJQ4RNIHX2VZUWA6ZK3G7XMXKU" }, { "category": "self", "summary": "SUSE Bug 1121571", "url": "https://bugzilla.suse.com/1121571" }, { "category": "self", "summary": "SUSE Bug 1121816", "url": "https://bugzilla.suse.com/1121816" }, { "category": "self", "summary": "SUSE Bug 1121818", "url": "https://bugzilla.suse.com/1121818" }, { "category": "self", "summary": "SUSE Bug 1121821", "url": "https://bugzilla.suse.com/1121821" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20685 page", "url": "https://www.suse.com/security/cve/CVE-2018-20685/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6109 page", "url": "https://www.suse.com/security/cve/CVE-2019-6109/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6110 page", "url": "https://www.suse.com/security/cve/CVE-2019-6110/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6111 page", "url": "https://www.suse.com/security/cve/CVE-2019-6111/" } ], "title": "Security update for openssh", "tracking": { "current_release_date": "2019-03-23T10:50:30Z", "generator": { "date": "2019-03-23T10:50:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:0091-1", "initial_release_date": "2019-03-23T10:50:30Z", "revision_history": [ { "date": "2019-03-23T10:50:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openssh-7.6p1-lp150.8.9.1.i586", "product": { "name": "openssh-7.6p1-lp150.8.9.1.i586", "product_id": "openssh-7.6p1-lp150.8.9.1.i586" } }, { "category": "product_version", "name": "openssh-cavs-7.6p1-lp150.8.9.1.i586", "product": { "name": "openssh-cavs-7.6p1-lp150.8.9.1.i586", "product_id": "openssh-cavs-7.6p1-lp150.8.9.1.i586" } }, { "category": "product_version", "name": "openssh-fips-7.6p1-lp150.8.9.1.i586", "product": { "name": "openssh-fips-7.6p1-lp150.8.9.1.i586", "product_id": "openssh-fips-7.6p1-lp150.8.9.1.i586" } }, { "category": "product_version", "name": "openssh-helpers-7.6p1-lp150.8.9.1.i586", "product": { "name": "openssh-helpers-7.6p1-lp150.8.9.1.i586", "product_id": "openssh-helpers-7.6p1-lp150.8.9.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "openssh-7.6p1-lp150.8.9.1.x86_64", "product": { "name": "openssh-7.6p1-lp150.8.9.1.x86_64", "product_id": "openssh-7.6p1-lp150.8.9.1.x86_64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-7.6p1-lp150.8.9.1.x86_64", "product": { "name": "openssh-askpass-gnome-7.6p1-lp150.8.9.1.x86_64", "product_id": "openssh-askpass-gnome-7.6p1-lp150.8.9.1.x86_64" } }, { "category": "product_version", "name": "openssh-cavs-7.6p1-lp150.8.9.1.x86_64", "product": { "name": "openssh-cavs-7.6p1-lp150.8.9.1.x86_64", "product_id": "openssh-cavs-7.6p1-lp150.8.9.1.x86_64" } }, { "category": "product_version", "name": "openssh-fips-7.6p1-lp150.8.9.1.x86_64", "product": { "name": "openssh-fips-7.6p1-lp150.8.9.1.x86_64", "product_id": "openssh-fips-7.6p1-lp150.8.9.1.x86_64" } }, { "category": "product_version", "name": "openssh-helpers-7.6p1-lp150.8.9.1.x86_64", "product": { "name": "openssh-helpers-7.6p1-lp150.8.9.1.x86_64", "product_id": "openssh-helpers-7.6p1-lp150.8.9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.0", "product": { "name": "openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-7.6p1-lp150.8.9.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.i586" }, "product_reference": "openssh-7.6p1-lp150.8.9.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.6p1-lp150.8.9.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.x86_64" }, "product_reference": "openssh-7.6p1-lp150.8.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.6p1-lp150.8.9.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:openssh-askpass-gnome-7.6p1-lp150.8.9.1.x86_64" }, "product_reference": "openssh-askpass-gnome-7.6p1-lp150.8.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-7.6p1-lp150.8.9.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.i586" }, "product_reference": "openssh-cavs-7.6p1-lp150.8.9.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-7.6p1-lp150.8.9.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.x86_64" }, "product_reference": "openssh-cavs-7.6p1-lp150.8.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.6p1-lp150.8.9.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.i586" }, "product_reference": "openssh-fips-7.6p1-lp150.8.9.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.6p1-lp150.8.9.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.x86_64" }, "product_reference": "openssh-fips-7.6p1-lp150.8.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.6p1-lp150.8.9.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.i586" }, "product_reference": "openssh-helpers-7.6p1-lp150.8.9.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.6p1-lp150.8.9.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.x86_64" }, "product_reference": "openssh-helpers-7.6p1-lp150.8.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20685", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20685" } ], "notes": [ { "category": "general", "text": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-askpass-gnome-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20685", "url": "https://www.suse.com/security/cve/CVE-2018-20685" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1123220 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1123220" }, { "category": "external", "summary": "SUSE Bug 1131109 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1131109" }, { "category": "external", "summary": "SUSE Bug 1134932 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1134932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-askpass-gnome-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-askpass-gnome-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-23T10:50:30Z", "details": "important" } ], "title": "CVE-2018-20685" }, { "cve": "CVE-2019-6109", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6109" } ], "notes": [ { "category": "general", "text": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-askpass-gnome-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6109", "url": "https://www.suse.com/security/cve/CVE-2019-6109" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121821" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 1144902 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1144902" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1148884 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1148884" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-askpass-gnome-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-askpass-gnome-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-23T10:50:30Z", "details": "moderate" } ], "title": "CVE-2019-6109" }, { "cve": "CVE-2019-6110", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6110" } ], "notes": [ { "category": "general", "text": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-askpass-gnome-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6110", "url": "https://www.suse.com/security/cve/CVE-2019-6110" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-askpass-gnome-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-askpass-gnome-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-23T10:50:30Z", "details": "moderate" } ], "title": "CVE-2019-6110" }, { "cve": "CVE-2019-6111", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6111" } ], "notes": [ { "category": "general", "text": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-askpass-gnome-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6111", "url": "https://www.suse.com/security/cve/CVE-2019-6111" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121821" }, { "category": "external", "summary": "SUSE Bug 1123028 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1123028" }, { "category": "external", "summary": "SUSE Bug 1123220 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1123220" }, { "category": "external", "summary": "SUSE Bug 1131109 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1131109" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 1144902 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1144902" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1148884 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1148884" }, { "category": "external", "summary": "SUSE Bug 1201840 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1201840" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-askpass-gnome-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-askpass-gnome-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-cavs-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-fips-7.6p1-lp150.8.9.1.x86_64", "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.i586", "openSUSE Leap 15.0:openssh-helpers-7.6p1-lp150.8.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-23T10:50:30Z", "details": "moderate" } ], "title": "CVE-2019-6111" } ] }
opensuse-su-2024:11124-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
openssh-8.4p1-7.4 on GA media
Notes
Title of the patch
openssh-8.4p1-7.4 on GA media
Description of the patch
These are all security issues fixed in the openssh-8.4p1-7.4 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11124
