Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-26465 (GCVE-0-2025-26465)
Vulnerability from cvelistv5
Published
2025-02-18 18:27
Modified
2025-08-14 13:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-390 - Detection of Error Condition Without Action
Summary
A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ |
Version: 6.8p1 < |
||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2025-03-03T17:48:15.682Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://lists.debian.org/debian-lts-announce/2025/02/msg00020.html" }, { "url": "https://www.openwall.com/lists/oss-security/2025/02/18/1" }, { "url": "https://www.openwall.com/lists/oss-security/2025/02/18/4" }, { "url": "https://www.theregister.com/2025/02/18/openssh_vulnerabilities_mitm_dos/" }, { "url": "https://bugzilla.suse.com/show_bug.cgi?id=1237040" }, { "url": "https://security-tracker.debian.org/tracker/CVE-2025-26465" }, { "url": "https://ftp.openbsd.org/pub/OpenBSD/patches/7.6/common/008_ssh.patch.sig" }, { "url": "https://ubuntu.com/security/CVE-2025-26465" }, { "url": "https://www.openssh.com/releasenotes.html#9.9p2" }, { "url": "https://blog.qualys.com/vulnerabilities-threat-research/2025/02/18/qualys-tru-discovers-two-vulnerabilities-in-openssh-cve-2025-26465-cve-2025-26466" }, { "url": "https://lists.mindrot.org/pipermail/openssh-unix-announce/2025-February/000161.html" }, { "url": "https://security.netapp.com/advisory/ntap-20250228-0003/" }, { "url": "https://www.vicarius.io/vsociety/posts/cve-2025-26465-detect-vulnerable-openssh" }, { "url": "https://www.vicarius.io/vsociety/posts/cve-2025-26465-mitigate-vulnerable-openssh" } ], "title": "CVE Program Container", "x_generator": { "engine": "ADPogram 0.0.1" } }, { "metrics": [ { "other": { "content": { "id": "CVE-2025-26465", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-19T15:02:09.369445Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-19T15:02:45.555Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://seclists.org/oss-sec/2025/q1/144" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://www.openssh.com/", "defaultStatus": "unaffected", "packageName": "OpenSSH", "repo": "https://anongit.mindrot.org/openssh.git", "versions": [ { "lessThanOrEqual": "9.9p1", "status": "affected", "version": "6.8p1", "versionType": "custom" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:9::baseos", "cpe:/a:redhat:enterprise_linux:9::appstream" ], "defaultStatus": "affected", "packageName": "openssh", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:8.7p1-45.el9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:9::baseos", "cpe:/a:redhat:enterprise_linux:9::appstream" ], "defaultStatus": "affected", "packageName": "openssh", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:8.7p1-45.el9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_eus:9.4::baseos", "cpe:/a:redhat:rhel_eus:9.4::appstream" ], "defaultStatus": "affected", "packageName": "openssh", "product": "Red Hat Enterprise Linux 9.4 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:8.7p1-38.el9_4.5", "versionType": "rpm" } ] }, { "collectionURL": "https://catalog.redhat.com/software/containers/", "cpes": [ "cpe:/a:redhat:discovery:1.14::el9" ], "defaultStatus": "affected", "packageName": "registry.redhat.io/discovery/discovery-server-rhel9", "product": "Red Hat Discovery 1.14", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:10" ], "defaultStatus": "unaffected", "packageName": "openssh", "product": "Red Hat Enterprise Linux 10", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unknown", "packageName": "openssh", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7" ], "defaultStatus": "unknown", "packageName": "openssh", "product": "Red Hat Enterprise Linux 7", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:8" ], "defaultStatus": "affected", "packageName": "openssh", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:openshift:4" ], "defaultStatus": "affected", "packageName": "rhcos", "product": "Red Hat OpenShift Container Platform 4", "vendor": "Red Hat" } ], "datePublic": "2025-02-17T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client\u0027s memory resource first, turning the attack complexity high." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Moderate" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-390", "description": "Detection of Error Condition Without Action", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T13:06:48.611Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2025:3837", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2025:3837" }, { "name": "RHSA-2025:6993", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2025:6993" }, { "name": "RHSA-2025:8385", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2025:8385" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2025-26465" }, { "name": "RHBZ#2344780", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344780" }, { "url": "https://seclists.org/oss-sec/2025/q1/144" } ], "timeline": [ { "lang": "en", "time": "2025-02-10T21:56:03.853000+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2025-02-17T00:00:00+00:00", "value": "Made public." } ], "title": "Openssh: machine-in-the-middle attack if verifyhostkeydns is enabled", "workarounds": [ { "lang": "en", "value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." } ], "x_redhatCweChain": "CWE-390: Detection of Error Condition Without Action" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2025-26465", "datePublished": "2025-02-18T18:27:16.843Z", "dateReserved": "2025-02-10T18:31:47.978Z", "dateUpdated": "2025-08-14T13:06:48.611Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-26465\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2025-02-18T19:15:29.230\",\"lastModified\":\"2025-06-02T15:15:33.437\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client\u0027s memory resource first, turning the attack complexity high.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una vulnerabilidad en OpenSSH cuando la opci\u00f3n VerifyHostKeyDNS est\u00e1 habilitada. Un ataque de m\u00e1quina en el medio puede ser realizado mediante una m\u00e1quina maliciosa que se hace pasar por un servidor leg\u00edtimo. Este problema ocurre debido a c\u00f3mo los c\u00f3digos de error de OpenSSH Mishandles en condiciones espec\u00edficas al verificar la clave del host. Para que un ataque se considere exitoso, el atacante debe lograr agotar el recurso de memoria del cliente primero, lo que gira la complejidad del ataque.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":5.2},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-390\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.9\",\"versionEndIncluding\":\"9.8\",\"matchCriteriaId\":\"AD9E4318-20E3-420F-8EF5-7C05C3386586\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.8:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"50836FA3-8116-4D58-B73E-B4830FB3A551\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:9.9:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2B53BBB-6916-478C-A896-77C7F7E7D5DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:9.9:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7A2B794-BA83-4A01-BD2E-541F18CB9E37\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A20333EE-4C13-426E-8B54-D78679D5DDB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"932D137F-528B-4526-9A89-CD59FA1AB0FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46D69DCC-AE4D-4EA5-861C-D60951444C6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F6FB57C-2BC7-487C-96DD-132683AEB35D\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2025:3837\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:6993\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:8385\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2025-26465\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2344780\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/oss-sec/2025/q1/144\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://blog.qualys.com/vulnerabilities-threat-research/2025/02/18/qualys-tru-discovers-two-vulnerabilities-in-openssh-cve-2025-26465-cve-2025-26466\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=1237040\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://ftp.openbsd.org/pub/OpenBSD/patches/7.6/common/008_ssh.patch.sig\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2025/02/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.mindrot.org/pipermail/openssh-unix-announce/2025-February/000161.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security-tracker.debian.org/tracker/CVE-2025-26465\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20250228-0003/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://ubuntu.com/security/CVE-2025-26465\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openssh.com/releasenotes.html#9.9p2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://www.openwall.com/lists/oss-security/2025/02/18/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.openwall.com/lists/oss-security/2025/02/18/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.theregister.com/2025/02/18/openssh_vulnerabilities_mitm_dos/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Press/Media Coverage\"]},{\"url\":\"https://www.vicarius.io/vsociety/posts/cve-2025-26465-detect-vulnerable-openssh\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.vicarius.io/vsociety/posts/cve-2025-26465-mitigate-vulnerable-openssh\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/oss-sec/2025/q1/144\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://lists.debian.org/debian-lts-announce/2025/02/msg00020.html\"}, {\"url\": \"https://www.openwall.com/lists/oss-security/2025/02/18/1\"}, {\"url\": \"https://www.openwall.com/lists/oss-security/2025/02/18/4\"}, {\"url\": \"https://www.theregister.com/2025/02/18/openssh_vulnerabilities_mitm_dos/\"}, {\"url\": \"https://bugzilla.suse.com/show_bug.cgi?id=1237040\"}, {\"url\": \"https://security-tracker.debian.org/tracker/CVE-2025-26465\"}, {\"url\": \"https://ftp.openbsd.org/pub/OpenBSD/patches/7.6/common/008_ssh.patch.sig\"}, {\"url\": \"https://ubuntu.com/security/CVE-2025-26465\"}, {\"url\": \"https://www.openssh.com/releasenotes.html#9.9p2\"}, {\"url\": \"https://blog.qualys.com/vulnerabilities-threat-research/2025/02/18/qualys-tru-discovers-two-vulnerabilities-in-openssh-cve-2025-26465-cve-2025-26466\"}, {\"url\": \"https://lists.mindrot.org/pipermail/openssh-unix-announce/2025-February/000161.html\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20250228-0003/\"}, {\"url\": \"https://www.vicarius.io/vsociety/posts/cve-2025-26465-detect-vulnerable-openssh\"}, {\"url\": \"https://www.vicarius.io/vsociety/posts/cve-2025-26465-mitigate-vulnerable-openssh\"}], \"x_generator\": {\"engine\": \"ADPogram 0.0.1\"}, \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-03-03T17:48:15.682Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-26465\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-19T15:02:09.369445Z\"}}}], \"references\": [{\"url\": \"https://seclists.org/oss-sec/2025/q1/144\", \"tags\": [\"exploit\"]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-19T14:43:31.095Z\"}}], \"cna\": {\"title\": \"Openssh: machine-in-the-middle attack if verifyhostkeydns is enabled\", \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Moderate\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"repo\": \"https://anongit.mindrot.org/openssh.git\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.8p1\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"9.9p1\"}], \"packageName\": \"OpenSSH\", \"collectionURL\": \"https://www.openssh.com/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9::baseos\", \"cpe:/a:redhat:enterprise_linux:9::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:8.7p1-45.el9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"openssh\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9::baseos\", \"cpe:/a:redhat:enterprise_linux:9::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:8.7p1-45.el9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"openssh\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_eus:9.4::baseos\", \"cpe:/a:redhat:rhel_eus:9.4::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.4 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:8.7p1-38.el9_4.5\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"openssh\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:discovery:1.14::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Discovery 1.14\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"registry.redhat.io/discovery/discovery-server-rhel9\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"packageName\": \"openssh\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6\", \"packageName\": \"openssh\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:7\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7\", \"packageName\": \"openssh\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"packageName\": \"openssh\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4\", \"packageName\": \"rhcos\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-02-10T21:56:03.853000+00:00\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2025-02-17T00:00:00+00:00\", \"value\": \"Made public.\"}], \"datePublic\": \"2025-02-17T00:00:00.000Z\", \"references\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2025:3837\", \"name\": \"RHSA-2025:3837\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:6993\", \"name\": \"RHSA-2025:6993\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:8385\", \"name\": \"RHSA-2025:8385\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2025-26465\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2344780\", \"name\": \"RHBZ#2344780\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://seclists.org/oss-sec/2025/q1/144\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client\u0027s memory resource first, turning the attack complexity high.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-390\", \"description\": \"Detection of Error Condition Without Action\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2025-08-14T13:06:48.611Z\"}, \"x_redhatCweChain\": \"CWE-390: Detection of Error Condition Without Action\"}}", "cveMetadata": "{\"cveId\": \"CVE-2025-26465\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-14T13:06:48.611Z\", \"dateReserved\": \"2025-02-10T18:31:47.978Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2025-02-18T18:27:16.843Z\", \"assignerShortName\": \"redhat\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
rhsa-2025:3837
Vulnerability from csaf_redhat
Published
2025-04-14 11:04
Modified
2025-09-10 15:37
Summary
Red Hat Security Advisory: openssh security update
Notes
Topic
An update for openssh is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Security Fix(es):
* openssh: Machine-in-the-middle attack if VerifyHostKeyDNS is enabled (CVE-2025-26465)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openssh is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.\n\nSecurity Fix(es):\n\n* openssh: Machine-in-the-middle attack if VerifyHostKeyDNS is enabled (CVE-2025-26465)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:3837", "url": "https://access.redhat.com/errata/RHSA-2025:3837" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2344780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344780" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_3837.json" } ], "title": "Red Hat Security Advisory: openssh security update", "tracking": { "current_release_date": "2025-09-10T15:37:51+00:00", "generator": { "date": "2025-09-10T15:37:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2025:3837", "initial_release_date": "2025-04-14T11:04:59+00:00", "revision_history": [ { "date": "2025-04-14T11:04:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-04-14T11:04:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T15:37:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:9.4::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:8.7p1-38.el9_4.5.aarch64", "product": { "name": "openssh-askpass-0:8.7p1-38.el9_4.5.aarch64", "product_id": "openssh-askpass-0:8.7p1-38.el9_4.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@8.7p1-38.el9_4.5?arch=aarch64" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.aarch64", "product": { "name": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.aarch64", "product_id": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.10.4-5.38.el9_4.5?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-debugsource-0:8.7p1-38.el9_4.5.aarch64", "product": { "name": "openssh-debugsource-0:8.7p1-38.el9_4.5.aarch64", "product_id": "openssh-debugsource-0:8.7p1-38.el9_4.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debugsource@8.7p1-38.el9_4.5?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "product": { "name": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "product_id": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@8.7p1-38.el9_4.5?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "product": { "name": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "product_id": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients-debuginfo@8.7p1-38.el9_4.5?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "product": { "name": "openssh-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "product_id": "openssh-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@8.7p1-38.el9_4.5?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "product": { "name": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "product_id": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@8.7p1-38.el9_4.5?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "product": { "name": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "product_id": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server-debuginfo@8.7p1-38.el9_4.5?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "product": { "name": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "product_id": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-sk-dummy-debuginfo@8.7p1-38.el9_4.5?arch=aarch64" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.aarch64", "product": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.aarch64", "product_id": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth-debuginfo@0.10.4-5.38.el9_4.5?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-0:8.7p1-38.el9_4.5.aarch64", "product": { "name": "openssh-0:8.7p1-38.el9_4.5.aarch64", "product_id": "openssh-0:8.7p1-38.el9_4.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@8.7p1-38.el9_4.5?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-clients-0:8.7p1-38.el9_4.5.aarch64", "product": { "name": "openssh-clients-0:8.7p1-38.el9_4.5.aarch64", "product_id": "openssh-clients-0:8.7p1-38.el9_4.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@8.7p1-38.el9_4.5?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-keycat-0:8.7p1-38.el9_4.5.aarch64", "product": { "name": "openssh-keycat-0:8.7p1-38.el9_4.5.aarch64", "product_id": "openssh-keycat-0:8.7p1-38.el9_4.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat@8.7p1-38.el9_4.5?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-server-0:8.7p1-38.el9_4.5.aarch64", "product": { "name": "openssh-server-0:8.7p1-38.el9_4.5.aarch64", "product_id": "openssh-server-0:8.7p1-38.el9_4.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@8.7p1-38.el9_4.5?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:8.7p1-38.el9_4.5.ppc64le", "product": { "name": "openssh-askpass-0:8.7p1-38.el9_4.5.ppc64le", "product_id": "openssh-askpass-0:8.7p1-38.el9_4.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@8.7p1-38.el9_4.5?arch=ppc64le" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.ppc64le", "product": { "name": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.ppc64le", "product_id": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.10.4-5.38.el9_4.5?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-debugsource-0:8.7p1-38.el9_4.5.ppc64le", "product": { "name": "openssh-debugsource-0:8.7p1-38.el9_4.5.ppc64le", "product_id": "openssh-debugsource-0:8.7p1-38.el9_4.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debugsource@8.7p1-38.el9_4.5?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "product": { "name": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "product_id": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@8.7p1-38.el9_4.5?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "product": { "name": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "product_id": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients-debuginfo@8.7p1-38.el9_4.5?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "product": { "name": "openssh-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "product_id": "openssh-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@8.7p1-38.el9_4.5?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "product": { "name": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "product_id": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@8.7p1-38.el9_4.5?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "product": { "name": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "product_id": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server-debuginfo@8.7p1-38.el9_4.5?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "product": { "name": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "product_id": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-sk-dummy-debuginfo@8.7p1-38.el9_4.5?arch=ppc64le" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.ppc64le", "product": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.ppc64le", "product_id": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth-debuginfo@0.10.4-5.38.el9_4.5?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-0:8.7p1-38.el9_4.5.ppc64le", "product": { "name": "openssh-0:8.7p1-38.el9_4.5.ppc64le", "product_id": "openssh-0:8.7p1-38.el9_4.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@8.7p1-38.el9_4.5?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-clients-0:8.7p1-38.el9_4.5.ppc64le", "product": { "name": "openssh-clients-0:8.7p1-38.el9_4.5.ppc64le", "product_id": "openssh-clients-0:8.7p1-38.el9_4.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@8.7p1-38.el9_4.5?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-keycat-0:8.7p1-38.el9_4.5.ppc64le", "product": { "name": "openssh-keycat-0:8.7p1-38.el9_4.5.ppc64le", "product_id": "openssh-keycat-0:8.7p1-38.el9_4.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat@8.7p1-38.el9_4.5?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-server-0:8.7p1-38.el9_4.5.ppc64le", "product": { "name": "openssh-server-0:8.7p1-38.el9_4.5.ppc64le", "product_id": "openssh-server-0:8.7p1-38.el9_4.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@8.7p1-38.el9_4.5?