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "openssh-8.4p1-7.4 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the openssh-8.4p1-7.4 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11124", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11124-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2006-0225 page", "url": "https://www.suse.com/security/cve/CVE-2006-0225/" }, { "category": "self", "summary": "SUSE CVE CVE-2007-4752 page", "url": "https://www.suse.com/security/cve/CVE-2007-4752/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-1483 page", "url": "https://www.suse.com/security/cve/CVE-2008-1483/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10009 page", "url": "https://www.suse.com/security/cve/CVE-2016-10009/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10010 page", "url": "https://www.suse.com/security/cve/CVE-2016-10010/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10011 page", "url": "https://www.suse.com/security/cve/CVE-2016-10011/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10012 page", "url": "https://www.suse.com/security/cve/CVE-2016-10012/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8858 page", "url": "https://www.suse.com/security/cve/CVE-2016-8858/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20685 page", "url": "https://www.suse.com/security/cve/CVE-2018-20685/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6109 page", "url": "https://www.suse.com/security/cve/CVE-2019-6109/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6110 page", "url": "https://www.suse.com/security/cve/CVE-2019-6110/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6111 page", "url": "https://www.suse.com/security/cve/CVE-2019-6111/" } ], "title": "openssh-8.4p1-7.4 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11124-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openssh-8.4p1-7.4.aarch64", "product": { "name": "openssh-8.4p1-7.4.aarch64", "product_id": "openssh-8.4p1-7.4.aarch64" } }, { "category": "product_version", "name": "openssh-cavs-8.4p1-7.4.aarch64", "product": { "name": "openssh-cavs-8.4p1-7.4.aarch64", "product_id": "openssh-cavs-8.4p1-7.4.aarch64" } }, { "category": "product_version", "name": "openssh-clients-8.4p1-7.4.aarch64", "product": { "name": "openssh-clients-8.4p1-7.4.aarch64", "product_id": "openssh-clients-8.4p1-7.4.aarch64" } }, { "category": "product_version", "name": "openssh-common-8.4p1-7.4.aarch64", "product": { "name": "openssh-common-8.4p1-7.4.aarch64", "product_id": "openssh-common-8.4p1-7.4.aarch64" } }, { "category": "product_version", "name": "openssh-fips-8.4p1-7.4.aarch64", "product": { "name": "openssh-fips-8.4p1-7.4.aarch64", "product_id": "openssh-fips-8.4p1-7.4.aarch64" } }, { "category": "product_version", "name": "openssh-helpers-8.4p1-7.4.aarch64", "product": { "name": "openssh-helpers-8.4p1-7.4.aarch64", "product_id": "openssh-helpers-8.4p1-7.4.aarch64" } }, { "category": "product_version", "name": "openssh-server-8.4p1-7.4.aarch64", "product": { "name": "openssh-server-8.4p1-7.4.aarch64", "product_id": "openssh-server-8.4p1-7.4.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "openssh-8.4p1-7.4.ppc64le", "product": { "name": "openssh-8.4p1-7.4.ppc64le", "product_id": "openssh-8.4p1-7.4.ppc64le" } }, { "category": "product_version", "name": "openssh-cavs-8.4p1-7.4.ppc64le", "product": { "name": "openssh-cavs-8.4p1-7.4.ppc64le", "product_id": "openssh-cavs-8.4p1-7.4.ppc64le" } }, { "category": "product_version", "name": "openssh-clients-8.4p1-7.4.ppc64le", "product": { "name": "openssh-clients-8.4p1-7.4.ppc64le", "product_id": "openssh-clients-8.4p1-7.4.ppc64le" } }, { "category": "product_version", "name": "openssh-common-8.4p1-7.4.ppc64le", "product": { "name": "openssh-common-8.4p1-7.4.ppc64le", "product_id": "openssh-common-8.4p1-7.4.ppc64le" } }, { "category": "product_version", "name": "openssh-fips-8.4p1-7.4.ppc64le", "product": { "name": "openssh-fips-8.4p1-7.4.ppc64le", "product_id": "openssh-fips-8.4p1-7.4.ppc64le" } }, { "category": "product_version", "name": "openssh-helpers-8.4p1-7.4.ppc64le", "product": { "name": "openssh-helpers-8.4p1-7.4.ppc64le", "product_id": "openssh-helpers-8.4p1-7.4.ppc64le" } }, { "category": "product_version", "name": "openssh-server-8.4p1-7.4.ppc64le", "product": { "name": "openssh-server-8.4p1-7.4.ppc64le", "product_id": "openssh-server-8.4p1-7.4.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssh-8.4p1-7.4.s390x", "product": { "name": "openssh-8.4p1-7.4.s390x", "product_id": "openssh-8.4p1-7.4.s390x" } }, { "category": "product_version", "name": "openssh-cavs-8.4p1-7.4.s390x", "product": { "name": "openssh-cavs-8.4p1-7.4.s390x", "product_id": "openssh-cavs-8.4p1-7.4.s390x" } }, { "category": "product_version", "name": "openssh-clients-8.4p1-7.4.s390x", "product": { "name": "openssh-clients-8.4p1-7.4.s390x", "product_id": "openssh-clients-8.4p1-7.4.s390x" } }, { "category": "product_version", "name": "openssh-common-8.4p1-7.4.s390x", "product": { "name": "openssh-common-8.4p1-7.4.s390x", "product_id": "openssh-common-8.4p1-7.4.s390x" } }, { "category": "product_version", "name": "openssh-fips-8.4p1-7.4.s390x", "product": { "name": "openssh-fips-8.4p1-7.4.s390x", "product_id": "openssh-fips-8.4p1-7.4.s390x" } }, { "category": "product_version", "name": "openssh-helpers-8.4p1-7.4.s390x", "product": { "name": "openssh-helpers-8.4p1-7.4.s390x", "product_id": "openssh-helpers-8.4p1-7.4.s390x" } }, { "category": "product_version", "name": "openssh-server-8.4p1-7.4.s390x", "product": { "name": "openssh-server-8.4p1-7.4.s390x", "product_id": "openssh-server-8.4p1-7.4.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-8.4p1-7.4.x86_64", "product": { "name": "openssh-8.4p1-7.4.x86_64", "product_id": "openssh-8.4p1-7.4.x86_64" } }, { "category": "product_version", "name": "openssh-cavs-8.4p1-7.4.x86_64", "product": { "name": "openssh-cavs-8.4p1-7.4.x86_64", "product_id": "openssh-cavs-8.4p1-7.4.x86_64" } }, { "category": "product_version", "name": "openssh-clients-8.4p1-7.4.x86_64", "product": { "name": "openssh-clients-8.4p1-7.4.x86_64", "product_id": "openssh-clients-8.4p1-7.4.x86_64" } }, { "category": "product_version", "name": "openssh-common-8.4p1-7.4.x86_64", "product": { "name": "openssh-common-8.4p1-7.4.x86_64", "product_id": "openssh-common-8.4p1-7.4.x86_64" } }, { "category": "product_version", "name": "openssh-fips-8.4p1-7.4.x86_64", "product": { "name": "openssh-fips-8.4p1-7.4.x86_64", "product_id": "openssh-fips-8.4p1-7.4.x86_64" } }, { "category": "product_version", "name": "openssh-helpers-8.4p1-7.4.x86_64", "product": { "name": "openssh-helpers-8.4p1-7.4.x86_64", "product_id": "openssh-helpers-8.4p1-7.4.x86_64" } }, { "category": "product_version", "name": "openssh-server-8.4p1-7.4.x86_64", "product": { "name": "openssh-server-8.4p1-7.4.x86_64", "product_id": "openssh-server-8.4p1-7.4.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-7.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64" }, "product_reference": "openssh-8.4p1-7.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-7.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le" }, "product_reference": "openssh-8.4p1-7.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-7.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x" }, "product_reference": "openssh-8.4p1-7.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-7.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64" }, "product_reference": "openssh-8.4p1-7.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-8.4p1-7.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64" }, "product_reference": "openssh-cavs-8.4p1-7.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-8.4p1-7.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le" }, "product_reference": "openssh-cavs-8.4p1-7.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-8.4p1-7.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x" }, "product_reference": "openssh-cavs-8.4p1-7.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-8.4p1-7.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64" }, "product_reference": "openssh-cavs-8.4p1-7.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-7.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64" }, "product_reference": "openssh-clients-8.4p1-7.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-7.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le" }, "product_reference": "openssh-clients-8.4p1-7.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-7.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x" }, "product_reference": "openssh-clients-8.4p1-7.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-7.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64" }, "product_reference": "openssh-clients-8.4p1-7.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-7.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64" }, "product_reference": "openssh-common-8.4p1-7.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-7.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le" }, "product_reference": "openssh-common-8.4p1-7.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-7.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x" }, "product_reference": "openssh-common-8.4p1-7.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-7.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64" }, "product_reference": "openssh-common-8.4p1-7.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-7.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64" }, "product_reference": "openssh-fips-8.4p1-7.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-7.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le" }, "product_reference": "openssh-fips-8.4p1-7.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-7.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x" }, "product_reference": "openssh-fips-8.4p1-7.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-7.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64" }, "product_reference": "openssh-fips-8.4p1-7.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-7.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64" }, "product_reference": "openssh-helpers-8.4p1-7.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-7.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le" }, "product_reference": "openssh-helpers-8.4p1-7.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-7.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x" }, "product_reference": "openssh-helpers-8.4p1-7.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-7.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64" }, "product_reference": "openssh-helpers-8.4p1-7.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-7.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64" }, "product_reference": "openssh-server-8.4p1-7.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-7.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le" }, "product_reference": "openssh-server-8.4p1-7.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-7.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x" }, "product_reference": "openssh-server-8.4p1-7.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-7.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" }, "product_reference": "openssh-server-8.4p1-7.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-0225", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2006-0225" } ], "notes": [ { "category": "general", "text": "scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2006-0225", "url": "https://www.suse.com/security/cve/CVE-2006-0225" }, { "category": "external", "summary": "SUSE Bug 143435 for CVE-2006-0225", "url": "https://bugzilla.suse.com/143435" }, { "category": "external", "summary": "SUSE Bug 206456 for CVE-2006-0225", "url": "https://bugzilla.suse.com/206456" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2006-0225" }, { "cve": "CVE-2007-4752", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-4752" } ], "notes": [ { "category": "general", "text": "ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-4752", "url": "https://www.suse.com/security/cve/CVE-2007-4752" }, { "category": "external", "summary": "SUSE Bug 308521 for CVE-2007-4752", "url": "https://bugzilla.suse.com/308521" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2007-4752" }, { "cve": "CVE-2008-1483", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-1483" } ], "notes": [ { "category": "general", "text": "OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-1483", "url": "https://www.suse.com/security/cve/CVE-2008-1483" }, { "category": "external", "summary": "SUSE Bug 1069509 for CVE-2008-1483", "url": "https://bugzilla.suse.com/1069509" }, { "category": "external", "summary": "SUSE Bug 373527 for CVE-2008-1483", "url": "https://bugzilla.suse.com/373527" }, { "category": "external", "summary": "SUSE Bug 585630 for CVE-2008-1483", "url": "https://bugzilla.suse.com/585630" }, { "category": "external", "summary": "SUSE Bug 647633 for CVE-2008-1483", "url": "https://bugzilla.suse.com/647633" }, { "category": "external", "summary": "SUSE Bug 706386 for CVE-2008-1483", "url": "https://bugzilla.suse.com/706386" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2008-1483" }, { "cve": "CVE-2016-10009", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10009" } ], "notes": [ { "category": "general", "text": "Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10009", "url": "https://www.suse.com/security/cve/CVE-2016-10009" }, { "category": "external", "summary": "SUSE Bug 1016336 for CVE-2016-10009", "url": "https://bugzilla.suse.com/1016336" }, { "category": "external", "summary": "SUSE Bug 1016366 for CVE-2016-10009", "url": "https://bugzilla.suse.com/1016366" }, { "category": "external", "summary": "SUSE Bug 1016370 for CVE-2016-10009", "url": "https://bugzilla.suse.com/1016370" }, { "category": "external", "summary": "SUSE Bug 1026634 for CVE-2016-10009", "url": "https://bugzilla.suse.com/1026634" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2016-10009", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 1213504 for CVE-2016-10009", "url": "https://bugzilla.suse.com/1213504" }, { "category": "external", "summary": "SUSE Bug 1217035 for CVE-2016-10009", "url": "https://bugzilla.suse.com/1217035" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-10009" }, { "cve": "CVE-2016-10010", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10010" } ], "notes": [ { "category": "general", "text": "sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10010", "url": "https://www.suse.com/security/cve/CVE-2016-10010" }, { "category": "external", "summary": "SUSE Bug 1016336 for CVE-2016-10010", "url": "https://bugzilla.suse.com/1016336" }, { "category": "external", "summary": "SUSE Bug 1016368 for CVE-2016-10010", "url": "https://bugzilla.suse.com/1016368" }, { "category": "external", "summary": "SUSE Bug 1021751 for CVE-2016-10010", "url": "https://bugzilla.suse.com/1021751" }, { "category": "external", "summary": "SUSE Bug 1196721 for CVE-2016-10010", "url": "https://bugzilla.suse.com/1196721" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-10010" }, { "cve": "CVE-2016-10011", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10011" } ], "notes": [ { "category": "general", "text": "authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10011", "url": "https://www.suse.com/security/cve/CVE-2016-10011" }, { "category": "external", "summary": "SUSE Bug 1016336 for CVE-2016-10011", "url": "https://bugzilla.suse.com/1016336" }, { "category": "external", "summary": "SUSE Bug 1016369 for CVE-2016-10011", "url": "https://bugzilla.suse.com/1016369" }, { "category": "external", "summary": "SUSE Bug 1016370 for CVE-2016-10011", "url": "https://bugzilla.suse.com/1016370" }, { "category": "external", "summary": "SUSE Bug 1017870 for CVE-2016-10011", "url": "https://bugzilla.suse.com/1017870" }, { "category": "external", "summary": "SUSE Bug 1026634 for CVE-2016-10011", "url": "https://bugzilla.suse.com/1026634" }, { "category": "external", "summary": "SUSE Bug 1029445 for CVE-2016-10011", "url": "https://bugzilla.suse.com/1029445" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-10011" }, { "cve": "CVE-2016-10012", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10012" } ], "notes": [ { "category": "general", "text": "The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10012", "url": "https://www.suse.com/security/cve/CVE-2016-10012" }, { "category": "external", "summary": "SUSE Bug 1006166 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1006166" }, { "category": "external", "summary": "SUSE Bug 1016336 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1016336" }, { "category": "external", "summary": "SUSE Bug 1016369 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1016369" }, { "category": "external", "summary": "SUSE Bug 1016370 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1016370" }, { "category": "external", "summary": "SUSE Bug 1017870 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1017870" }, { "category": "external", "summary": "SUSE Bug 1026634 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1026634" }, { "category": "external", "summary": "SUSE Bug 1035742 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1035742" }, { "category": "external", "summary": "SUSE Bug 1073044 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1073044" }, { "category": "external", "summary": "SUSE Bug 1092582 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1092582" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1138392" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-10012" }, { "cve": "CVE-2016-8858", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8858" } ], "notes": [ { "category": "general", "text": "The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that \"OpenSSH upstream does not consider this as a security issue.