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:8.7p1-38.el9_4.5.x86_64", "product": { "name": "openssh-askpass-0:8.7p1-38.el9_4.5.x86_64", "product_id": "openssh-askpass-0:8.7p1-38.el9_4.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@8.7p1-38.el9_4.5?arch=x86_64" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.x86_64", "product": { "name": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.x86_64", "product_id": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.10.4-5.38.el9_4.5?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-debugsource-0:8.7p1-38.el9_4.5.x86_64", "product": { "name": "openssh-debugsource-0:8.7p1-38.el9_4.5.x86_64", "product_id": "openssh-debugsource-0:8.7p1-38.el9_4.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debugsource@8.7p1-38.el9_4.5?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "product": { "name": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "product_id": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@8.7p1-38.el9_4.5?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "product": { "name": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "product_id": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients-debuginfo@8.7p1-38.el9_4.5?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "product": { "name": "openssh-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "product_id": "openssh-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@8.7p1-38.el9_4.5?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "product": { "name": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "product_id": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@8.7p1-38.el9_4.5?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "product": { "name": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "product_id": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server-debuginfo@8.7p1-38.el9_4.5?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "product": { "name": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "product_id": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-sk-dummy-debuginfo@8.7p1-38.el9_4.5?arch=x86_64" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.x86_64", "product": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.x86_64", "product_id": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth-debuginfo@0.10.4-5.38.el9_4.5?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-0:8.7p1-38.el9_4.5.x86_64", "product": { "name": "openssh-0:8.7p1-38.el9_4.5.x86_64", "product_id": "openssh-0:8.7p1-38.el9_4.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@8.7p1-38.el9_4.5?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-clients-0:8.7p1-38.el9_4.5.x86_64", "product": { "name": "openssh-clients-0:8.7p1-38.el9_4.5.x86_64", "product_id": "openssh-clients-0:8.7p1-38.el9_4.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@8.7p1-38.el9_4.5?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-keycat-0:8.7p1-38.el9_4.5.x86_64", "product": { "name": "openssh-keycat-0:8.7p1-38.el9_4.5.x86_64", "product_id": "openssh-keycat-0:8.7p1-38.el9_4.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat@8.7p1-38.el9_4.5?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-server-0:8.7p1-38.el9_4.5.x86_64", "product": { "name": "openssh-server-0:8.7p1-38.el9_4.5.x86_64", "product_id": "openssh-server-0:8.7p1-38.el9_4.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@8.7p1-38.el9_4.5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:8.7p1-38.el9_4.5.s390x", "product": { "name": "openssh-askpass-0:8.7p1-38.el9_4.5.s390x", "product_id": "openssh-askpass-0:8.7p1-38.el9_4.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@8.7p1-38.el9_4.5?arch=s390x" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.s390x", "product": { "name": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.s390x", "product_id": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.10.4-5.38.el9_4.5?arch=s390x" } } }, { "category": "product_version", "name": "openssh-debugsource-0:8.7p1-38.el9_4.5.s390x", "product": { "name": "openssh-debugsource-0:8.7p1-38.el9_4.5.s390x", "product_id": "openssh-debugsource-0:8.7p1-38.el9_4.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debugsource@8.7p1-38.el9_4.5?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.s390x", "product": { "name": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.s390x", "product_id": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@8.7p1-38.el9_4.5?arch=s390x" } } }, { "category": "product_version", "name": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.s390x", "product": { "name": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.s390x", "product_id": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients-debuginfo@8.7p1-38.el9_4.5?arch=s390x" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:8.7p1-38.el9_4.5.s390x", "product": { "name": "openssh-debuginfo-0:8.7p1-38.el9_4.5.s390x", "product_id": "openssh-debuginfo-0:8.7p1-38.el9_4.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@8.7p1-38.el9_4.5?arch=s390x" } } }, { "category": "product_version", "name": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.s390x", "product": { "name": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.s390x", "product_id": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@8.7p1-38.el9_4.5?arch=s390x" } } }, { "category": "product_version", "name": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.s390x", "product": { "name": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.s390x", "product_id": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server-debuginfo@8.7p1-38.el9_4.5?arch=s390x" } } }, { "category": "product_version", "name": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.s390x", "product": { "name": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.s390x", "product_id": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-sk-dummy-debuginfo@8.7p1-38.el9_4.5?arch=s390x" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.s390x", "product": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.s390x", "product_id": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth-debuginfo@0.10.4-5.38.el9_4.5?arch=s390x" } } }, { "category": "product_version", "name": "openssh-0:8.7p1-38.el9_4.5.s390x", "product": { "name": "openssh-0:8.7p1-38.el9_4.5.s390x", "product_id": "openssh-0:8.7p1-38.el9_4.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@8.7p1-38.el9_4.5?arch=s390x" } } }, { "category": "product_version", "name": "openssh-clients-0:8.7p1-38.el9_4.5.s390x", "product": { "name": "openssh-clients-0:8.7p1-38.el9_4.5.s390x", "product_id": "openssh-clients-0:8.7p1-38.el9_4.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@8.7p1-38.el9_4.5?arch=s390x" } } }, { "category": "product_version", "name": "openssh-keycat-0:8.7p1-38.el9_4.5.s390x", "product": { "name": "openssh-keycat-0:8.7p1-38.el9_4.5.s390x", "product_id": "openssh-keycat-0:8.7p1-38.el9_4.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat@8.7p1-38.el9_4.5?arch=s390x" } } }, { "category": "product_version", "name": "openssh-server-0:8.7p1-38.el9_4.5.s390x", "product": { "name": "openssh-server-0:8.7p1-38.el9_4.5.s390x", "product_id": "openssh-server-0:8.7p1-38.el9_4.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@8.7p1-38.el9_4.5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-0:8.7p1-38.el9_4.5.src", "product": { "name": "openssh-0:8.7p1-38.el9_4.5.src", "product_id": "openssh-0:8.7p1-38.el9_4.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@8.7p1-38.el9_4.5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.7p1-38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.aarch64" }, "product_reference": "openssh-0:8.7p1-38.el9_4.5.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.7p1-38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.ppc64le" }, "product_reference": "openssh-0:8.7p1-38.el9_4.5.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.7p1-38.el9_4.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.s390x" }, "product_reference": "openssh-0:8.7p1-38.el9_4.5.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.7p1-38.el9_4.5.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.src" }, "product_reference": "openssh-0:8.7p1-38.el9_4.5.src", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.7p1-38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.x86_64" }, "product_reference": "openssh-0:8.7p1-38.el9_4.5.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:8.7p1-38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.aarch64" }, "product_reference": "openssh-askpass-0:8.7p1-38.el9_4.5.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:8.7p1-38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.ppc64le" }, "product_reference": "openssh-askpass-0:8.7p1-38.el9_4.5.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:8.7p1-38.el9_4.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.s390x" }, "product_reference": "openssh-askpass-0:8.7p1-38.el9_4.5.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:8.7p1-38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.x86_64" }, "product_reference": "openssh-askpass-0:8.7p1-38.el9_4.5.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.aarch64" }, "product_reference": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.ppc64le" }, "product_reference": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.s390x" }, "product_reference": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.x86_64" }, "product_reference": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:8.7p1-38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.aarch64" }, "product_reference": "openssh-clients-0:8.7p1-38.el9_4.5.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:8.7p1-38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.ppc64le" }, "product_reference": "openssh-clients-0:8.7p1-38.el9_4.5.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:8.7p1-38.el9_4.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.s390x" }, "product_reference": "openssh-clients-0:8.7p1-38.el9_4.5.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:8.7p1-38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.x86_64" }, "product_reference": "openssh-clients-0:8.7p1-38.el9_4.5.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.aarch64" }, "product_reference": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.ppc64le" }, "product_reference": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.s390x" }, "product_reference": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.x86_64" }, "product_reference": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:8.7p1-38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.aarch64" }, "product_reference": "openssh-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:8.7p1-38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.ppc64le" }, "product_reference": "openssh-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:8.7p1-38.el9_4.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.s390x" }, "product_reference": "openssh-debuginfo-0:8.7p1-38.el9_4.5.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:8.7p1-38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.x86_64" }, "product_reference": "openssh-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debugsource-0:8.7p1-38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.aarch64" }, "product_reference": "openssh-debugsource-0:8.7p1-38.el9_4.5.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debugsource-0:8.7p1-38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.ppc64le" }, "product_reference": "openssh-debugsource-0:8.7p1-38.el9_4.5.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debugsource-0:8.7p1-38.el9_4.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.s390x" }, "product_reference": "openssh-debugsource-0:8.7p1-38.el9_4.5.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debugsource-0:8.7p1-38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.x86_64" }, "product_reference": "openssh-debugsource-0:8.7p1-38.el9_4.5.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:8.7p1-38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.aarch64" }, "product_reference": "openssh-keycat-0:8.7p1-38.el9_4.5.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:8.7p1-38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.ppc64le" }, "product_reference": "openssh-keycat-0:8.7p1-38.el9_4.5.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:8.7p1-38.el9_4.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.s390x" }, "product_reference": "openssh-keycat-0:8.7p1-38.el9_4.5.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:8.7p1-38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.x86_64" }, "product_reference": "openssh-keycat-0:8.7p1-38.el9_4.5.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.aarch64" }, "product_reference": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.ppc64le" }, "product_reference": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.s390x" }, "product_reference": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.x86_64" }, "product_reference": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:8.7p1-38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.aarch64" }, "product_reference": "openssh-server-0:8.7p1-38.el9_4.5.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:8.7p1-38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.ppc64le" }, "product_reference": "openssh-server-0:8.7p1-38.el9_4.5.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:8.7p1-38.el9_4.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.s390x" }, "product_reference": "openssh-server-0:8.7p1-38.el9_4.5.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:8.7p1-38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.x86_64" }, "product_reference": "openssh-server-0:8.7p1-38.el9_4.5.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.aarch64" }, "product_reference": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.ppc64le" }, "product_reference": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.s390x" }, "product_reference": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.x86_64" }, "product_reference": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.aarch64" }, "product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.ppc64le" }, "product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.s390x" }, "product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.x86_64" }, "product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.aarch64" }, "product_reference": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.ppc64le" }, "product_reference": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.aarch64" }, "product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.ppc64le" }, "product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.s390x" }, "product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.x86_64" }, "product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.7p1-38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.aarch64" }, "product_reference": "openssh-0:8.7p1-38.el9_4.5.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.7p1-38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.ppc64le" }, "product_reference": "openssh-0:8.7p1-38.el9_4.5.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.7p1-38.el9_4.5.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.s390x" }, "product_reference": "openssh-0:8.7p1-38.el9_4.5.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.7p1-38.el9_4.5.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.src" }, "product_reference": "openssh-0:8.7p1-38.el9_4.5.src", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.7p1-38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.x86_64" }, "product_reference": "openssh-0:8.7p1-38.el9_4.5.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:8.7p1-38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.aarch64" }, "product_reference": "openssh-askpass-0:8.7p1-38.el9_4.5.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:8.7p1-38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.ppc64le" }, "product_reference": "openssh-askpass-0:8.7p1-38.el9_4.5.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:8.7p1-38.el9_4.5.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.s390x" }, "product_reference": "openssh-askpass-0:8.7p1-38.el9_4.5.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:8.7p1-38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.x86_64" }, "product_reference": "openssh-askpass-0:8.7p1-38.el9_4.5.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.aarch64" }, "product_reference": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.ppc64le" }, "product_reference": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.s390x" }, "product_reference": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.x86_64" }, "product_reference": "openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:8.7p1-38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.aarch64" }, "product_reference": "openssh-clients-0:8.7p1-38.el9_4.5.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:8.7p1-38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.ppc64le" }, "product_reference": "openssh-clients-0:8.7p1-38.el9_4.5.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:8.7p1-38.el9_4.5.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.s390x" }, "product_reference": "openssh-clients-0:8.7p1-38.el9_4.5.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:8.7p1-38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.x86_64" }, "product_reference": "openssh-clients-0:8.7p1-38.el9_4.5.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.aarch64" }, "product_reference": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.ppc64le" }, "product_reference": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.s390x" }, "product_reference": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.x86_64" }, "product_reference": "openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:8.7p1-38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.aarch64" }, "product_reference": "openssh-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:8.7p1-38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.ppc64le" }, "product_reference": "openssh-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:8.7p1-38.el9_4.5.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.s390x" }, "product_reference": "openssh-debuginfo-0:8.7p1-38.el9_4.5.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:8.7p1-38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.x86_64" }, "product_reference": "openssh-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debugsource-0:8.7p1-38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.aarch64" }, "product_reference": "openssh-debugsource-0:8.7p1-38.el9_4.5.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debugsource-0:8.7p1-38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.ppc64le" }, "product_reference": "openssh-debugsource-0:8.7p1-38.el9_4.5.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debugsource-0:8.7p1-38.el9_4.5.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.s390x" }, "product_reference": "openssh-debugsource-0:8.7p1-38.el9_4.5.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debugsource-0:8.7p1-38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.x86_64" }, "product_reference": "openssh-debugsource-0:8.7p1-38.el9_4.5.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:8.7p1-38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.aarch64" }, "product_reference": "openssh-keycat-0:8.7p1-38.el9_4.5.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:8.7p1-38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.ppc64le" }, "product_reference": "openssh-keycat-0:8.7p1-38.el9_4.5.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:8.7p1-38.el9_4.5.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.s390x" }, "product_reference": "openssh-keycat-0:8.7p1-38.el9_4.5.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:8.7p1-38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.x86_64" }, "product_reference": "openssh-keycat-0:8.7p1-38.el9_4.5.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.aarch64" }, "product_reference": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.ppc64le" }, "product_reference": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.s390x" }, "product_reference": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.x86_64" }, "product_reference": "openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:8.7p1-38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.aarch64" }, "product_reference": "openssh-server-0:8.7p1-38.el9_4.5.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:8.7p1-38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.ppc64le" }, "product_reference": "openssh-server-0:8.7p1-38.el9_4.5.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:8.7p1-38.el9_4.5.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.s390x" }, "product_reference": "openssh-server-0:8.7p1-38.el9_4.5.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:8.7p1-38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.x86_64" }, "product_reference": "openssh-server-0:8.7p1-38.el9_4.5.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.aarch64" }, "product_reference": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.ppc64le" }, "product_reference": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.s390x" }, "product_reference": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.x86_64" }, "product_reference": "openssh-server-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.aarch64" }, "product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.ppc64le" }, "product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.s390x" }, "product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.x86_64" }, "product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.aarch64" }, "product_reference": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.ppc64le" }, "product_reference": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.aarch64" }, "product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.ppc64le" }, "product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.s390x" }, "product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.x86_64" }, "product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-26465", "cwe": { "id": "CWE-390", "name": "Detection of Error Condition Without Action" }, "discovery_date": "2025-02-10T21:56:03.853000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344780" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client\u0027s memory resource first, turning the attack complexity high.