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8858", "url": "https://www.suse.com/security/cve/CVE-2016-8858" }, { "category": "external", "summary": "SUSE Bug 1005480 for CVE-2016-8858", "url": "https://bugzilla.suse.com/1005480" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-8858" }, { "cve": "CVE-2018-20685", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20685" } ], "notes": [ { "category": "general", "text": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20685", "url": "https://www.suse.com/security/cve/CVE-2018-20685" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1123220 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1123220" }, { "category": "external", "summary": "SUSE Bug 1131109 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1131109" }, { "category": "external", "summary": "SUSE Bug 1134932 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1134932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-20685" }, { "cve": "CVE-2019-6109", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6109" } ], "notes": [ { "category": "general", "text": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6109", "url": "https://www.suse.com/security/cve/CVE-2019-6109" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121821" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 1144902 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1144902" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1148884 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1148884" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-6109" }, { "cve": "CVE-2019-6110", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6110" } ], "notes": [ { "category": "general", "text": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6110", "url": "https://www.suse.com/security/cve/CVE-2019-6110" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-6110" }, { "cve": "CVE-2019-6111", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6111" } ], "notes": [ { "category": "general", "text": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6111", "url": "https://www.suse.com/security/cve/CVE-2019-6111" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121821" }, { "category": "external", "summary": "SUSE Bug 1123028 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1123028" }, { "category": "external", "summary": "SUSE Bug 1123220 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1123220" }, { "category": "external", "summary": "SUSE Bug 1131109 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1131109" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 1144902 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1144902" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1148884 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1148884" }, { "category": "external", "summary": "SUSE Bug 1201840 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1201840" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-6111" } ] }
rhsa-2019:3702
Vulnerability from csaf_redhat
Published
2019-11-05 22:29
Modified
2024-11-22 13:21
Summary
Red Hat Security Advisory: openssh security, bug fix, and enhancement update
Notes
Topic
An update for openssh is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
The following packages have been upgraded to a later upstream version: openssh (8.0p1). (BZ#1691045)
Security Fix(es):
* openssh: scp client improper directory name validation (CVE-2018-20685)
* openssh: Improper validation of object names allows malicious server to overwrite files via scp client (CVE-2019-6111)
* openssh: Missing character encoding in progress display allows for spoofing of scp client output (CVE-2019-6109)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openssh is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.\n\nThe following packages have been upgraded to a later upstream version: openssh (8.0p1). (BZ#1691045)\n\nSecurity Fix(es):\n\n* openssh: scp client improper directory name validation (CVE-2018-20685)\n\n* openssh: Improper validation of object names allows malicious server to overwrite files via scp client (CVE-2019-6111)\n\n* openssh: Missing character encoding in progress display allows for spoofing of scp client output (CVE-2019-6109)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3702", "url": "https://access.redhat.com/errata/RHSA-2019:3702" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/" }, { "category": "external", "summary": "1665785", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665785" }, { "category": "external", "summary": "1666119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666119" }, { "category": "external", "summary": "1666127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666127" }, { "category": "external", "summary": "1667519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667519" }, { "category": "external", "summary": "1668325", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668325" }, { "category": "external", "summary": "1683295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1683295" }, { "category": "external", "summary": "1685096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685096" }, { "category": "external", "summary": "1686065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686065" }, { "category": "external", "summary": "1691045", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1691045" }, { "category": "external", "summary": "1707485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707485" }, { "category": "external", "summary": "1712436", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712436" }, { "category": "external", "summary": "1732424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732424" }, { "category": "external", "summary": "1732449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732449" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3702.json" } ], "title": "Red Hat Security Advisory: openssh security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T13:21:48+00:00", "generator": { "date": "2024-11-22T13:21:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:3702", "initial_release_date": "2019-11-05T22:29:15+00:00", "revision_history": [ { "date": "2019-11-05T22:29:15+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-05T22:29:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T13:21:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "product": { "name": "openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "product_id": "openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-ldap-debuginfo@8.0p1-3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "product": { "name": "openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "product_id": "openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@8.0p1-3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "product": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "product_id": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth-debuginfo@0.10.3-7.3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "product": { "name": "openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "product_id": "openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients-debuginfo@8.0p1-3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:8.0p1-3.el8.aarch64", "product": { "name": "openssh-debuginfo-0:8.0p1-3.el8.aarch64", "product_id": "openssh-debuginfo-0:8.0p1-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@8.0p1-3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-debugsource-0:8.0p1-3.el8.aarch64", "product": { "name": "openssh-debugsource-0:8.0p1-3.el8.aarch64", "product_id": "openssh-debugsource-0:8.0p1-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debugsource@8.0p1-3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "product": { "name": "openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "product_id": "openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-cavs-debuginfo@8.0p1-3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "product": { "name": "openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "product_id": "openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@8.0p1-3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-askpass-0:8.0p1-3.el8.aarch64", "product": { "name": "openssh-askpass-0:8.0p1-3.el8.aarch64", "product_id": "openssh-askpass-0:8.0p1-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@8.0p1-3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "product": { "name": "openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "product_id": "openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server-debuginfo@8.0p1-3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-cavs-0:8.0p1-3.el8.aarch64", "product": { "name": "openssh-cavs-0:8.0p1-3.el8.aarch64", "product_id": "openssh-cavs-0:8.0p1-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-cavs@8.0p1-3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-clients-0:8.0p1-3.el8.aarch64", "product": { "name": "openssh-clients-0:8.0p1-3.el8.aarch64", "product_id": "openssh-clients-0:8.0p1-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@8.0p1-3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-0:8.0p1-3.el8.aarch64", "product": { "name": "openssh-0:8.0p1-3.el8.aarch64", "product_id": "openssh-0:8.0p1-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@8.0p1-3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "product": { "name": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "product_id": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.10.3-7.3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-ldap-0:8.0p1-3.el8.aarch64", "product": { "name": "openssh-ldap-0:8.0p1-3.el8.aarch64", "product_id": "openssh-ldap-0:8.0p1-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-ldap@8.0p1-3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-server-0:8.0p1-3.el8.aarch64", "product": { "name": "openssh-server-0:8.0p1-3.el8.aarch64", "product_id": "openssh-server-0:8.0p1-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@8.0p1-3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-keycat-0:8.0p1-3.el8.aarch64", "product": { "name": "openssh-keycat-0:8.0p1-3.el8.aarch64", "product_id": "openssh-keycat-0:8.0p1-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat@8.0p1-3.