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssh: Machine-in-the-middle attack if VerifyHostKeyDNS is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as a moderate severity vulnerability instead of important because it requires specific conditions to be exploitable. First, the OpenSSH client must have the VerifyHostKeyDNS option enabled, which is disabled by default in Red Hat Enterprise Linux (RHEL). \n\nAdditionally, while the attack allows a machine-in-the-middle (MITM) adversary to trick the client into accepting an incorrect host key, it does not directly lead to code execution or immediate system compromise. Instead, the attack requires additional steps, such as credential interception or session hijacking to fully exploit the breach.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-390: Detection of Error Condition Without Action vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform runs containerized workloads managed by liveness and readiness probes, ensuring applications recover from failures and do not operate in an unhealthy or insecure state. Firewalls are configured to fail securely, blocking unauthorized or malicious traffic during system failures or misconfigurations. Event logs are centrally collected and analyzed to detect recurring errors, crashes, and anomalous behavior. Error conditions are handled securely and audibly, ensuring failures are logged and addressed rather than ignored.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.src", "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.src", "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-26465" }, { "category": "external", "summary": "RHBZ#2344780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344780" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-26465", "url": "https://www.cve.org/CVERecord?id=CVE-2025-26465" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-26465", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-26465" }, { "category": "external", "summary": "https://seclists.org/oss-sec/2025/q1/144", "url": "https://seclists.org/oss-sec/2025/q1/144" } ], "release_date": "2025-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-14T11:04:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.src", "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.src", "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3837" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.src", "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.src", "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.src", "AppStream-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.x86_64", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.aarch64", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.ppc64le", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.s390x", "AppStream-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.src", "BaseOS-9.4.0.Z.EUS:openssh-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-askpass-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-clients-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-debugsource-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-keycat-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-server-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.38.el9_4.5.x86_64", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.aarch64", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.ppc64le", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.s390x", "BaseOS-9.4.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.38.el9_4.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssh: Machine-in-the-middle attack if VerifyHostKeyDNS is enabled" } ] }
rhsa-2025:6993
Vulnerability from csaf_redhat
Published
2025-05-13 08:40
Modified
2025-09-10 15:38
Summary
Red Hat Security Advisory: openssh security update
Notes
Topic
An update for openssh is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Security Fix(es):
* openssh: Machine-in-the-middle attack if VerifyHostKeyDNS is enabled (CVE-2025-26465)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openssh is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.\n\nSecurity Fix(es):\n\n* openssh: Machine-in-the-middle attack if VerifyHostKeyDNS is enabled (CVE-2025-26465)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:6993", "url": "https://access.redhat.com/errata/RHSA-2025:6993" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.6_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.6_release_notes/index" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2344780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344780" }, { "category": "external", "summary": "RHEL-47112", "url": "https://issues.redhat.com/browse/RHEL-47112" }, { "category": "external", "summary": "RHEL-52293", "url": "https://issues.redhat.com/browse/RHEL-52293" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_6993.json" } ], "title": "Red Hat Security Advisory: openssh security update", "tracking": { "current_release_date": "2025-09-10T15:38:56+00:00", "generator": { "date": "2025-09-10T15:38:56+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2025:6993", "initial_release_date": "2025-05-13T08:40:48+00:00", "revision_history": [ { "date": "2025-05-13T08:40:48+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-05-13T08:40:48+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T15:38:56+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:8.7p1-45.el9.aarch64", "product": { "name": "openssh-askpass-0:8.7p1-45.el9.aarch64", "product_id": "openssh-askpass-0:8.7p1-45.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@8.7p1-45.el9?arch=aarch64" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.aarch64", "product": { "name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.aarch64", "product_id": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.10.4-5.45.el9?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-debugsource-0:8.7p1-45.el9.aarch64", "product": { "name": "openssh-debugsource-0:8.7p1-45.el9.aarch64", "product_id": "openssh-debugsource-0:8.7p1-45.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debugsource@8.7p1-45.el9?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-askpass-debuginfo-0:8.7p1-45.el9.aarch64", "product": { "name": "openssh-askpass-debuginfo-0:8.7p1-45.el9.aarch64", "product_id": "openssh-askpass-debuginfo-0:8.7p1-45.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@8.7p1-45.el9?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-clients-debuginfo-0:8.7p1-45.el9.aarch64", "product": { "name": "openssh-clients-debuginfo-0:8.7p1-45.el9.aarch64", "product_id": "openssh-clients-debuginfo-0:8.7p1-45.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients-debuginfo@8.7p1-45.el9?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:8.7p1-45.el9.aarch64", "product": { "name": "openssh-debuginfo-0:8.7p1-45.el9.aarch64", "product_id": "openssh-debuginfo-0:8.7p1-45.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@8.7p1-45.el9?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-keycat-debuginfo-0:8.7p1-45.el9.aarch64", "product": { "name": "openssh-keycat-debuginfo-0:8.7p1-45.el9.aarch64", "product_id": "openssh-keycat-debuginfo-0:8.7p1-45.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@8.7p1-45.el9?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-server-debuginfo-0:8.7p1-45.el9.aarch64", "product": { "name": "openssh-server-debuginfo-0:8.7p1-45.el9.aarch64", "product_id": "openssh-server-debuginfo-0:8.7p1-45.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server-debuginfo@8.7p1-45.el9?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.aarch64", "product": { "name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.aarch64", "product_id": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-sk-dummy-debuginfo@8.7p1-45.el9?arch=aarch64" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.aarch64", "product": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.aarch64", "product_id": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth-debuginfo@0.10.4-5.45.el9?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-0:8.7p1-45.el9.aarch64", "product": { "name": "openssh-0:8.7p1-45.el9.aarch64", "product_id": "openssh-0:8.7p1-45.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@8.7p1-45.el9?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-clients-0:8.7p1-45.el9.aarch64", "product": { "name": "openssh-clients-0:8.7p1-45.el9.aarch64", "product_id": "openssh-clients-0:8.7p1-45.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@8.7p1-45.el9?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-keycat-0:8.7p1-45.el9.aarch64", "product": { "name": "openssh-keycat-0:8.7p1-45.el9.aarch64", "product_id": "openssh-keycat-0:8.7p1-45.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat@8.7p1-45.el9?arch=aarch64" } } }, { "category": "product_version", "name": "openssh-server-0:8.7p1-45.el9.aarch64", "product": { "name": "openssh-server-0:8.7p1-45.el9.aarch64", "product_id": "openssh-server-0:8.7p1-45.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@8.7p1-45.el9?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:8.7p1-45.el9.ppc64le", "product": { "name": "openssh-askpass-0:8.7p1-45.el9.ppc64le", "product_id": "openssh-askpass-0:8.7p1-45.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@8.7p1-45.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.ppc64le", "product": { "name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.ppc64le", "product_id": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.10.4-5.45.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-debugsource-0:8.7p1-45.el9.ppc64le", "product": { "name": "openssh-debugsource-0:8.7p1-45.el9.ppc64le", "product_id": "openssh-debugsource-0:8.7p1-45.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debugsource@8.7p1-45.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-askpass-debuginfo-0:8.7p1-45.el9.ppc64le", "product": { "name": "openssh-askpass-debuginfo-0:8.7p1-45.el9.ppc64le", "product_id": "openssh-askpass-debuginfo-0:8.7p1-45.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@8.7p1-45.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-clients-debuginfo-0:8.7p1-45.el9.ppc64le", "product": { "name": "openssh-clients-debuginfo-0:8.7p1-45.el9.ppc64le", "product_id": "openssh-clients-debuginfo-0:8.7p1-45.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients-debuginfo@8.7p1-45.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:8.7p1-45.el9.ppc64le", "product": { "name": "openssh-debuginfo-0:8.7p1-45.el9.ppc64le", "product_id": "openssh-debuginfo-0:8.7p1-45.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@8.7p1-45.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-keycat-debuginfo-0:8.7p1-45.el9.ppc64le", "product": { "name": "openssh-keycat-debuginfo-0:8.7p1-45.el9.ppc64le", "product_id": "openssh-keycat-debuginfo-0:8.7p1-45.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@8.7p1-45.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-server-debuginfo-0:8.7p1-45.el9.ppc64le", "product": { "name": "openssh-server-debuginfo-0:8.7p1-45.el9.ppc64le", "product_id": "openssh-server-debuginfo-0:8.7p1-45.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server-debuginfo@8.7p1-45.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.ppc64le", "product": { "name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.ppc64le", "product_id": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-sk-dummy-debuginfo@8.7p1-45.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.ppc64le", "product": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.ppc64le", "product_id": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth-debuginfo@0.10.4-5.45.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-0:8.7p1-45.el9.ppc64le", "product": { "name": "openssh-0:8.7p1-45.el9.ppc64le", "product_id": "openssh-0:8.7p1-45.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@8.7p1-45.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-clients-0:8.7p1-45.el9.ppc64le", "product": { "name": "openssh-clients-0:8.7p1-45.el9.ppc64le", "product_id": "openssh-clients-0:8.7p1-45.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@8.7p1-45.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-keycat-0:8.7p1-45.el9.ppc64le", "product": { "name": "openssh-keycat-0:8.7p1-45.el9.ppc64le", "product_id": "openssh-keycat-0:8.7p1-45.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat@8.7p1-45.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-server-0:8.7p1-45.el9.ppc64le", "product": { "name": "openssh-server-0:8.7p1-45.el9.ppc64le", "product_id": "openssh-server-0:8.7p1-45.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@8.7p1-45.el9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:8.7p1-45.el9.x86_64", "product": { "name": "openssh-askpass-0:8.7p1-45.el9.x86_64", "product_id": "openssh-askpass-0:8.7p1-45.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@8.7p1-45.el9?arch=x86_64" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.x86_64", "product": { "name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.x86_64", "product_id": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.10.4-5.45.el9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-debugsource-0:8.7p1-45.el9.x86_64", "product": { "name": "openssh-debugsource-0:8.7p1-45.el9.x86_64", "product_id": "openssh-debugsource-0:8.7p1-45.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debugsource@8.7p1-45.el9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-debuginfo-0:8.7p1-45.el9.x86_64", "product": { "name": "openssh-askpass-debuginfo-0:8.7p1-45.el9.x86_64", "product_id": "openssh-askpass-debuginfo-0:8.7p1-45.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@8.7p1-45.el9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-clients-debuginfo-0:8.7p1-45.el9.x86_64", "product": { "name": "openssh-clients-debuginfo-0:8.7p1-45.el9.x86_64", "product_id": "openssh-clients-debuginfo-0:8.7p1-45.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients-debuginfo@8.7p1-45.el9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:8.7p1-45.el9.x86_64", "product": { "name": "openssh-debuginfo-0:8.7p1-45.el9.x86_64", "product_id": "openssh-debuginfo-0:8.7p1-45.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@8.7p1-45.el9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-keycat-debuginfo-0:8.7p1-45.el9.x86_64", "product": { "name": "openssh-keycat-debuginfo-0:8.7p1-45.el9.x86_64", "product_id": "openssh-keycat-debuginfo-0:8.7p1-45.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@8.7p1-45.el9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-server-debuginfo-0:8.7p1-45.el9.x86_64", "product": { "name": "openssh-server-debuginfo-0:8.7p1-45.el9.x86_64", "product_id": "openssh-server-debuginfo-0:8.7p1-45.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server-debuginfo@8.7p1-45.el9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.x86_64", "product": { "name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.x86_64", "product_id": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-sk-dummy-debuginfo@8.7p1-45.el9?arch=x86_64" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.x86_64", "product": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.x86_64", "product_id": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth-debuginfo@0.10.4-5.45.el9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-0:8.7p1-45.el9.x86_64", "product": { "name": "openssh-0:8.7p1-45.el9.x86_64", "product_id": "openssh-0:8.7p1-45.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@8.7p1-45.el9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-clients-0:8.7p1-45.el9.x86_64", "product": { "name": "openssh-clients-0:8.7p1-45.el9.x86_64", "product_id": "openssh-clients-0:8.7p1-45.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@8.7p1-45.el9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-keycat-0:8.7p1-45.el9.x86_64", "product": { "name": "openssh-keycat-0:8.7p1-45.el9.x86_64", "product_id": "openssh-keycat-0:8.7p1-45.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat@8.7p1-45.el9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-server-0:8.7p1-45.el9.x86_64", "product": { "name": "openssh-server-0:8.7p1-45.el9.x86_64", "product_id": "openssh-server-0:8.7p1-45.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@8.7p1-45.el9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:8.7p1-45.el9.s390x", "product": { "name": "openssh-askpass-0:8.7p1-45.el9.s390x", "product_id": "openssh-askpass-0:8.7p1-45.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@8.7p1-45.el9?arch=s390x" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.s390x", "product": { "name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.s390x", "product_id": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.10.4-5.45.el9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-debugsource-0:8.7p1-45.el9.s390x", "product": { "name": "openssh-debugsource-0:8.7p1-45.el9.s390x", "product_id": "openssh-debugsource-0:8.7p1-45.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debugsource@8.7p1-45.el9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-debuginfo-0:8.7p1-45.el9.s390x", "product": { "name": "openssh-askpass-debuginfo-0:8.7p1-45.el9.s390x", "product_id": "openssh-askpass-debuginfo-0:8.7p1-45.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@8.7p1-45.el9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-clients-debuginfo-0:8.7p1-45.el9.s390x", "product": { "name": "openssh-clients-debuginfo-0:8.7p1-45.el9.s390x", "product_id": "openssh-clients-debuginfo-0:8.7p1-45.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients-debuginfo@8.7p1-45.el9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:8.7p1-45.el9.s390x", "product": { "name": "openssh-debuginfo-0:8.7p1-45.el9.s390x", "product_id": "openssh-debuginfo-0:8.7p1-45.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@8.7p1-45.el9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-keycat-debuginfo-0:8.7p1-45.el9.s390x", "product": { "name": "openssh-keycat-debuginfo-0:8.7p1-45.el9.s390x", "product_id": "openssh-keycat-debuginfo-0:8.7p1-45.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@8.7p1-45.el9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-server-debuginfo-0:8.7p1-45.el9.s390x", "product": { "name": "openssh-server-debuginfo-0:8.7p1-45.el9.s390x", "product_id": "openssh-server-debuginfo-0:8.7p1-45.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server-debuginfo@8.7p1-45.el9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.s390x", "product": { "name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.s390x", "product_id": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-sk-dummy-debuginfo@8.7p1-45.el9?arch=s390x" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.s390x", "product": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.s390x", "product_id": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth-debuginfo@0.10.4-5.45.el9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-0:8.7p1-45.el9.s390x", "product": { "name": "openssh-0:8.7p1-45.el9.s390x", "product_id": "openssh-0:8.7p1-45.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@8.7p1-45.el9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-clients-0:8.7p1-45.el9.s390x", "product": { "name": "openssh-clients-0:8.7p1-45.el9.s390x", "product_id": "openssh-clients-0:8.7p1-45.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@8.7p1-45.el9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-keycat-0:8.7p1-45.el9.s390x", "product": { "name": "openssh-keycat-0:8.7p1-45.el9.s390x", "product_id": "openssh-keycat-0:8.7p1-45.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat@8.7p1-45.el9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-server-0:8.7p1-45.el9.s390x", "product": { "name": "openssh-server-0:8.7p1-45.el9.s390x", "product_id": "openssh-server-0:8.7p1-45.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@8.7p1-45.el9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-0:8.7p1-45.el9.src", "product": { "name": "openssh-0:8.7p1-45.el9.src", "product_id": "openssh-0:8.7p1-45.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@8.7p1-45.el9?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.7p1-45.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.aarch64" }, "product_reference": "openssh-0:8.7p1-45.el9.aarch64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.7p1-45.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.ppc64le" }, "product_reference": "openssh-0:8.7p1-45.el9.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.7p1-45.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.s390x" }, "product_reference": "openssh-0:8.7p1-45.el9.s390x", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.7p1-45.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.src" }, "product_reference": "openssh-0:8.7p1-45.el9.src", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.7p1-45.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.x86_64" }, "product_reference": "openssh-0:8.7p1-45.el9.x86_64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:8.7p1-45.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.aarch64" }, "product_reference": "openssh-askpass-0:8.7p1-45.el9.aarch64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:8.7p1-45.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.ppc64le" }, "product_reference": "openssh-askpass-0:8.7p1-45.el9.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:8.7p1-45.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.s390x" }, "product_reference": "openssh-askpass-0:8.7p1-45.el9.s390x", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:8.7p1-45.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.x86_64" }, "product_reference": "openssh-askpass-0:8.7p1-45.el9.x86_64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-debuginfo-0:8.7p1-45.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.aarch64" }, "product_reference": "openssh-askpass-debuginfo-0:8.7p1-45.el9.aarch64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-debuginfo-0:8.7p1-45.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.ppc64le" }, "product_reference": "openssh-askpass-debuginfo-0:8.7p1-45.el9.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-debuginfo-0:8.7p1-45.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.s390x" }, "product_reference": "openssh-askpass-debuginfo-0:8.7p1-45.el9.s390x", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-debuginfo-0:8.7p1-45.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.x86_64" }, "product_reference": "openssh-askpass-debuginfo-0:8.7p1-45.el9.x86_64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:8.7p1-45.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.aarch64" }, "product_reference": "openssh-clients-0:8.7p1-45.el9.aarch64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:8.7p1-45.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.ppc64le" }, "product_reference": "openssh-clients-0:8.7p1-45.el9.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:8.7p1-45.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.s390x" }, "product_reference": "openssh-clients-0:8.7p1-45.el9.s390x", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:8.7p1-45.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.x86_64" }, "product_reference": "openssh-clients-0:8.7p1-45.el9.x86_64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-debuginfo-0:8.7p1-45.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.aarch64" }, "product_reference": "openssh-clients-debuginfo-0:8.7p1-45.el9.aarch64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-debuginfo-0:8.7p1-45.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.ppc64le" }, "product_reference": "openssh-clients-debuginfo-0:8.7p1-45.el9.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-debuginfo-0:8.7p1-45.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.s390x" }, "product_reference": "openssh-clients-debuginfo-0:8.7p1-45.el9.s390x", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-debuginfo-0:8.7p1-45.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.x86_64" }, "product_reference": "openssh-clients-debuginfo-0:8.7p1-45.el9.x86_64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:8.7p1-45.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.aarch64" }, "product_reference": "openssh-debuginfo-0:8.7p1-45.el9.aarch64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:8.7p1-45.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.ppc64le" }, "product_reference": "openssh-debuginfo-0:8.7p1-45.el9.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:8.7p1-45.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.s390x" }, "product_reference": "openssh-debuginfo-0:8.7p1-45.el9.s390x", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:8.7p1-45.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.x86_64" }, "product_reference": "openssh-debuginfo-0:8.7p1-45.el9.x86_64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debugsource-0:8.7p1-45.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.aarch64" }, "product_reference": "openssh-debugsource-0:8.7p1-45.el9.aarch64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debugsource-0:8.7p1-45.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.ppc64le" }, "product_reference": "openssh-debugsource-0:8.7p1-45.el9.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debugsource-0:8.7p1-45.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.s390x" }, "product_reference": "openssh-debugsource-0:8.7p1-45.el9.s390x", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debugsource-0:8.7p1-45.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.x86_64" }, "product_reference": "openssh-debugsource-0:8.7p1-45.el9.x86_64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:8.7p1-45.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.aarch64" }, "product_reference": "openssh-keycat-0:8.7p1-45.el9.aarch64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:8.7p1-45.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.ppc64le" }, "product_reference": "openssh-keycat-0:8.7p1-45.el9.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:8.7p1-45.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.s390x" }, "product_reference": "openssh-keycat-0:8.7p1-45.el9.s390x", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:8.7p1-45.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.x86_64" }, "product_reference": "openssh-keycat-0:8.7p1-45.el9.x86_64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-debuginfo-0:8.7p1-45.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.aarch64" }, "product_reference": "openssh-keycat-debuginfo-0:8.7p1-45.el9.aarch64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-debuginfo-0:8.7p1-45.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.ppc64le" }, "product_reference": "openssh-keycat-debuginfo-0:8.7p1-45.el9.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-debuginfo-0:8.7p1-45.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.s390x" }, "product_reference": "openssh-keycat-debuginfo-0:8.7p1-45.el9.s390x", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-debuginfo-0:8.7p1-45.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.x86_64" }, "product_reference": "openssh-keycat-debuginfo-0:8.7p1-45.el9.x86_64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:8.7p1-45.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-server-0:8.7p1-45.el9.aarch64" }, "product_reference": "openssh-server-0:8.7p1-45.el9.aarch64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:8.7p1-45.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-server-0:8.7p1-45.el9.ppc64le" }, "product_reference": "openssh-server-0:8.7p1-45.el9.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:8.7p1-45.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-server-0:8.7p1-45.el9.s390x" }, "product_reference": "openssh-server-0:8.7p1-45.el9.s390x", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:8.7p1-45.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-server-0:8.7p1-45.el9.x86_64" }, "product_reference": "openssh-server-0:8.7p1-45.el9.x86_64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-debuginfo-0:8.7p1-45.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.aarch64" }, "product_reference": "openssh-server-debuginfo-0:8.7p1-45.el9.aarch64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-debuginfo-0:8.7p1-45.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.ppc64le" }, "product_reference": "openssh-server-debuginfo-0:8.7p1-45.el9.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-debuginfo-0:8.7p1-45.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.s390x" }, "product_reference": "openssh-server-debuginfo-0:8.7p1-45.el9.s390x", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-debuginfo-0:8.7p1-45.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.x86_64" }, "product_reference": "openssh-server-debuginfo-0:8.7p1-45.el9.x86_64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.aarch64" }, "product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.aarch64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.ppc64le" }, "product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.s390x" }, "product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.s390x", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.x86_64" }, "product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.x86_64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.aarch64" }, "product_reference": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.aarch64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.ppc64le" }, "product_reference": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.s390x", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.x86_64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.aarch64" }, "product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.aarch64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.ppc64le" }, "product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.s390x" }, "product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.s390x", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.x86_64" }, "product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.x86_64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.7p1-45.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.aarch64" }, "product_reference": "openssh-0:8.7p1-45.el9.aarch64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.7p1-45.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.ppc64le" }, "product_reference": "openssh-0:8.7p1-45.el9.ppc64le", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.7p1-45.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.s390x" }, "product_reference": "openssh-0:8.7p1-45.el9.s390x", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.7p1-45.el9.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.src" }, "product_reference": "openssh-0:8.7p1-45.el9.src", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:8.7p1-45.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.x86_64" }, "product_reference": "openssh-0:8.7p1-45.el9.x86_64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:8.7p1-45.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.aarch64" }, "product_reference": "openssh-askpass-0:8.7p1-45.el9.aarch64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:8.7p1-45.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.ppc64le" }, "product_reference": "openssh-askpass-0:8.7p1-45.el9.ppc64le", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:8.7p1-45.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.s390x" }, "product_reference": "openssh-askpass-0:8.7p1-45.el9.s390x", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:8.7p1-45.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.x86_64" }, "product_reference": "openssh-askpass-0:8.7p1-45.el9.x86_64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-debuginfo-0:8.7p1-45.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.aarch64" }, "product_reference": "openssh-askpass-debuginfo-0:8.7p1-45.el9.aarch64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-debuginfo-0:8.7p1-45.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.ppc64le" }, "product_reference": "openssh-askpass-debuginfo-0:8.7p1-45.el9.ppc64le", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-debuginfo-0:8.7p1-45.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.s390x" }, "product_reference": "openssh-askpass-debuginfo-0:8.7p1-45.el9.s390x", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-debuginfo-0:8.7p1-45.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.x86_64" }, "product_reference": "openssh-askpass-debuginfo-0:8.7p1-45.el9.x86_64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:8.7p1-45.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.aarch64" }, "product_reference": "openssh-clients-0:8.7p1-45.el9.aarch64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:8.7p1-45.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.ppc64le" }, "product_reference": "openssh-clients-0:8.7p1-45.el9.ppc64le", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:8.7p1-45.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.s390x" }, "product_reference": "openssh-clients-0:8.7p1-45.el9.s390x", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:8.7p1-45.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.x86_64" }, "product_reference": "openssh-clients-0:8.7p1-45.el9.x86_64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-debuginfo-0:8.7p1-45.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.aarch64" }, "product_reference": "openssh-clients-debuginfo-0:8.7p1-45.el9.aarch64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-debuginfo-0:8.7p1-45.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.ppc64le" }, "product_reference": "openssh-clients-debuginfo-0:8.7p1-45.el9.ppc64le", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-debuginfo-0:8.7p1-45.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.s390x" }, "product_reference": "openssh-clients-debuginfo-0:8.7p1-45.el9.s390x", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-debuginfo-0:8.7p1-45.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.x86_64" }, "product_reference": "openssh-clients-debuginfo-0:8.7p1-45.el9.x86_64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:8.7p1-45.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.aarch64" }, "product_reference": "openssh-debuginfo-0:8.7p1-45.el9.aarch64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:8.7p1-45.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.ppc64le" }, "product_reference": "openssh-debuginfo-0:8.7p1-45.el9.ppc64le", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:8.7p1-45.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.s390x" }, "product_reference": "openssh-debuginfo-0:8.7p1-45.el9.s390x", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:8.7p1-45.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.x86_64" }, "product_reference": "openssh-debuginfo-0:8.7p1-45.el9.x86_64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debugsource-0:8.7p1-45.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.aarch64" }, "product_reference": "openssh-debugsource-0:8.7p1-45.el9.aarch64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debugsource-0:8.7p1-45.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.ppc64le" }, "product_reference": "openssh-debugsource-0:8.7p1-45.el9.ppc64le", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debugsource-0:8.7p1-45.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.s390x" }, "product_reference": "openssh-debugsource-0:8.7p1-45.el9.s390x", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debugsource-0:8.7p1-45.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.x86_64" }, "product_reference": "openssh-debugsource-0:8.7p1-45.el9.x86_64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:8.7p1-45.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.aarch64" }, "product_reference": "openssh-keycat-0:8.7p1-45.el9.aarch64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:8.7p1-45.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.ppc64le" }, "product_reference": "openssh-keycat-0:8.7p1-45.el9.ppc64le", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:8.7p1-45.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.s390x" }, "product_reference": "openssh-keycat-0:8.7p1-45.el9.s390x", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:8.7p1-45.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.x86_64" }, "product_reference": "openssh-keycat-0:8.7p1-45.el9.x86_64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-debuginfo-0:8.7p1-45.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.aarch64" }, "product_reference": "openssh-keycat-debuginfo-0:8.7p1-45.el9.aarch64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-debuginfo-0:8.7p1-45.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.ppc64le" }, "product_reference": "openssh-keycat-debuginfo-0:8.7p1-45.el9.ppc64le", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-debuginfo-0:8.7p1-45.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.s390x" }, "product_reference": "openssh-keycat-debuginfo-0:8.7p1-45.el9.s390x", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-debuginfo-0:8.7p1-45.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.x86_64" }, "product_reference": "openssh-keycat-debuginfo-0:8.7p1-45.el9.x86_64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:8.7p1-45.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-server-0:8.7p1-45.el9.aarch64" }, "product_reference": "openssh-server-0:8.7p1-45.el9.aarch64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:8.7p1-45.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-server-0:8.7p1-45.el9.ppc64le" }, "product_reference": "openssh-server-0:8.7p1-45.el9.ppc64le", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:8.7p1-45.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-server-0:8.7p1-45.el9.s390x" }, "product_reference": "openssh-server-0:8.7p1-45.el9.s390x", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:8.7p1-45.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-server-0:8.7p1-45.el9.x86_64" }, "product_reference": "openssh-server-0:8.7p1-45.el9.x86_64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-debuginfo-0:8.7p1-45.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.aarch64" }, "product_reference": "openssh-server-debuginfo-0:8.7p1-45.el9.aarch64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-debuginfo-0:8.7p1-45.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.ppc64le" }, "product_reference": "openssh-server-debuginfo-0:8.7p1-45.el9.ppc64le", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-debuginfo-0:8.7p1-45.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.s390x" }, "product_reference": "openssh-server-debuginfo-0:8.7p1-45.el9.s390x", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-debuginfo-0:8.7p1-45.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.x86_64" }, "product_reference": "openssh-server-debuginfo-0:8.7p1-45.el9.x86_64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.aarch64" }, "product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.aarch64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.ppc64le" }, "product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.ppc64le", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.s390x" }, "product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.s390x", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.x86_64" }, "product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.x86_64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.aarch64" }, "product_reference": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.aarch64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.ppc64le" }, "product_reference": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.ppc64le", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.s390x", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.10.4-5.45.el9.x86_64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.aarch64" }, "product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.aarch64", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.ppc64le" }, "product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.ppc64le", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.s390x" }, "product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.s390x", "relates_to_product_reference": "BaseOS-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.x86_64" }, "product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.x86_64", "relates_to_product_reference": "BaseOS-9.6.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-26465", "cwe": { "id": "CWE-390", "name": "Detection of Error Condition Without Action" }, "discovery_date": "2025-02-10T21:56:03.853000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344780" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client\u0027s memory resource first, turning the attack complexity high.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssh: Machine-in-the-middle attack if VerifyHostKeyDNS is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as a moderate severity vulnerability instead of important because it requires specific conditions to be exploitable. First, the OpenSSH client must have the VerifyHostKeyDNS option enabled, which is disabled by default in Red Hat Enterprise Linux (RHEL). \n\nAdditionally, while the attack allows a machine-in-the-middle (MITM) adversary to trick the client into accepting an incorrect host key, it does not directly lead to code execution or immediate system compromise. Instead, the attack requires additional steps, such as credential interception or session hijacking to fully exploit the breach.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-390: Detection of Error Condition Without Action vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform runs containerized workloads managed by liveness and readiness probes, ensuring applications recover from failures and do not operate in an unhealthy or insecure state. Firewalls are configured to fail securely, blocking unauthorized or malicious traffic during system failures or misconfigurations. Event logs are centrally collected and analyzed to detect recurring errors, crashes, and anomalous behavior. Error conditions are handled securely and audibly, ensuring failures are logged and addressed rather than ignored.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.src", "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-server-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-server-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-server-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-server-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.aarch64", "AppStream-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.ppc64le", "AppStream-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.s390x", "AppStream-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.x86_64", "AppStream-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.aarch64", "AppStream-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.ppc64le", "AppStream-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.s390x", "AppStream-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.src", "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-server-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-server-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-server-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-server-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.aarch64", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.ppc64le", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.s390x", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.x86_64", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.aarch64", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.ppc64le", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.s390x", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-26465" }, { "category": "external", "summary": "RHBZ#2344780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344780" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-26465", "url": "https://www.cve.org/CVERecord?id=CVE-2025-26465" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-26465", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-26465" }, { "category": "external", "summary": "https://seclists.org/oss-sec/2025/q1/144", "url": "https://seclists.org/oss-sec/2025/q1/144" } ], "release_date": "2025-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-13T08:40:48+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.src", "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-server-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-server-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-server-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-server-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.aarch64", "AppStream-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.ppc64le", "AppStream-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.s390x", "AppStream-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.x86_64", "AppStream-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.aarch64", "AppStream-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.ppc64le", "AppStream-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.s390x", "AppStream-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.src", "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-server-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-server-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-server-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-server-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.aarch64", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.ppc64le", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.s390x", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.x86_64", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.aarch64", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.ppc64le", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.s390x", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:6993" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.src", "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-server-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-server-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-server-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-server-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.aarch64", "AppStream-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.ppc64le", "AppStream-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.s390x", "AppStream-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.x86_64", "AppStream-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.aarch64", "AppStream-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.ppc64le", "AppStream-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.s390x", "AppStream-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.src", "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-server-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-server-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-server-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-server-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.aarch64", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.ppc64le", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.s390x", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.x86_64", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.aarch64", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.ppc64le", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.s390x", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.src", "AppStream-9.6.0.GA:openssh-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-server-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-server-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-server-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-server-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.aarch64", "AppStream-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.ppc64le", "AppStream-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.s390x", "AppStream-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.x86_64", "AppStream-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.aarch64", "AppStream-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.ppc64le", "AppStream-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.s390x", "AppStream-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.x86_64", "AppStream-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.aarch64", "AppStream-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.ppc64le", "AppStream-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.s390x", "AppStream-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.src", "BaseOS-9.6.0.GA:openssh-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-askpass-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-askpass-debuginfo-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-clients-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-clients-debuginfo-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-debuginfo-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-debugsource-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-keycat-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-keycat-debuginfo-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-server-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-server-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-server-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-server-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-server-debuginfo-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.aarch64", "BaseOS-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.ppc64le", "BaseOS-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.s390x", "BaseOS-9.6.0.GA:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9.x86_64", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.aarch64", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.ppc64le", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.s390x", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-0:0.10.4-5.45.el9.x86_64", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.aarch64", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.ppc64le", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.s390x", "BaseOS-9.6.0.GA:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssh: Machine-in-the-middle attack if VerifyHostKeyDNS is enabled" } ] }
rhsa-2025:8385
Vulnerability from csaf_redhat
Published
2025-06-02 14:07
Modified
2025-09-12 18:32
Summary
Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage
Notes
Topic
A Subscription Management tool for finding and reporting Red Hat product usage
Details
Red Hat Discovery, also known as Discovery, is an inspection and reporting tool that finds, identifies, and reports environment data, or facts, such as the number of physical and virtual systems on a network, their operating systems, and relevant configuration data stored within them. Discovery also identifies and reports more detailed facts for some versions of key Red Hat packages and products that it finds in the network.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A Subscription Management tool for finding and reporting Red Hat product usage", "title": "Topic" }, { "category": "general", "text": "Red Hat Discovery, also known as Discovery, is an inspection and reporting tool that finds, identifies, and reports environment data, or facts, such as the number of physical and virtual systems on a network, their operating systems, and relevant configuration data stored within them. Discovery also identifies and reports more detailed facts for some versions of key Red Hat packages and products that it finds in the network.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:8385", "url": "https://access.redhat.com/errata/RHSA-2025:8385" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2023-4752", "url": "https://access.redhat.com/security/cve/CVE-2023-4752" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2024-12087", "url": "https://access.redhat.com/security/cve/CVE-2024-12087" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2024-12088", "url": "https://access.redhat.com/security/cve/CVE-2024-12088" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2024-12133", "url": "https://access.redhat.com/security/cve/CVE-2024-12133" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2024-12243", "url": "https://access.redhat.com/security/cve/CVE-2024-12243" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2024-12747", "url": "https://access.redhat.com/security/cve/CVE-2024-12747" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2024-35195", "url": "https://access.redhat.com/security/cve/CVE-2024-35195" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2024-52005", "url": "https://access.redhat.com/security/cve/CVE-2024-52005" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2024-8176", "url": "https://access.redhat.com/security/cve/CVE-2024-8176" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2025-0938", "url": "https://access.redhat.com/security/cve/CVE-2025-0938" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2025-24528", "url": "https://access.redhat.com/security/cve/CVE-2025-24528" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2025-26465", "url": "https://access.redhat.com/security/cve/CVE-2025-26465" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/", "url": "https://access.redhat.com/security/updates/classification/" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/subscription_central/1-latest/#Discovery", "url": "https://docs.redhat.com/en/documentation/subscription_central/1-latest/#Discovery" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_8385.json" } ], "title": "Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage", "tracking": { "current_release_date": "2025-09-12T18:32:16+00:00", "generator": { "date": "2025-09-12T18:32:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2025:8385", "initial_release_date": "2025-06-02T14:07:46+00:00", "revision_history": [ { "date": "2025-06-02T14:07:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-06-02T14:07:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-12T18:32:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Discovery 1.14", "product": { "name": "Red Hat Discovery 1.14", "product_id": "Red Hat Discovery 1.14", "product_identification_helper": { "cpe": "cpe:/a:redhat:discovery:1.14::el9" } } } ], "category": "product_family", "name": "Red Hat Discovery" }, { "branches": [ { "category": "product_version", "name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "product": { "name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "product_id": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "product_identification_helper": { "purl": "pkg:oci/discovery-server-rhel9@sha256%3Af33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63?arch=amd64\u0026repository_url=registry.redhat.io/discovery\u0026tag=1.14.3-1748529279" } } }, { "category": "product_version", "name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "product": { "name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "product_id": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "product_identification_helper": { "purl": "pkg:oci/discovery-ui-rhel9@sha256%3A492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644?arch=amd64\u0026repository_url=registry.redhat.io/discovery\u0026tag=1.14.2-1748467619" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "product": { "name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "product_id": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "product_identification_helper": { "purl": "pkg:oci/discovery-server-rhel9@sha256%3Aad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c?arch=arm64\u0026repository_url=registry.redhat.io/discovery\u0026tag=1.14.3-1748529279" } } }, { "category": "product_version", "name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64", "product": { "name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64", "product_id": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64", "product_identification_helper": { "purl": "pkg:oci/discovery-ui-rhel9@sha256%3Ac960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e?arch=arm64\u0026repository_url=registry.redhat.io/discovery\u0026tag=1.14.2-1748467619" } } } ], "category": "architecture", "name": "arm64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64 as a component of Red Hat Discovery 1.14", "product_id": "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64" }, "product_reference": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "relates_to_product_reference": "Red Hat Discovery 1.14" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64 as a component of Red Hat Discovery 1.14", "product_id": "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64" }, "product_reference": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "relates_to_product_reference": "Red Hat Discovery 1.14" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64 as a component of Red Hat Discovery 1.14", "product_id": "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64" }, "product_reference": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "relates_to_product_reference": "Red Hat Discovery 1.14" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64 as a component of Red Hat Discovery 1.14", "product_id": "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" }, "product_reference": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64", "relates_to_product_reference": "Red Hat Discovery 1.14" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-4752", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-09-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2237311" } ], "notes": [ { "category": "description", "text": "A flaw was found in Vim, where it is vulnerable to a use-after-free in the ins_compl_get_exp function. This flaw allows a specially crafted file to crash software, use unexpected values, or possibly execute code when opened in Vim.", "title": "Vulnerability description" }, { "category": "summary", "text": "vim: use-after-free in function ins_compl_get_exp in vim/vim", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security has rated this issue as having a Low security impact, because the \"victim\" has to run an untrusted file IN SCRIPT MODE. Someone who is running untrusted files in script mode is equivalent to someone just taking a random python script and running it.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ], "known_not_affected": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-4752" }, { "category": "external", "summary": "RHBZ#2237311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237311" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-4752", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4752" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-4752", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-4752" }, { "category": "external", "summary": "https://huntr.dev/bounties/85f62dd7-ed84-4fa2-b265-8a369a318757", "url": "https://huntr.dev/bounties/85f62dd7-ed84-4fa2-b265-8a369a318757" } ], "release_date": "2023-09-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-06-02T14:07:46+00:00", "details": "The containers required to run Discovery can be installed through discovery-installer RPM. See the official documentation for more details.", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:8385" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "vim: use-after-free in function ins_compl_get_exp in vim/vim" }, { "acknowledgments": [ { "names": [ "Jann Horn" ], "organization": "Google Project Zero" }, { "names": [ "Tomas Korbar", "Sandipan Roy" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." }, { "names": [ "Sebastian Pipping" ], "organization": "libexpat" } ], "cve": "CVE-2024-8176", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2024-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2310137" } ], "notes": [ { "category": "description", "text": "A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.", "title": "Vulnerability description" }, { "category": "summary", "text": "libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat", "title": "Vulnerability summary" }, { "category": "other", "text": "All supported Red Hat offerings are built with the compilation flag (-fstack-clash-protection) which reduces the impact to Moderate. This build configuration blocks the possibility of an attacker gaining arbitrary code execution even if a stack-clash vulnerability, like this one, could be exploited.\n\nThis vulnerability is rated Moderate because Red Hat builds use the `-fstack-clash-protection` compiler flag, which mitigates the risk of arbitrary code execution from stack overflows. While the flaw allows a crash via uncontrolled recursion in XML parsing, the hardened stack layout prevents reliable memory corruption, limiting the impact to a Denial of Service (DoS) scenario.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-674: Uncontrolled Recursion vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation controls ensure that inputs triggering recursion are validated to stay within safe limits, which reduces the risk of infinite or excessive recursion. The implementation of least functionality on the platform further restricts potential impacts of recursions by disabling unnecessary recursive functions or features, thus reducing the available pathways for a would-be attacker. The inclusion of developer testing and evaluation ensures that recursive functions are tested and that safeguards like error handling are in place. In the case of successful exploitation, detection and containment controls are in place to limit impacts by alerting on anomalous system behavior in real time, while process isolation can limit impacts to a single process.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8176" }, { "category": "external", "summary": "RHBZ#2310137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310137" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8176" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8176", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8176" }, { "category": "external", "summary": "https://github.com/libexpat/libexpat/issues/893", "url": "https://github.com/libexpat/libexpat/issues/893" } ], "release_date": "2025-03-13T13:51:54.957000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-06-02T14:07:46+00:00", "details": "The containers required to run Discovery can be installed through discovery-installer RPM. See the official documentation for more details.", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:8385" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat" }, { "acknowledgments": [ { "names": [ "Simon Scannell", "Pedro Gallegos", "Jasiel Spelman" ], "organization": "Google" } ], "cve": "CVE-2024-12087", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2024-12-05T21:23:24.139000+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2330672" } ], "notes": [ { "category": "description", "text": "A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client\u0027s intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.", "title": "Vulnerability description" }, { "category": "summary", "text": "rsync: Path traversal vulnerability in rsync", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this flaw to have moderate severity as it depends on specific configurations for the attack to succeed, symbolic link syncing must be enabled (explicitly by providing the `--links` option or implicitly such as with `--archive`) and the client must connect to a malicious or compromised server.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-35: Path Traversal: \u0027.../...//\u0027 vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe principle of least privilege is enforced through non-root containers, security context constraints, and pod-level security policies, which limit the actions a process can perform and reduce the potential impact of a successful exploit or misconfiguration. The platform enforces process isolation, ensuring workloads run with minimal privileges and are securely separated to limit the impact of path traversal attempts. Additionally, static code analysis and peer code review techniques are used to execute robust input validation and error-handling mechanisms to ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ], "known_not_affected": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-12087" }, { "category": "external", "summary": "RHBZ#2330672", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2330672" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-12087", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12087" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-12087", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12087" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/952657", "url": "https://kb.cert.org/vuls/id/952657" } ], "release_date": "2025-01-14T15:06:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-06-02T14:07:46+00:00", "details": "The containers required to run Discovery can be installed through discovery-installer RPM. See the official documentation for more details.", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:8385" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rsync: Path traversal vulnerability in rsync" }, { "acknowledgments": [ { "names": [ "Simon Scannell", "Jasiel Spelman", "Pedro Gallegos" ], "organization": "Google" } ], "cve": "CVE-2024-12088", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2024-12-05T21:55:22.700000+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2330676" } ], "notes": [ { "category": "description", "text": "A flaw was found in rsync. When using the `--safe-links` option, the rsync client fails to properly verify if a symbolic link destination sent from the server contains another symbolic link within it. This results in a path traversal vulnerability, which may lead to arbitrary file write outside the desired directory.", "title": "Vulnerability description" }, { "category": "summary", "text": "rsync: --safe-links option bypass leads to path traversal", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-35: Path Traversal: \u0027.../...