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "product": { "name": "openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "product_id": "openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-ldap-debuginfo@8.0p1-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "product": { "name": "openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "product_id": "openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@8.0p1-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64", "product": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64", "product_id": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth-debuginfo@0.10.3-7.3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "product": { "name": "openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "product_id": "openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients-debuginfo@8.0p1-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:8.0p1-3.el8.x86_64", "product": { "name": "openssh-debuginfo-0:8.0p1-3.el8.x86_64", "product_id": "openssh-debuginfo-0:8.0p1-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@8.0p1-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-debugsource-0:8.0p1-3.el8.x86_64", "product": { "name": "openssh-debugsource-0:8.0p1-3.el8.x86_64", "product_id": "openssh-debugsource-0:8.0p1-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debugsource@8.0p1-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "product": { "name": "openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "product_id": "openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-cavs-debuginfo@8.0p1-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "product": { "name": "openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "product_id": "openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@8.0p1-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-0:8.0p1-3.el8.x86_64", "product": { "name": "openssh-askpass-0:8.0p1-3.el8.x86_64", "product_id": "openssh-askpass-0:8.0p1-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@8.0p1-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "product": { "name": "openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "product_id": "openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server-debuginfo@8.0p1-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-cavs-0:8.0p1-3.el8.x86_64", "product": { "name": "openssh-cavs-0:8.0p1-3.el8.x86_64", "product_id": "openssh-cavs-0:8.0p1-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-cavs@8.0p1-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-clients-0:8.0p1-3.el8.x86_64", "product": { "name": "openssh-clients-0:8.0p1-3.el8.x86_64", "product_id": "openssh-clients-0:8.0p1-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@8.0p1-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-0:8.0p1-3.el8.x86_64", "product": { "name": "openssh-0:8.0p1-3.el8.x86_64", "product_id": "openssh-0:8.0p1-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@8.0p1-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "product": { "name": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "product_id": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.10.3-7.3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-ldap-0:8.0p1-3.el8.x86_64", "product": { "name": "openssh-ldap-0:8.0p1-3.el8.x86_64", "product_id": "openssh-ldap-0:8.0p1-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-ldap@8.0p1-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-server-0:8.0p1-3.el8.x86_64", "product": { "name": "openssh-server-0:8.0p1-3.el8.x86_64", "product_id": "openssh-server-0:8.0p1-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@8.0p1-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-keycat-0:8.0p1-3.el8.x86_64", "product": { "name": "openssh-keycat-0:8.0p1-3.el8.x86_64", "product_id": "openssh-keycat-0:8.0p1-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat@8.0p1-3.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "product": { "name": "openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "product_id": "openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-ldap-debuginfo@8.0p1-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "product": { "name": "openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "product_id": "openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@8.0p1-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "product": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "product_id": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth-debuginfo@0.10.3-7.3.el8?arch=s390x" } } }, { "category": "product_version", "name": "openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "product": { "name": "openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "product_id": "openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients-debuginfo@8.0p1-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:8.0p1-3.el8.s390x", "product": { "name": "openssh-debuginfo-0:8.0p1-3.el8.s390x", "product_id": "openssh-debuginfo-0:8.0p1-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@8.0p1-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "openssh-debugsource-0:8.0p1-3.el8.s390x", "product": { "name": "openssh-debugsource-0:8.0p1-3.el8.s390x", "product_id": "openssh-debugsource-0:8.0p1-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debugsource@8.0p1-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "product": { "name": "openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "product_id": "openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-cavs-debuginfo@8.0p1-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "product": { "name": "openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "product_id": "openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@8.0p1-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-0:8.0p1-3.el8.s390x", "product": { "name": "openssh-askpass-0:8.0p1-3.el8.s390x", "product_id": "openssh-askpass-0:8.0p1-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@8.0p1-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "product": { "name": "openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "product_id": "openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server-debuginfo@8.0p1-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "openssh-cavs-0:8.0p1-3.el8.s390x", "product": { "name": "openssh-cavs-0:8.0p1-3.el8.s390x", "product_id": "openssh-cavs-0:8.0p1-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-cavs@8.0p1-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "openssh-clients-0:8.0p1-3.el8.s390x", "product": { "name": "openssh-clients-0:8.0p1-3.el8.s390x", "product_id": "openssh-clients-0:8.0p1-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@8.0p1-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "openssh-0:8.0p1-3.el8.s390x", "product": { "name": "openssh-0:8.0p1-3.el8.s390x", "product_id": "openssh-0:8.0p1-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@8.0p1-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "product": { "name": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "product_id": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.10.3-7.3.el8?arch=s390x" } } }, { "category": "product_version", "name": "openssh-ldap-0:8.0p1-3.el8.s390x", "product": { "name": "openssh-ldap-0:8.0p1-3.el8.s390x", "product_id": "openssh-ldap-0:8.0p1-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-ldap@8.0p1-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "openssh-server-0:8.0p1-3.el8.s390x", "product": { "name": "openssh-server-0:8.0p1-3.el8.s390x", "product_id": "openssh-server-0:8.0p1-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@8.0p1-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "openssh-keycat-0:8.0p1-3.el8.s390x", "product": { "name": "openssh-keycat-0:8.0p1-3.el8.s390x", "product_id": "openssh-keycat-0:8.0p1-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat@8.0p1-3.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "product": { "name": "openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "product_id": "openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-ldap-debuginfo@8.0p1-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "product": { "name": "openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "product_id": "openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@8.0p1-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "product": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "product_id": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth-debuginfo@0.10.3-7.3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "product": { "name": "openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "product_id": "openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients-debuginfo@8.0p1-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "product": { "name": "openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "product_id": "openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@8.0p1-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-debugsource-0:8.0p1-3.el8.ppc64le", "product": { "name": "openssh-debugsource-0:8.0p1-3.el8.ppc64le", "product_id": "openssh-debugsource-0:8.0p1-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debugsource@8.0p1-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "product": { "name": "openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "product_id": "openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-cavs-debuginfo@8.0p1-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "product": { "name": "openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "product_id": "openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@8.0p1-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-askpass-0:8.0p1-3.el8.ppc64le", "product": { "name": "openssh-askpass-0:8.0p1-3.el8.ppc64le", "product_id": "openssh-askpass-0:8.0p1-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@8.0p1-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "product": { "name": "openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "product_id": "openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server-debuginfo@8.0p1-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-cavs-0:8.0p1-3.el8.ppc64le", "product": { "name": "openssh-cavs-0:8.0p1-3.el8.ppc64le", "product_id": "openssh-cavs-0:8.0p1-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-cavs@8.0p1-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-clients-0:8.0p1-3.el8.ppc64le", "product": { "name": "openssh-clients-0:8.0p1-3.el8.ppc64le", "product_id": "openssh-clients-0:8.0p1-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@8.0p1-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-0:8.0p1-3.el8.ppc64le", "product": { "name": "openssh-0:8.0p1-3.el8.ppc64le", "product_id": "openssh-0:8.0p1-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@8.0p1-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "product": { "name": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "product_id": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.10.3-7.3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-ldap-0:8.0p1-3.el8.ppc64le", "product": { "name": "openssh-ldap-0:8.0p1-3.el8.ppc64le", "product_id": "openssh-ldap-0:8.0p1-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-ldap@8.0p1-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-server-0:8.0p1-3.el8.ppc64le", "product": { "name": "openssh-server-0:8.0p1-3.el8.ppc64le", "product_id": "openssh-server-0:8.0p1-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@8.0p1-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-keycat-0:8.0p1-3.el8.ppc64le", "product": { "name": "openssh-keycat-0:8.0p1-3.el8.ppc64le", "product_id": "openssh-keycat-0:8.0p1-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat@8.0p1-3.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssh-0:8.0p1-3.el8.src", "product": { "name": "openssh-0:8.0p1-3.el8.src", "product_id": "openssh-0:8.0p1-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@8.0p1-3.el8?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.0p1-3.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-0:8.0p1-3.el8.src" }, "product_reference": "openssh-0:8.0p1-3.el8.src", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-askpass-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-askpass-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-askpass-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-askpass-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-cavs-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-cavs-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-cavs-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-cavs-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-clients-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-clients-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-clients-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-clients-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-debuginfo-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-debuginfo-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-debuginfo-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-debuginfo-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debugsource-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-debugsource-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debugsource-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-debugsource-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debugsource-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-debugsource-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debugsource-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-debugsource-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-keycat-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-keycat-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-keycat-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-keycat-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-ldap-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-ldap-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-ldap-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-ldap-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-server-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-server-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-server-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-server-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-debuginfo-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-debuginfo-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-debuginfo-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64" }, "product_reference": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le" }, "product_reference": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64" }, "product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le" }, "product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x" }, "product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64" }, "product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.0p1-3.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.src" }, "product_reference": "openssh-0:8.0p1-3.el8.src", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-askpass-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-askpass-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-askpass-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-askpass-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-cavs-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-cavs-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-cavs-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-cavs-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-clients-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-clients-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-clients-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-clients-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-debuginfo-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-debuginfo-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-debuginfo-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-debuginfo-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debugsource-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-debugsource-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debugsource-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-debugsource-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debugsource-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-debugsource-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debugsource-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-debugsource-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-keycat-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-keycat-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-keycat-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-keycat-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-ldap-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-ldap-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-ldap-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-ldap-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-server-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-server-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-server-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-server-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-debuginfo-0:8.0p1-3.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64" }, "product_reference": "openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le" }, "product_reference": "openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-debuginfo-0:8.0p1-3.