//\u0027 vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe principle of least privilege is enforced through non-root containers, security context constraints, and pod-level security policies, which limit the actions a process can perform and reduce the potential impact of a successful exploit or misconfiguration. The platform enforces process isolation, ensuring workloads run with minimal privileges and are securely separated to limit the impact of path traversal attempts. Additionally, static code analysis and peer code review techniques are used to execute robust input validation and error-handling mechanisms to ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ], "known_not_affected": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-12088" }, { "category": "external", "summary": "RHBZ#2330676", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2330676" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-12088", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12088" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-12088", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12088" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/952657", "url": "https://kb.cert.org/vuls/id/952657" } ], "release_date": "2025-01-14T15:06:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-06-02T14:07:46+00:00", "details": "The containers required to run Discovery can be installed through discovery-installer RPM. See the official documentation for more details.", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:8385" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rsync: --safe-links option bypass leads to path traversal" }, { "acknowledgments": [ { "names": [ "Bing Shi" ] } ], "cve": "CVE-2024-12133", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "discovery_date": "2025-02-10T08:14:05.460000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344611" } ], "notes": [ { "category": "description", "text": "A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "libtasn1: Inefficient DER Decoding in libtasn1 Leading to Potential Remote DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-12133" }, { "category": "external", "summary": "RHBZ#2344611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344611" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-12133", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12133" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-12133", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12133" }, { "category": "external", "summary": "https://gitlab.com/gnutls/libtasn1/-/issues/52", "url": "https://gitlab.com/gnutls/libtasn1/-/issues/52" } ], "release_date": "2025-02-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-06-02T14:07:46+00:00", "details": "The containers required to run Discovery can be installed through discovery-installer RPM. See the official documentation for more details.", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:8385" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libtasn1: Inefficient DER Decoding in libtasn1 Leading to Potential Remote DoS" }, { "acknowledgments": [ { "names": [ "Bing Shi" ] } ], "cve": "CVE-2024-12243", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "discovery_date": "2025-02-10T08:33:56.422000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344615" } ], "notes": [ { "category": "description", "text": "A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "gnutls: GnuTLS Impacted by Inefficient DER Decoding in libtasn1 Leading to Remote DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-12243" }, { "category": "external", "summary": "RHBZ#2344615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-12243", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12243" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-12243", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12243" }, { "category": "external", "summary": "https://gitlab.com/gnutls/libtasn1/-/issues/52", "url": "https://gitlab.com/gnutls/libtasn1/-/issues/52" } ], "release_date": "2025-02-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-06-02T14:07:46+00:00", "details": "The containers required to run Discovery can be installed through discovery-installer RPM. See the official documentation for more details.", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:8385" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "gnutls: GnuTLS Impacted by Inefficient DER Decoding in libtasn1 Leading to Remote DoS" }, { "acknowledgments": [ { "names": [ "Aleksei Gorban \"loqpa\"" ] } ], "cve": "CVE-2024-12747", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2024-12-18T07:12:52.493000+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2332968" } ], "notes": [ { "category": "description", "text": "A flaw was found in rsync. This vulnerability arises from a race condition during rsync\u0027s handling of symbolic links. Rsync\u0027s default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "rsync: Race Condition in rsync Handling Symbolic Links", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. The environment leverages malicious code protections such as IPS/IDS and antimalware solutions that detect and respond to indicators in real time, limiting the impact of exploitation attempts. Static code analysis and peer code review techniques are used to execute robust input validation and error-handling mechanisms to ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks. In the case of successful exploitation, detection and containment controls are in place to limit impacts by alerting on anomalous system behavior in real time, while process isolation and automated orchestration via Kubernetes minimize the likelihood of concurrent execution scenarios that would trigger the race condition and help contain the impact to a single process.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ], "known_not_affected": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-12747" }, { "category": "external", "summary": "RHBZ#2332968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2332968" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-12747", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12747" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-12747", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12747" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/952657", "url": "https://kb.cert.org/vuls/id/952657" } ], "release_date": "2025-01-14T15:06:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-06-02T14:07:46+00:00", "details": "The containers required to run Discovery can be installed through discovery-installer RPM. See the official documentation for more details.", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:8385" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rsync: Race Condition in rsync Handling Symbolic Links" }, { "cve": "CVE-2024-35195", "cwe": { "id": "CWE-670", "name": "Always-Incorrect Control Flow Implementation" }, "discovery_date": "2024-05-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2282114" } ], "notes": [ { "category": "description", "text": "An incorrect control flow implementation vulnerability was found in Requests. If the first request in a session is made with verify=False, all subsequent requests to the same host will continue to ignore cert verification.", "title": "Vulnerability description" }, { "category": "summary", "text": "requests: subsequent requests to the same host ignore cert verification", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-670: Always-Incorrect Control Flow Implementation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform\u0027s orchestration features, such as liveness and readiness probes, automated pod restarts, and health monitoring, help to quickly detect and recover from service-level failures resulting from incorrect control flows. Static code analysis and peer code review techniques are used to execute robust input validation and error-handling mechanisms to ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks. Additionally, process isolation ensures that component issues are contained within the originating process, preventing them from affecting other processes or the system as a whole.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ], "known_not_affected": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-35195" }, { "category": "external", "summary": "RHBZ#2282114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282114" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-35195", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35195" }, { "category": "external", "summary": "https://github.com/psf/requests/security/advisories/GHSA-9wx4-h78v-vm56", "url": "https://github.com/psf/requests/security/advisories/GHSA-9wx4-h78v-vm56" } ], "release_date": "2024-05-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-06-02T14:07:46+00:00", "details": "The containers required to run Discovery can be installed through discovery-installer RPM. See the official documentation for more details.", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:8385" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "requests: subsequent requests to the same host ignore cert verification" }, { "cve": "CVE-2024-52005", "cwe": { "id": "CWE-150", "name": "Improper Neutralization of Escape, Meta, or Control Sequences" }, "discovery_date": "2025-01-15T18:01:05.807300+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2338289" } ], "notes": [ { "category": "description", "text": "A flaw was found in Git. When cloning, fetching, or pushing from a server, informational or error messages are transported from the remote Git process to the client via a sideband channel. These messages are prefixed with \"remote:\" and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information or to mislead the user into executing untrusted scripts.", "title": "Vulnerability description" }, { "category": "summary", "text": "git: The sideband payload is passed unfiltered to the terminal in git", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is classified as moderate rather than important because it primarily affects informational messages rather than directly compromising repository integrity or executing arbitrary code. The issue arises from Git\u0027s failure to sanitize ANSI escape sequences in messages received over the sideband channel, which could allow a malicious remote repository to manipulate terminal output. However, exploitation requires user interaction, such as manually copying and executing misleading commands. Unlike higher-severity vulnerabilities, this does not provide direct unauthorized access, remote code execution, or privilege escalation, limiting its overall impact. The risk is further mitigated by best practices, such as avoiding recursive clones from untrusted sources.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a (CWE-116: Improper Encoding or Escaping of Output | CWE-150: Improper Neutralization of Escape, Meta, or Control Sequences) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nStatic code analysis and peer reviews help ensure input validation and output encoding are properly implemented, reducing the risk of system instability, data exposure, and security issues. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention, which ensures that unexpected or malicious output behavior is detectable post-deployment. In the event of successful exploitation, process isolation contains the impact to the affected workload through containerization, pod-level security policies, and network segmentation.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64" ], "known_not_affected": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-52005" }, { "category": "external", "summary": "RHBZ#2338289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2338289" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-52005", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52005" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-52005", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-52005" }, { "category": "external", "summary": "https://github.com/git/git/security/advisories/GHSA-7jjc-gg6m-3329", "url": "https://github.com/git/git/security/advisories/GHSA-7jjc-gg6m-3329" }, { "category": "external", "summary": "https://lore.kernel.org/git/1M9FnZ-1taoNo1wwh-00ESSd@mail.gmx.net", "url": "https://lore.kernel.org/git/1M9FnZ-1taoNo1wwh-00ESSd@mail.gmx.net" } ], "release_date": "2025-01-15T17:35:02.379000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-06-02T14:07:46+00:00", "details": "The containers required to run Discovery can be installed through discovery-installer RPM. See the official documentation for more details.", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:8385" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "git: The sideband payload is passed unfiltered to the terminal in git" }, { "cve": "CVE-2025-0938", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-01-31T18:00:46.128427+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2343237" } ], "notes": [ { "category": "description", "text": "A flaw was found in Python. The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accept domain names that included square brackets, which isn\u0027t valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result in differential parsing across the Python URL parser and other specification-compliant URL parsers.", "title": "Vulnerability description" }, { "category": "summary", "text": "python: cpython: URL parser allowed square brackets in domain names", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-0938" }, { "category": "external", "summary": "RHBZ#2343237", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2343237" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-0938", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0938" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-0938", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0938" }, { "category": "external", "summary": "https://github.com/python/cpython/issues/105704", "url": "https://github.com/python/cpython/issues/105704" }, { "category": "external", "summary": "https://github.com/python/cpython/pull/129418", "url": "https://github.com/python/cpython/pull/129418" } ], "release_date": "2025-01-31T17:51:35.898000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-06-02T14:07:46+00:00", "details": "The containers required to run Discovery can be installed through discovery-installer RPM. See the official documentation for more details.", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:8385" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python: cpython: URL parser allowed square brackets in domain names" }, { "cve": "CVE-2025-24528", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-01-29T13:47:59.362000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2342796" } ], "notes": [ { "category": "description", "text": "A flaw was found in krb5. With incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file. This issue can trigger a process crash and lead to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "krb5: overflow when calculating ulog block size", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-787: Out-of-bounds Write vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings necessary for operational requirements. Baseline configurations and system controls ensure secure software settings, while least functionality reduces the attack surface by disabling unauthorized services and ports. The environment employs IPS/IDS and antimalware solutions to detect and prevent malicious code exploiting out-of-bounds write vulnerabilities, using mechanisms such as file integrity monitoring and patch management. Robust input validation and error handling ensure all user inputs are thoroughly validated, preventing instability, data exposure, or privilege escalation. Finally, the platform uses memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to strengthen resilience against out-of-bounds write exploits.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24528" }, { "category": "external", "summary": "RHBZ#2342796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342796" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24528", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24528" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24528", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24528" }, { "category": "external", "summary": "https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0", "url": "https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0" } ], "release_date": "2024-01-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-06-02T14:07:46+00:00", "details": "The containers required to run Discovery can be installed through discovery-installer RPM. See the official documentation for more details.", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:8385" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "krb5: overflow when calculating ulog block size" }, { "cve": "CVE-2025-26465", "cwe": { "id": "CWE-390", "name": "Detection of Error Condition Without Action" }, "discovery_date": "2025-02-10T21:56:03.853000+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344780" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client\u0027s memory resource first, turning the attack complexity high.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssh: Machine-in-the-middle attack if VerifyHostKeyDNS is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as a moderate severity vulnerability instead of important because it requires specific conditions to be exploitable. First, the OpenSSH client must have the VerifyHostKeyDNS option enabled, which is disabled by default in Red Hat Enterprise Linux (RHEL). \n\nAdditionally, while the attack allows a machine-in-the-middle (MITM) adversary to trick the client into accepting an incorrect host key, it does not directly lead to code execution or immediate system compromise. Instead, the attack requires additional steps, such as credential interception or session hijacking to fully exploit the breach.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-390: Detection of Error Condition Without Action vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform runs containerized workloads managed by liveness and readiness probes, ensuring applications recover from failures and do not operate in an unhealthy or insecure state. Firewalls are configured to fail securely, blocking unauthorized or malicious traffic during system failures or misconfigurations. Event logs are centrally collected and analyzed to detect recurring errors, crashes, and anomalous behavior. Error conditions are handled securely and audibly, ensuring failures are logged and addressed rather than ignored.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64" ], "known_not_affected": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-26465" }, { "category": "external", "summary": "RHBZ#2344780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344780" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-26465", "url": "https://www.cve.org/CVERecord?id=CVE-2025-26465" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-26465", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-26465" }, { "category": "external", "summary": "https://seclists.org/oss-sec/2025/q1/144", "url": "https://seclists.org/oss-sec/2025/q1/144" } ], "release_date": "2025-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-06-02T14:07:46+00:00", "details": "The containers required to run Discovery can be installed through discovery-installer RPM. See the official documentation for more details.", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:8385" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c_arm64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644_amd64", "Red Hat Discovery 1.14:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:c960fa13577db72b52765d6941688f431f61fe38adb717b2d8bb6569e241bc5e_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssh: Machine-in-the-middle attack if VerifyHostKeyDNS is enabled" } ] }
suse-su-2025:0585-1
Vulnerability from csaf_suse
Published
2025-02-18 16:42
Modified
2025-02-18 16:42
Summary
Security update for openssh
Notes
Title of the patch
Security update for openssh
Description of the patch
This update for openssh fixes the following issues:
- CVE-2025-26465: Fixed MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client (bsc#1237040).
- CVE-2025-26466: Fixed DoS attack against OpenSSH's client and server (bsc#1237041).
Patchnames
SUSE-2025-585,SUSE-SLE-Module-Basesystem-15-SP6-2025-585,SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-585,openSUSE-SLE-15.6-2025-585
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssh", "title": "Title of the patch" }, { "category": "description", "text": "This update for openssh fixes the following issues:\n\n- CVE-2025-26465: Fixed MitM attack against OpenSSH\u0027s VerifyHostKeyDNS-enabled client (bsc#1237040).\n- CVE-2025-26466: Fixed DoS attack against OpenSSH\u0027s client and server (bsc#1237041).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-585,SUSE-SLE-Module-Basesystem-15-SP6-2025-585,SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-585,openSUSE-SLE-15.6-2025-585", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0585-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:0585-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250585-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:0585-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020372.html" }, { "category": "self", "summary": "SUSE Bug 1237040", "url": "https://bugzilla.suse.com/1237040" }, { "category": "self", "summary": "SUSE Bug 1237041", "url": "https://bugzilla.suse.com/1237041" }, { "category": "self", "summary": "SUSE CVE CVE-2025-26465 page", "url": "https://www.suse.com/security/cve/CVE-2025-26465/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-26466 page", "url": "https://www.suse.com/security/cve/CVE-2025-26466/" } ], "title": "Security update for openssh", "tracking": { "current_release_date": "2025-02-18T16:42:16Z", "generator": { "date": "2025-02-18T16:42:16Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:0585-1", "initial_release_date": "2025-02-18T16:42:16Z", "revision_history": [ { "date": "2025-02-18T16:42:16Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openssh-9.6p1-150600.6.15.2.aarch64", "product": { "name": "openssh-9.6p1-150600.6.15.2.aarch64", "product_id": "openssh-9.6p1-150600.6.15.2.aarch64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-9.6p1-150600.6.15.1.aarch64", "product": { "name": "openssh-askpass-gnome-9.6p1-150600.6.15.1.aarch64", "product_id": "openssh-askpass-gnome-9.6p1-150600.6.15.1.aarch64" } }, { "category": "product_version", "name": "openssh-cavs-9.6p1-150600.6.15.2.aarch64", "product": { "name": "openssh-cavs-9.6p1-150600.6.15.2.aarch64", "product_id": "openssh-cavs-9.6p1-150600.6.15.2.aarch64" } }, { "category": "product_version", "name": "openssh-clients-9.6p1-150600.6.15.2.aarch64", "product": { "name": "openssh-clients-9.6p1-150600.6.15.2.aarch64", "product_id": "openssh-clients-9.6p1-150600.6.15.2.aarch64" } }, { "category": "product_version", "name": "openssh-common-9.6p1-150600.6.15.2.aarch64", "product": { "name": "openssh-common-9.6p1-150600.6.15.2.aarch64", "product_id": "openssh-common-9.6p1-150600.6.15.2.aarch64" } }, { "category": "product_version", "name": "openssh-fips-9.6p1-150600.6.15.2.aarch64", "product": { "name": "openssh-fips-9.6p1-150600.6.15.2.aarch64", "product_id": "openssh-fips-9.6p1-150600.6.15.2.aarch64" } }, { "category": "product_version", "name": "openssh-helpers-9.6p1-150600.6.15.2.aarch64", "product": { "name": "openssh-helpers-9.6p1-150600.6.15.2.aarch64", "product_id": "openssh-helpers-9.6p1-150600.6.15.2.aarch64" } }, { "category": "product_version", "name": "openssh-server-9.6p1-150600.6.15.2.aarch64", "product": { "name": "openssh-server-9.6p1-150600.6.15.2.aarch64", "product_id": "openssh-server-9.6p1-150600.6.15.2.aarch64" } }, { "category": "product_version", "name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.aarch64", "product": { "name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.aarch64", "product_id": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "openssh-9.6p1-150600.6.15.2.i586", "product": { "name": "openssh-9.6p1-150600.6.15.2.i586", "product_id": "openssh-9.6p1-150600.6.15.2.i586" } }, { "category": "product_version", "name": "openssh-askpass-gnome-9.6p1-150600.6.15.1.i586", "product": { "name": "openssh-askpass-gnome-9.6p1-150600.6.15.1.i586", "product_id": "openssh-askpass-gnome-9.6p1-150600.6.15.1.i586" } }, { "category": "product_version", "name": "openssh-cavs-9.6p1-150600.6.15.2.i586", "product": { "name": "openssh-cavs-9.6p1-150600.6.15.2.i586", "product_id": "openssh-cavs-9.6p1-150600.6.15.2.i586" } }, { "category": "product_version", "name": "openssh-clients-9.6p1-150600.6.15.2.i586", "product": { "name": "openssh-clients-9.6p1-150600.6.15.2.i586", "product_id": "openssh-clients-9.6p1-150600.6.15.2.i586" } }, { "category": "product_version", "name": "openssh-common-9.6p1-150600.6.15.2.i586", "product": { "name": "openssh-common-9.6p1-150600.6.15.2.i586", "product_id": "openssh-common-9.6p1-150600.6.15.2.i586" } }, { "category": "product_version", "name": "openssh-fips-9.6p1-150600.6.15.2.i586", "product": { "name": "openssh-fips-9.6p1-150600.6.15.2.i586", "product_id": "openssh-fips-9.6p1-150600.6.15.2.i586" } }, { "category": "product_version", "name": "openssh-helpers-9.6p1-150600.6.15.2.i586", "product": { "name": "openssh-helpers-9.6p1-150600.6.15.2.i586", "product_id": "openssh-helpers-9.6p1-150600.6.15.2.i586" } }, { "category": "product_version", "name": "openssh-server-9.6p1-150600.6.15.2.i586", "product": { "name": "openssh-server-9.6p1-150600.6.15.2.i586", "product_id": "openssh-server-9.6p1-150600.6.15.2.i586" } }, { "category": "product_version", "name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.i586", "product": { "name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.i586", "product_id": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "openssh-9.6p1-150600.6.15.2.ppc64le", "product": { "name": "openssh-9.6p1-150600.6.15.2.ppc64le", "product_id": "openssh-9.6p1-150600.6.15.2.ppc64le" } }, { "category": "product_version", "name": "openssh-askpass-gnome-9.6p1-150600.6.15.1.ppc64le", "product": { "name": "openssh-askpass-gnome-9.6p1-150600.6.15.1.ppc64le", "product_id": "openssh-askpass-gnome-9.6p1-150600.6.15.1.ppc64le" } }, { "category": "product_version", "name": "openssh-cavs-9.6p1-150600.6.15.2.ppc64le", "product": { "name": "openssh-cavs-9.6p1-150600.6.15.2.ppc64le", "product_id": "openssh-cavs-9.6p1-150600.6.15.2.ppc64le" } }, { "category": "product_version", "name": "openssh-clients-9.6p1-150600.6.15.2.ppc64le", "product": { "name": "openssh-clients-9.6p1-150600.6.15.2.ppc64le", "product_id": "openssh-clients-9.6p1-150600.6.15.2.ppc64le" } }, { "category": "product_version", "name": "openssh-common-9.6p1-150600.6.15.2.ppc64le", "product": { "name": "openssh-common-9.6p1-150600.6.15.2.ppc64le", "product_id": "openssh-common-9.6p1-150600.6.15.2.ppc64le" } }, { "category": "product_version", "name": "openssh-fips-9.6p1-150600.6.15.2.ppc64le", "product": { "name": "openssh-fips-9.6p1-150600.6.15.2.ppc64le", "product_id": "openssh-fips-9.6p1-150600.6.15.2.ppc64le" } }, { "category": "product_version", "name": "openssh-helpers-9.6p1-150600.6.15.2.ppc64le", "product": { "name": "openssh-helpers-9.6p1-150600.6.15.2.ppc64le", "product_id": "openssh-helpers-9.6p1-150600.6.15.2.ppc64le" } }, { "category": "product_version", "name": "openssh-server-9.6p1-150600.6.15.2.ppc64le", "product": { "name": "openssh-server-9.6p1-150600.6.15.2.ppc64le", "product_id": "openssh-server-9.6p1-150600.6.15.2.ppc64le" } }, { "category": "product_version", "name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.ppc64le", "product": { "name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.ppc64le", "product_id": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssh-9.6p1-150600.6.15.2.s390x", "product": { "name": "openssh-9.6p1-150600.6.15.2.s390x", "product_id": "openssh-9.6p1-150600.6.15.2.s390x" } }, { "category": "product_version", "name": "openssh-askpass-gnome-9.6p1-150600.6.15.1.s390x", "product": { "name": "openssh-askpass-gnome-9.6p1-150600.6.15.1.s390x", "product_id": "openssh-askpass-gnome-9.6p1-150600.6.15.1.s390x" } }, { "category": "product_version", "name": "openssh-cavs-9.6p1-150600.6.15.2.s390x", "product": { "name": "openssh-cavs-9.6p1-150600.6.15.2.s390x", "product_id": "openssh-cavs-9.6p1-150600.6.15.2.s390x" } }, { "category": "product_version", "name": "openssh-clients-9.6p1-150600.6.15.2.s390x", "product": { "name": "openssh-clients-9.6p1-150600.6.15.2.s390x", "product_id": "openssh-clients-9.6p1-150600.6.15.2.s390x" } }, { "category": "product_version", "name": "openssh-common-9.6p1-150600.6.15.2.s390x", "product": { "name": "openssh-common-9.6p1-150600.6.15.2.s390x", "product_id": "openssh-common-9.6p1-150600.6.15.2.s390x" } }, { "category": "product_version", "name": "openssh-fips-9.6p1-150600.6.15.2.s390x", "product": { "name": "openssh-fips-9.6p1-150600.6.15.2.s390x", "product_id": "openssh-fips-9.6p1-150600.6.15.2.s390x" } }, { "category": "product_version", "name": "openssh-helpers-9.6p1-150600.6.15.2.s390x", "product": { "name": "openssh-helpers-9.6p1-150600.6.15.2.s390x", "product_id": "openssh-helpers-9.6p1-150600.6.15.2.s390x" } }, { "category": "product_version", "name": "openssh-server-9.6p1-150600.6.15.2.s390x", "product": { "name": "openssh-server-9.6p1-150600.6.15.2.s390x", "product_id": "openssh-server-9.6p1-150600.6.15.2.s390x" } }, { "category": "product_version", "name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.s390x", "product": { "name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.s390x", "product_id": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-9.6p1-150600.6.15.2.x86_64", "product": { "name": "openssh-9.6p1-150600.6.15.2.x86_64", "product_id": "openssh-9.6p1-150600.6.15.2.x86_64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-9.6p1-150600.6.15.1.x86_64", "product": { "name": "openssh-askpass-gnome-9.6p1-150600.6.15.1.x86_64", "product_id": "openssh-askpass-gnome-9.6p1-150600.6.15.1.x86_64" } }, { "category": "product_version", "name": "openssh-cavs-9.6p1-150600.6.15.2.x86_64", "product": { "name": "openssh-cavs-9.6p1-150600.6.15.2.x86_64", "product_id": "openssh-cavs-9.6p1-150600.6.15.2.x86_64" } }, { "category": "product_version", "name": "openssh-clients-9.6p1-150600.6.15.2.x86_64", "product": { "name": "openssh-clients-9.6p1-150600.6.15.2.x86_64", "product_id": "openssh-clients-9.6p1-150600.6.15.2.x86_64" } }, { "category": "product_version", "name": "openssh-common-9.6p1-150600.6.15.2.x86_64", "product": { "name": "openssh-common-9.6p1-150600.6.15.2.x86_64", "product_id": "openssh-common-9.6p1-150600.6.15.2.x86_64" } }, { "category": "product_version", "name": "openssh-fips-9.6p1-150600.6.15.2.x86_64", "product": { "name": "openssh-fips-9.6p1-150600.6.15.2.x86_64", "product_id": "openssh-fips-9.6p1-150600.6.15.2.x86_64" } }, { "category": "product_version", "name": "openssh-helpers-9.6p1-150600.6.15.2.x86_64", "product": { "name": "openssh-helpers-9.6p1-150600.6.15.2.x86_64", "product_id": "openssh-helpers-9.6p1-150600.6.15.2.x86_64" } }, { "category": "product_version", "name": "openssh-server-9.6p1-150600.6.15.2.x86_64", "product": { "name": "openssh-server-9.6p1-150600.6.15.2.x86_64", "product_id": "openssh-server-9.6p1-150600.6.15.2.x86_64" } }, { "category": "product_version", "name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.x86_64", "product": { "name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.x86_64", "product_id": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-desktop-applications:15:sp6" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-9.6p1-150600.6.15.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.aarch64" }, "product_reference": "openssh-9.6p1-150600.6.15.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-9.6p1-150600.6.15.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.ppc64le" }, "product_reference": "openssh-9.6p1-150600.6.15.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-9.6p1-150600.6.15.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.s390x" }, "product_reference": "openssh-9.6p1-150600.6.15.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-9.6p1-150600.6.15.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.x86_64" }, "product_reference": "openssh-9.6p1-150600.6.15.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-9.6p1-150600.6.15.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.aarch64" }, "product_reference": "openssh-clients-9.6p1-150600.6.15.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-9.6p1-150600.6.15.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.ppc64le" }, "product_reference": "openssh-clients-9.6p1-150600.6.15.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-9.6p1-150600.6.15.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.s390x" }, "product_reference": "openssh-clients-9.6p1-150600.6.15.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-9.6p1-150600.6.15.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.x86_64" }, "product_reference": "openssh-clients-9.6p1-150600.6.15.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-9.6p1-150600.6.15.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.aarch64" }, "product_reference": "openssh-common-9.6p1-150600.6.15.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-9.6p1-150600.6.15.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.ppc64le" }, "product_reference": "openssh-common-9.6p1-150600.6.15.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-9.6p1-150600.6.15.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.s390x" }, "product_reference": "openssh-common-9.6p1-150600.6.15.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-9.6p1-150600.6.15.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.x86_64" }, "product_reference": "openssh-common-9.6p1-150600.6.15.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-9.6p1-150600.6.15.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.aarch64" }, "product_reference": "openssh-fips-9.6p1-150600.6.15.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-9.6p1-150600.6.15.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.ppc64le" }, "product_reference": "openssh-fips-9.6p1-150600.6.15.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-9.6p1-150600.6.15.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.s390x" }, "product_reference": "openssh-fips-9.6p1-150600.6.15.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-9.6p1-150600.6.15.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.x86_64" }, "product_reference": "openssh-fips-9.6p1-150600.6.15.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-9.6p1-150600.6.15.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.aarch64" }, "product_reference": "openssh-helpers-9.6p1-150600.6.15.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-9.6p1-150600.6.15.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.ppc64le" }, "product_reference": "openssh-helpers-9.6p1-150600.6.15.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-9.6p1-150600.6.15.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.s390x" }, "product_reference": "openssh-helpers-9.6p1-150600.6.15.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-9.6p1-150600.6.15.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.x86_64" }, "product_reference": "openssh-helpers-9.6p1-150600.6.15.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-9.6p1-150600.6.15.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.aarch64" }, "product_reference": "openssh-server-9.6p1-150600.6.15.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-9.6p1-150600.6.15.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.ppc64le" }, "product_reference": "openssh-server-9.6p1-150600.6.15.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-9.6p1-150600.6.15.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.s390x" }, "product_reference": "openssh-server-9.6p1-150600.6.15.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-9.6p1-150600.6.15.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.x86_64" }, "product_reference": "openssh-server-9.6p1-150600.6.15.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.aarch64" }, "product_reference": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.ppc64le" }, "product_reference": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.s390x" }, "product_reference": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.x86_64" }, "product_reference": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-9.6p1-150600.6.15.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.aarch64" }, "product_reference": "openssh-askpass-gnome-9.6p1-150600.6.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-9.6p1-150600.6.15.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.ppc64le" }, "product_reference": "openssh-askpass-gnome-9.6p1-150600.6.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-9.6p1-150600.6.15.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.s390x" }, "product_reference": "openssh-askpass-gnome-9.6p1-150600.6.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-9.6p1-150600.6.15.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.x86_64" }, "product_reference": "openssh-askpass-gnome-9.6p1-150600.6.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-9.6p1-150600.6.15.2.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.aarch64" }, "product_reference": "openssh-9.6p1-150600.6.15.2.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-9.6p1-150600.6.15.2.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.ppc64le" }, "product_reference": "openssh-9.6p1-150600.6.15.2.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-9.6p1-150600.6.15.2.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.s390x" }, "product_reference": "openssh-9.6p1-150600.6.15.2.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-9.6p1-150600.6.15.2.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.x86_64" }, "product_reference": "openssh-9.6p1-150600.6.15.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-9.6p1-150600.6.15.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.aarch64" }, "product_reference": "openssh-askpass-gnome-9.6p1-150600.6.15.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-9.6p1-150600.6.15.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.ppc64le" }, "product_reference": "openssh-askpass-gnome-9.6p1-150600.6.15.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-9.6p1-150600.6.15.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.s390x" }, "product_reference": "openssh-askpass-gnome-9.6p1-150600.6.15.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-9.6p1-150600.6.15.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.x86_64" }, "product_reference": "openssh-askpass-gnome-9.6p1-150600.6.15.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-9.6p1-150600.6.15.2.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.aarch64" }, "product_reference": "openssh-cavs-9.6p1-150600.6.15.2.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-9.6p1-150600.6.15.2.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.ppc64le" }, "product_reference": "openssh-cavs-9.6p1-150600.6.15.2.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-9.6p1-150600.6.15.2.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.s390x" }, "product_reference": "openssh-cavs-9.6p1-150600.6.15.2.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-9.6p1-150600.6.15.2.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.x86_64" }, "product_reference": "openssh-cavs-9.6p1-150600.6.15.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-9.6p1-150600.6.15.2.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.aarch64" }, "product_reference": "openssh-clients-9.6p1-150600.6.15.2.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-9.6p1-150600.6.15.2.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.ppc64le" }, "product_reference": "openssh-clients-9.6p1-150600.6.15.2.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-9.6p1-150600.6.15.2.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.s390x" }, "product_reference": "openssh-clients-9.6p1-150600.6.15.2.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-9.6p1-150600.6.15.2.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.x86_64" }, "product_reference": "openssh-clients-9.6p1-150600.6.15.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-9.6p1-150600.6.15.2.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.aarch64" }, "product_reference": "openssh-common-9.6p1-150600.6.15.2.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-9.6p1-150600.6.15.2.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.ppc64le" }, "product_reference": "openssh-common-9.6p1-150600.6.15.2.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-9.6p1-150600.6.15.2.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.s390x" }, "product_reference": "openssh-common-9.6p1-150600.6.15.2.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-9.6p1-150600.6.15.2.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.x86_64" }, "product_reference": "openssh-common-9.6p1-150600.6.15.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-9.6p1-150600.6.15.2.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.aarch64" }, "product_reference": "openssh-fips-9.6p1-150600.6.15.2.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-9.6p1-150600.6.15.2.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.ppc64le" }, "product_reference": "openssh-fips-9.6p1-150600.6.15.2.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-9.6p1-150600.6.15.2.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.s390x" }, "product_reference": "openssh-fips-9.6p1-150600.6.15.2.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-9.6p1-150600.6.15.2.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.x86_64" }, "product_reference": "openssh-fips-9.6p1-150600.6.15.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-9.6p1-150600.6.15.2.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.aarch64" }, "product_reference": "openssh-helpers-9.6p1-150600.6.15.2.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-9.6p1-150600.6.15.2.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.ppc64le" }, "product_reference": "openssh-helpers-9.6p1-150600.6.15.2.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-9.6p1-150600.6.15.2.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.s390x" }, "product_reference": "openssh-helpers-9.6p1-150600.6.15.2.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-9.6p1-150600.6.15.2.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.x86_64" }, "product_reference": "openssh-helpers-9.6p1-150600.6.15.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-9.6p1-150600.6.15.2.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.aarch64" }, "product_reference": "openssh-server-9.6p1-150600.6.15.2.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-9.6p1-150600.6.15.2.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.ppc64le" }, "product_reference": "openssh-server-9.6p1-150600.6.15.2.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-9.6p1-150600.6.15.2.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.s390x" }, "product_reference": "openssh-server-9.6p1-150600.6.15.2.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-9.6p1-150600.6.15.2.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.x86_64" }, "product_reference": "openssh-server-9.6p1-150600.6.15.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.aarch64" }, "product_reference": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.ppc64le" }, "product_reference": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.s390x" }, "product_reference": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.x86_64" }, "product_reference": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-26465", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-26465" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client\u0027s memory resource first, turning the attack complexity high.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.x86_64", "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.aarch64", "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.ppc64le", "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.s390x", "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.x86_64", "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-26465", "url": "https://www.suse.com/security/cve/CVE-2025-26465" }, { "category": "external", "summary": "SUSE Bug 1237040 for CVE-2025-26465", "url": "https://bugzilla.suse.com/1237040" }, { "category": "external", "summary": "SUSE Bug 1237041 for CVE-2025-26465", "url": "https://bugzilla.suse.com/1237041" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.x86_64", "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.aarch64", "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.ppc64le", "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.s390x", "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.x86_64", "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.x86_64", "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.aarch64", "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.ppc64le", "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.s390x", "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.x86_64", "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:42:16Z", "details": "moderate" } ], "title": "CVE-2025-26465" }, { "cve": "CVE-2025-26466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-26466" } ], "notes": [ { "category": "general", "text": "A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.x86_64", "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.aarch64", "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.ppc64le", "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.s390x", "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.x86_64", "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-26466", "url": "https://www.suse.com/security/cve/CVE-2025-26466" }, { "category": "external", "summary": "SUSE Bug 1237041 for CVE-2025-26466", "url": "https://bugzilla.suse.com/1237041" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.x86_64", "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.aarch64", "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.ppc64le", "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.s390x", "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.x86_64", "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.15.1.x86_64", "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.aarch64", "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.ppc64le", "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.s390x", "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.15.1.x86_64", "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.15.2.x86_64", "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.aarch64", "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.ppc64le", "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.s390x", "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:42:16Z", "details": "important" } ], "title": "CVE-2025-26466" } ] }
suse-su-2025:0605-1
Vulnerability from csaf_suse
Published
2025-02-20 14:43
Modified
2025-02-20 14:43
Summary
Security update for openssh
Notes
Title of the patch
Security update for openssh
Description of the patch
This update for openssh fixes the following issues:
- CVE-2025-26465: Fixed MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client (bsc#1237040).