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x" }, "product_reference": "openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-debuginfo-0:8.0p1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64" }, "product_reference": "openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64" }, "product_reference": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le" }, "product_reference": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64" }, "product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le" }, "product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x" }, "product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64" }, "product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20685", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-01-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1665785" } ], "notes": [ { "category": "description", "text": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssh: scp client improper directory name validation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the scp client shipped with openssh. The SSH protocol or the SSH client is not affected. For more detailed analysis please refer to: https://bugzilla.redhat.com/show_bug.cgi?id=1665785#c4", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0:openssh-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.src", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.src", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-20685" }, { "category": "external", "summary": "RHBZ#1665785", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665785" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-20685", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-20685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20685" }, { "category": "external", "summary": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt", "url": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt" } ], "release_date": "2018-11-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T22:29:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the OpenSSH server daemon (sshd) will be restarted automatically.", "product_ids": [ "AppStream-8.1.0:openssh-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.src", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.src", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3702" }, { "category": "workaround", "details": "This issue only affects the users of scp binary which is a part of openssh-clients package. Other usage of SSH protocol or other ssh clients is not affected. Administrators can uninstall openssh-clients for additional protection against accidental usage of this binary. Removing the openssh-clients package will make binaries like scp and ssh etc unavailable on that system.\n\nNote: To exploit this flaw, the victim needs to connect to a malicious SSH server or MITM (Man-in-the-middle) the scp connection, both of which can be detected by the system administrator via a change in the host key of the SSH server. Further, if connections via scp are made to only trusted SSH servers, then those use-cases are not vulnerable to this security flaw.", "product_ids": [ "AppStream-8.1.0:openssh-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.src", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.src", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "AppStream-8.1.0:openssh-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.src", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.src", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssh: scp client improper directory name validation" }, { "cve": "CVE-2019-6109", "cwe": { "id": "CWE-451", "name": "User Interface (UI) Misrepresentation of Critical Information" }, "discovery_date": "2019-01-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666119" } ], "notes": [ { "category": "description", "text": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssh: Missing character encoding in progress display allows for spoofing of scp client output", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the scp client shipped with openssh. The SSH protocol or the SSH client is not affected. For more detailed analysis please refer to: https://bugzilla.redhat.com/show_bug.cgi?id=1666119#c3", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0:openssh-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.src", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.src", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-6109" }, { "category": "external", "summary": "RHBZ#1666119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666119" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-6109", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6109" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-6109", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6109" }, { "category": "external", "summary": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt", "url": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt" } ], "release_date": "2018-11-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T22:29:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the OpenSSH server daemon (sshd) will be restarted automatically.", "product_ids": [ "AppStream-8.1.0:openssh-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.src", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.src", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3702" }, { "category": "workaround", "details": "This issue only affects the users of scp binary which is a part of openssh-clients package. Other usage of SSH protocol or other ssh clients is not affected. Administrators can uninstall openssh-clients for additional protection against accidental usage of this binary. Removing the openssh-clients package will make binaries like scp and ssh etc unavailable on that system.\n\nNote: To exploit this flaw, the victim needs to connect to a malicious SSH server or MITM (Man-in-the-middle) the scp connection, both of which can be detected by the system administrator via a change in the host key of the SSH server. Further, if connections via scp are made to only trusted SSH servers, then those use-cases are not vulnerable to this security flaw.", "product_ids": [ "AppStream-8.1.0:openssh-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.src", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.src", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "AppStream-8.1.0:openssh-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.src", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.src", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssh: Missing character encoding in progress display allows for spoofing of scp client output" }, { "cve": "CVE-2019-6111", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-01-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666127" } ], "notes": [ { "category": "description", "text": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).", "title": "Vulnerability description" }, { "category": "summary", "text": "openssh: Improper validation of object names allows malicious server to overwrite files via scp client", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the scp client shipped with openssh. The SSH protocol or the SSH client is not affected. For more detailed analysis please refer to: https://bugzilla.redhat.com/show_bug.cgi?id=1666127#c2", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0:openssh-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.src", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.src", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-6111" }, { "category": "external", "summary": "RHBZ#1666127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666127" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-6111", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6111" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-6111", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6111" }, { "category": "external", "summary": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt", "url": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt" } ], "release_date": "2018-11-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T22:29:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the OpenSSH server daemon (sshd) will be restarted automatically.", "product_ids": [ "AppStream-8.1.0:openssh-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.src", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.src", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3702" }, { "category": "workaround", "details": "This issue only affects the users of scp binary which is a part of openssh-clients package. Other usage of SSH protocol or other ssh clients is not affected. Administrators can uninstall openssh-clients for additional protection against accidental usage of this binary. Removal of openssh-clients package will make the packaged binaries like scp, ssh etc unavailable. \n\nNote: This flaw requires a malicious MITM scp server for exploitation. Use cases where trusted SCP servers are used are not affected by this flaw.", "product_ids": [ "AppStream-8.1.0:openssh-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.src", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.src", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "AppStream-8.1.0:openssh-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.src", "AppStream-8.1.0:openssh-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "AppStream-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "AppStream-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "AppStream-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.src", "BaseOS-8.1.0:openssh-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-askpass-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-askpass-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-cavs-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-cavs-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-clients-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-clients-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-debugsource-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-keycat-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-keycat-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-ldap-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-ldap-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-server-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.aarch64", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.ppc64le", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.s390x", "BaseOS-8.1.0:openssh-server-debuginfo-0:8.0p1-3.el8.x86_64", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.aarch64", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.ppc64le", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.s390x", "BaseOS-8.1.0:pam_ssh_agent_auth-0:0.10.3-7.3.el8.x86_64", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.aarch64", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.ppc64le", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.s390x", "BaseOS-8.1.0:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssh: Improper validation of object names allows malicious server to overwrite files via scp client" } ] }
gsd-2018-20685
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2018-20685", "description": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.", "id": "GSD-2018-20685", "references": [ "https://www.suse.com/security/cve/CVE-2018-20685.html", "https://www.debian.org/security/2019/dsa-4387", "https://access.redhat.com/errata/RHSA-2019:3702", "https://ubuntu.com/security/CVE-2018-20685", "https://advisories.mageia.org/CVE-2018-20685.html", "https://security.archlinux.org/CVE-2018-20685", "https://alas.aws.amazon.com/cve/html/CVE-2018-20685.html", "https://linux.oracle.com/cve/CVE-2018-20685.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-20685" ], "details": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.", "id": "GSD-2018-20685", "modified": "2023-12-13T01:22:29.000065Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-20685", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4387", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4387" }, { "name": "USN-3885-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3885-1/" }, { "name": "https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2", "refsource": "MISC", "url": "https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2" }, { "name": "https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197\u0026r2=1.198\u0026f=h", "refsource": "MISC", "url": "https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197\u0026r2=1.198\u0026f=h" }, { "name": "https://security.netapp.com/advisory/ntap-20190215-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190215-0001/" }, { "name": "106531", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106531" }, { "name": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt", "refsource": "MISC", "url": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt" }, { "name": "GLSA-201903-16", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201903-16" }, { "name": "[debian-lts-announce] 20190325 [SECURITY] [DLA 1728-1] openssh security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "RHSA-2019:3702", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3702" }, { "name": "GLSA-202007-53", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202007-53" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.9", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:winscp:winscp:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.13", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:ontap_select_deploy:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "xcp2361", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:fujitsu:m10-1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "xcp2361", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:fujitsu:m10-4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "xcp2361", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "xcp2361", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:fujitsu:m12-1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "xcp2361", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:fujitsu:m12-2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "xcp2361", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:fujitsu:m12-2s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "xcp3070", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:fujitsu:m10-1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "xcp3070", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:fujitsu:m10-4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "xcp3070", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "xcp3070", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "xcp3070", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:fujitsu:m12-1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "xcp3070", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:fujitsu:m12-2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "xcp3070", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:fujitsu:m12-2s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_x204rna_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.2.7", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_x204rna:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_x204rna_eec_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.2.7", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_x204rna_eec:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-20685" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-863" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2", "refsource": "MISC", "tags": [ "Patch" ], "url": "https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2" }, { "name": "https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197\u0026r2=1.198\u0026f=h", "refsource": "MISC", "tags": [ "Patch" ], "url": "https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197\u0026r2=1.198\u0026f=h" }, { "name": "106531", "refsource": "BID", "tags": [ "Broken Link" ], "url": "http://www.securityfocus.com/bid/106531" }, { "name": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt" }, { "name": "USN-3885-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3885-1/" }, { "name": "DSA-4387", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4387" }, { "name": "https://security.netapp.com/advisory/ntap-20190215-0001/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190215-0001/" }, { "name": "GLSA-201903-16", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201903-16" }, { "name": "[debian-lts-announce] 20190325 [SECURITY] [DLA 1728-1] openssh security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "RHSA-2019:3702", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3702" }, { "name": "GLSA-202007-53", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-53" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6 } }, "lastModifiedDate": "2023-02-23T23:15Z", "publishedDate": "2019-01-10T21:29Z" } } }
ghsa-28hp-2gv6-gjp8
Vulnerability from github
Published
2022-05-13 01:19
Modified
2022-05-13 01:19
Severity ?
VLAI Severity ?
Details
In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
{ "affected": [], "aliases": [ "CVE-2018-20685" ], "database_specific": { "cwe_ids": [ "CWE-863" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-01-10T21:29:00Z", "severity": "MODERATE" }, "details": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.", "id": "GHSA-28hp-2gv6-gjp8", "modified": "2022-05-13T01:19:56Z", "published": "2022-05-13T01:19:56Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20685" }, { "type": "WEB", "url": "https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:3702" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" }, { "type": "WEB", "url": "https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197\u0026r2=1.198\u0026f=h" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201903-16" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202007-53" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20190215-0001" }, { "type": "WEB", "url": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3885-1" }, { "type": "WEB", "url": "https://www.debian.org/security/2019/dsa-4387" }, { "type": "WEB", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "type": "WEB", "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/106531" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…