Patchnames
SUSE-2025-605,SUSE-SLE-Micro-5.3-2025-605,SUSE-SLE-Micro-5.4-2025-605,SUSE-SLE-Micro-5.5-2025-605,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-605,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-605,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-605,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-605,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-605,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-605,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-605,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-605,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-605,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-605,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-605,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-605,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-605,SUSE-SUSE-MicroOS-5.1-2025-605,SUSE-SUSE-MicroOS-5.2-2025-605,SUSE-Storage-7.1-2025-605
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssh", "title": "Title of the patch" }, { "category": "description", "text": "This update for openssh fixes the following issues:\n\n- CVE-2025-26465: Fixed MitM attack against OpenSSH\u0027s VerifyHostKeyDNS-enabled client (bsc#1237040).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-605,SUSE-SLE-Micro-5.3-2025-605,SUSE-SLE-Micro-5.4-2025-605,SUSE-SLE-Micro-5.5-2025-605,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-605,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-605,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-605,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-605,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-605,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-605,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-605,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-605,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-605,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-605,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-605,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-605,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-605,SUSE-SUSE-MicroOS-5.1-2025-605,SUSE-SUSE-MicroOS-5.2-2025-605,SUSE-Storage-7.1-2025-605", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0605-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:0605-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250605-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:0605-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020381.html" }, { "category": "self", "summary": "SUSE Bug 1237040", "url": "https://bugzilla.suse.com/1237040" }, { "category": "self", "summary": "SUSE CVE CVE-2025-26465 page", "url": "https://www.suse.com/security/cve/CVE-2025-26465/" } ], "title": "Security update for openssh", "tracking": { "current_release_date": "2025-02-20T14:43:20Z", "generator": { "date": "2025-02-20T14:43:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:0605-1", "initial_release_date": "2025-02-20T14:43:20Z", "revision_history": [ { "date": "2025-02-20T14:43:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openssh-8.4p1-150300.3.42.1.aarch64", "product": { "name": "openssh-8.4p1-150300.3.42.1.aarch64", "product_id": "openssh-8.4p1-150300.3.42.1.aarch64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "product": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "product_id": "openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64" } }, { "category": "product_version", "name": "openssh-cavs-8.4p1-150300.3.42.1.aarch64", "product": { "name": "openssh-cavs-8.4p1-150300.3.42.1.aarch64", "product_id": "openssh-cavs-8.4p1-150300.3.42.1.aarch64" } }, { "category": "product_version", "name": "openssh-clients-8.4p1-150300.3.42.1.aarch64", "product": { "name": "openssh-clients-8.4p1-150300.3.42.1.aarch64", "product_id": "openssh-clients-8.4p1-150300.3.42.1.aarch64" } }, { "category": "product_version", "name": "openssh-common-8.4p1-150300.3.42.1.aarch64", "product": { "name": "openssh-common-8.4p1-150300.3.42.1.aarch64", "product_id": "openssh-common-8.4p1-150300.3.42.1.aarch64" } }, { "category": "product_version", "name": "openssh-fips-8.4p1-150300.3.42.1.aarch64", "product": { "name": "openssh-fips-8.4p1-150300.3.42.1.aarch64", "product_id": "openssh-fips-8.4p1-150300.3.42.1.aarch64" } }, { "category": "product_version", "name": "openssh-helpers-8.4p1-150300.3.42.1.aarch64", "product": { "name": "openssh-helpers-8.4p1-150300.3.42.1.aarch64", "product_id": "openssh-helpers-8.4p1-150300.3.42.1.aarch64" } }, { "category": "product_version", "name": "openssh-server-8.4p1-150300.3.42.1.aarch64", "product": { "name": "openssh-server-8.4p1-150300.3.42.1.aarch64", "product_id": "openssh-server-8.4p1-150300.3.42.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "openssh-8.4p1-150300.3.42.1.i586", "product": { "name": "openssh-8.4p1-150300.3.42.1.i586", "product_id": "openssh-8.4p1-150300.3.42.1.i586" } }, { "category": "product_version", "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.i586", "product": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.i586", "product_id": "openssh-askpass-gnome-8.4p1-150300.3.42.1.i586" } }, { "category": "product_version", "name": "openssh-cavs-8.4p1-150300.3.42.1.i586", "product": { "name": "openssh-cavs-8.4p1-150300.3.42.1.i586", "product_id": "openssh-cavs-8.4p1-150300.3.42.1.i586" } }, { "category": "product_version", "name": "openssh-clients-8.4p1-150300.3.42.1.i586", "product": { "name": "openssh-clients-8.4p1-150300.3.42.1.i586", "product_id": "openssh-clients-8.4p1-150300.3.42.1.i586" } }, { "category": "product_version", "name": "openssh-common-8.4p1-150300.3.42.1.i586", "product": { "name": "openssh-common-8.4p1-150300.3.42.1.i586", "product_id": "openssh-common-8.4p1-150300.3.42.1.i586" } }, { "category": "product_version", "name": "openssh-fips-8.4p1-150300.3.42.1.i586", "product": { "name": "openssh-fips-8.4p1-150300.3.42.1.i586", "product_id": "openssh-fips-8.4p1-150300.3.42.1.i586" } }, { "category": "product_version", "name": "openssh-helpers-8.4p1-150300.3.42.1.i586", "product": { "name": "openssh-helpers-8.4p1-150300.3.42.1.i586", "product_id": "openssh-helpers-8.4p1-150300.3.42.1.i586" } }, { "category": "product_version", "name": "openssh-server-8.4p1-150300.3.42.1.i586", "product": { "name": "openssh-server-8.4p1-150300.3.42.1.i586", "product_id": "openssh-server-8.4p1-150300.3.42.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "openssh-8.4p1-150300.3.42.1.ppc64le", "product": { "name": "openssh-8.4p1-150300.3.42.1.ppc64le", "product_id": "openssh-8.4p1-150300.3.42.1.ppc64le" } }, { "category": "product_version", "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "product": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "product_id": "openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le" } }, { "category": "product_version", "name": "openssh-cavs-8.4p1-150300.3.42.1.ppc64le", "product": { "name": "openssh-cavs-8.4p1-150300.3.42.1.ppc64le", "product_id": "openssh-cavs-8.4p1-150300.3.42.1.ppc64le" } }, { "category": "product_version", "name": "openssh-clients-8.4p1-150300.3.42.1.ppc64le", "product": { "name": "openssh-clients-8.4p1-150300.3.42.1.ppc64le", "product_id": "openssh-clients-8.4p1-150300.3.42.1.ppc64le" } }, { "category": "product_version", "name": "openssh-common-8.4p1-150300.3.42.1.ppc64le", "product": { "name": "openssh-common-8.4p1-150300.3.42.1.ppc64le", "product_id": "openssh-common-8.4p1-150300.3.42.1.ppc64le" } }, { "category": "product_version", "name": "openssh-fips-8.4p1-150300.3.42.1.ppc64le", "product": { "name": "openssh-fips-8.4p1-150300.3.42.1.ppc64le", "product_id": "openssh-fips-8.4p1-150300.3.42.1.ppc64le" } }, { "category": "product_version", "name": "openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "product": { "name": "openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "product_id": "openssh-helpers-8.4p1-150300.3.42.1.ppc64le" } }, { "category": "product_version", "name": "openssh-server-8.4p1-150300.3.42.1.ppc64le", "product": { "name": "openssh-server-8.4p1-150300.3.42.1.ppc64le", "product_id": "openssh-server-8.4p1-150300.3.42.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssh-8.4p1-150300.3.42.1.s390x", "product": { "name": "openssh-8.4p1-150300.3.42.1.s390x", "product_id": "openssh-8.4p1-150300.3.42.1.s390x" } }, { "category": "product_version", "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.s390x", "product": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.s390x", "product_id": "openssh-askpass-gnome-8.4p1-150300.3.42.1.s390x" } }, { "category": "product_version", "name": "openssh-cavs-8.4p1-150300.3.42.1.s390x", "product": { "name": "openssh-cavs-8.4p1-150300.3.42.1.s390x", "product_id": "openssh-cavs-8.4p1-150300.3.42.1.s390x" } }, { "category": "product_version", "name": "openssh-clients-8.4p1-150300.3.42.1.s390x", "product": { "name": "openssh-clients-8.4p1-150300.3.42.1.s390x", "product_id": "openssh-clients-8.4p1-150300.3.42.1.s390x" } }, { "category": "product_version", "name": "openssh-common-8.4p1-150300.3.42.1.s390x", "product": { "name": "openssh-common-8.4p1-150300.3.42.1.s390x", "product_id": "openssh-common-8.4p1-150300.3.42.1.s390x" } }, { "category": "product_version", "name": "openssh-fips-8.4p1-150300.3.42.1.s390x", "product": { "name": "openssh-fips-8.4p1-150300.3.42.1.s390x", "product_id": "openssh-fips-8.4p1-150300.3.42.1.s390x" } }, { "category": "product_version", "name": "openssh-helpers-8.4p1-150300.3.42.1.s390x", "product": { "name": "openssh-helpers-8.4p1-150300.3.42.1.s390x", "product_id": "openssh-helpers-8.4p1-150300.3.42.1.s390x" } }, { "category": "product_version", "name": "openssh-server-8.4p1-150300.3.42.1.s390x", "product": { "name": "openssh-server-8.4p1-150300.3.42.1.s390x", "product_id": "openssh-server-8.4p1-150300.3.42.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-8.4p1-150300.3.42.1.x86_64", "product": { "name": "openssh-8.4p1-150300.3.42.1.x86_64", "product_id": "openssh-8.4p1-150300.3.42.1.x86_64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "product": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "product_id": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64" } }, { "category": "product_version", "name": "openssh-cavs-8.4p1-150300.3.42.1.x86_64", "product": { "name": "openssh-cavs-8.4p1-150300.3.42.1.x86_64", "product_id": "openssh-cavs-8.4p1-150300.3.42.1.x86_64" } }, { "category": "product_version", "name": "openssh-clients-8.4p1-150300.3.42.1.x86_64", "product": { "name": "openssh-clients-8.4p1-150300.3.42.1.x86_64", "product_id": "openssh-clients-8.4p1-150300.3.42.1.x86_64" } }, { "category": "product_version", "name": "openssh-common-8.4p1-150300.3.42.1.x86_64", "product": { "name": "openssh-common-8.4p1-150300.3.42.1.x86_64", "product_id": "openssh-common-8.4p1-150300.3.42.1.x86_64" } }, { "category": "product_version", "name": "openssh-fips-8.4p1-150300.3.42.1.x86_64", "product": { "name": "openssh-fips-8.4p1-150300.3.42.1.x86_64", "product_id": "openssh-fips-8.4p1-150300.3.42.1.x86_64" } }, { "category": "product_version", "name": "openssh-helpers-8.4p1-150300.3.42.1.x86_64", "product": { "name": "openssh-helpers-8.4p1-150300.3.42.1.x86_64", "product_id": "openssh-helpers-8.4p1-150300.3.42.1.x86_64" } }, { "category": "product_version", "name": "openssh-server-8.4p1-150300.3.42.1.x86_64", "product": { "name": "openssh-server-8.4p1-150300.3.42.1.x86_64", "product_id": "openssh-server-8.4p1-150300.3.42.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.4", "product": { "name": "SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp5" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.3", "product": { "name": "SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.3" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.3", "product": { "name": "SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.2" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-common-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-common-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-server-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-server-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-clients-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-clients-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-common-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-common-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-fips-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-fips-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-helpers-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-helpers-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-server-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-server-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-common-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-common-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-server-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-server-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-clients-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-clients-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-common-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-common-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-fips-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-fips-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-helpers-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-helpers-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-server-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-server-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-common-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-common-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-server-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-server-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-clients-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-clients-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-common-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-common-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-fips-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-fips-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-helpers-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-helpers-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-server-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-server-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-clients-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-clients-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-common-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-common-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-fips-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-fips-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-helpers-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-helpers-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-server-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-server-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-clients-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-clients-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-common-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-common-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-fips-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-fips-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-helpers-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-helpers-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-server-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-server-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:openssh-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:openssh-clients-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:openssh-common-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:openssh-fips-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:openssh-helpers-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:openssh-server-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.ppc64le as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:openssh-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.s390x as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:openssh-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:openssh-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.ppc64le as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:openssh-clients-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.s390x as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:openssh-clients-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:openssh-clients-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.ppc64le as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:openssh-common-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.s390x as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:openssh-common-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:openssh-common-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.ppc64le as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:openssh-fips-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.s390x as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:openssh-fips-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:openssh-fips-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.ppc64le as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:openssh-helpers-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.s390x as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:openssh-helpers-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:openssh-helpers-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.ppc64le as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:openssh-server-8.4p1-150300.3.42.1.ppc64le" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.s390x as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:openssh-server-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:openssh-server-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:openssh-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:openssh-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:openssh-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:openssh-clients-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:openssh-clients-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:openssh-clients-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:openssh-common-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:openssh-common-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:openssh-common-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:openssh-fips-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:openssh-fips-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:openssh-fips-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:openssh-server-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:openssh-server-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:openssh-server-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.s390x as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.42.1.s390x" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:openssh-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-150300.3.42.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:openssh-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:openssh-clients-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-150300.3.42.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:openssh-clients-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-clients-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:openssh-common-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-150300.3.42.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:openssh-common-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-common-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:openssh-fips-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-150300.3.42.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:openssh-fips-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-fips-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:openssh-helpers-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-150300.3.42.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:openssh-helpers-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-helpers-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:openssh-server-8.4p1-150300.3.42.1.aarch64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-150300.3.42.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:openssh-server-8.4p1-150300.3.42.1.x86_64" }, "product_reference": "openssh-server-8.4p1-150300.3.42.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-26465", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-26465" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client\u0027s memory resource first, turning the attack complexity high.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Enterprise Storage 7.1:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Enterprise Storage 7.1:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Enterprise Storage 7.1:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Enterprise Storage 7.1:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Enterprise Storage 7.1:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Enterprise Storage 7.1:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Enterprise Storage 7.1:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Enterprise Storage 7.1:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Enterprise Storage 7.1:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Enterprise Storage 7.1:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Enterprise Storage 7.1:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Enterprise Storage 7.1:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Enterprise Storage 7.1:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.1:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.1:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.1:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.1:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.1:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.1:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.1:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.1:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.1:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.1:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.1:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.1:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.1:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.1:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.1:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-clients-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-common-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-fips-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-server-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-clients-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-common-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-fips-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-server-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-clients-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-common-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-fips-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-server-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Proxy 4.3:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Proxy 4.3:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Proxy 4.3:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Proxy 4.3:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Proxy 4.3:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Proxy 4.3:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Server 4.3:openssh-8.4p1-150300.3.42.1.ppc64le", "SUSE Manager Server 4.3:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Manager Server 4.3:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Server 4.3:openssh-clients-8.4p1-150300.3.42.1.ppc64le", "SUSE Manager Server 4.3:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Manager Server 4.3:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Server 4.3:openssh-common-8.4p1-150300.3.42.1.ppc64le", "SUSE Manager Server 4.3:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Manager Server 4.3:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Server 4.3:openssh-fips-8.4p1-150300.3.42.1.ppc64le", "SUSE Manager Server 4.3:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Manager Server 4.3:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Server 4.3:openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "SUSE Manager Server 4.3:openssh-helpers-8.4p1-150300.3.42.1.s390x", "SUSE Manager Server 4.3:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Server 4.3:openssh-server-8.4p1-150300.3.42.1.ppc64le", "SUSE Manager Server 4.3:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Manager Server 4.3:openssh-server-8.4p1-150300.3.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-26465", "url": "https://www.suse.com/security/cve/CVE-2025-26465" }, { "category": "external", "summary": "SUSE Bug 1237040 for CVE-2025-26465", "url": "https://bugzilla.suse.com/1237040" }, { "category": "external", "summary": "SUSE Bug 1237041 for CVE-2025-26465", "url": "https://bugzilla.suse.com/1237041" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Enterprise Storage 7.1:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Enterprise Storage 7.1:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Enterprise Storage 7.1:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Enterprise Storage 7.1:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Enterprise Storage 7.1:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Enterprise Storage 7.1:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Enterprise Storage 7.1:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Enterprise Storage 7.1:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Enterprise Storage 7.1:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Enterprise Storage 7.1:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Enterprise Storage 7.1:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Enterprise Storage 7.1:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Enterprise Storage 7.1:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.1:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.1:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.1:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.1:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.1:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.1:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.1:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.1:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.1:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.1:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.1:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.1:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.1:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.1:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.1:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-clients-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-common-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-fips-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-server-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-clients-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-common-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-fips-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-server-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-clients-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-common-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-fips-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-server-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Proxy 4.3:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Proxy 4.3:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Proxy 4.3:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Proxy 4.3:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Proxy 4.3:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Proxy 4.3:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Server 4.3:openssh-8.4p1-150300.3.42.1.ppc64le", "SUSE Manager Server 4.3:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Manager Server 4.3:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Server 4.3:openssh-clients-8.4p1-150300.3.42.1.ppc64le", "SUSE Manager Server 4.3:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Manager Server 4.3:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Server 4.3:openssh-common-8.4p1-150300.3.42.1.ppc64le", "SUSE Manager Server 4.3:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Manager Server 4.3:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Server 4.3:openssh-fips-8.4p1-150300.3.42.1.ppc64le", "SUSE Manager Server 4.3:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Manager Server 4.3:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Server 4.3:openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "SUSE Manager Server 4.3:openssh-helpers-8.4p1-150300.3.42.1.s390x", "SUSE Manager Server 4.3:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Server 4.3:openssh-server-8.4p1-150300.3.42.1.ppc64le", "SUSE Manager Server 4.3:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Manager Server 4.3:openssh-server-8.4p1-150300.3.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Enterprise Storage 7.1:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Enterprise Storage 7.1:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Enterprise Storage 7.1:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Enterprise Storage 7.1:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Enterprise Storage 7.1:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Enterprise Storage 7.1:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Enterprise Storage 7.1:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Enterprise Storage 7.1:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Enterprise Storage 7.1:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Enterprise Storage 7.1:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Enterprise Storage 7.1:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Enterprise Storage 7.1:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Enterprise Storage 7.1:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.1:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.1:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.1:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.1:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.1:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.1:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.1:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.1:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.1:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.1:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.1:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.1:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.1:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.1:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.1:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.42.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-clients-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-common-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-fips-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-server-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-clients-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-common-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-fips-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-server-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-askpass-gnome-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-askpass-gnome-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-clients-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-common-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-fips-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-server-8.4p1-150300.3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Proxy 4.3:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Proxy 4.3:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Proxy 4.3:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Proxy 4.3:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Proxy 4.3:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Proxy 4.3:openssh-server-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Server 4.3:openssh-8.4p1-150300.3.42.1.ppc64le", "SUSE Manager Server 4.3:openssh-8.4p1-150300.3.42.1.s390x", "SUSE Manager Server 4.3:openssh-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Server 4.3:openssh-clients-8.4p1-150300.3.42.1.ppc64le", "SUSE Manager Server 4.3:openssh-clients-8.4p1-150300.3.42.1.s390x", "SUSE Manager Server 4.3:openssh-clients-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Server 4.3:openssh-common-8.4p1-150300.3.42.1.ppc64le", "SUSE Manager Server 4.3:openssh-common-8.4p1-150300.3.42.1.s390x", "SUSE Manager Server 4.3:openssh-common-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Server 4.3:openssh-fips-8.4p1-150300.3.42.1.ppc64le", "SUSE Manager Server 4.3:openssh-fips-8.4p1-150300.3.42.1.s390x", "SUSE Manager Server 4.3:openssh-fips-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Server 4.3:openssh-helpers-8.4p1-150300.3.42.1.ppc64le", "SUSE Manager Server 4.3:openssh-helpers-8.4p1-150300.3.42.1.s390x", "SUSE Manager Server 4.3:openssh-helpers-8.4p1-150300.3.42.1.x86_64", "SUSE Manager Server 4.3:openssh-server-8.4p1-150300.3.42.1.ppc64le", "SUSE Manager Server 4.3:openssh-server-8.4p1-150300.3.42.1.s390x", "SUSE Manager Server 4.3:openssh-server-8.4p1-150300.3.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-20T14:43:20Z", "details": "moderate" } ], "title": "CVE-2025-26465" } ] }
suse-su-2025:0659-1
Vulnerability from csaf_suse
Published
2025-02-23 12:03
Modified
2025-02-23 12:03
Summary
Security update for openssh
Notes
Title of the patch
Security update for openssh
Description of the patch
This update for openssh fixes the following issues:
- CVE-2025-26465: Fixed a MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client (bsc#1237040).
- Add a s390 specific ioctl for ECC hardware support (bsc#1225637):
- for migration to openssh 8.4: write active/enabled switch over files only if not yet present
(bsc#1220110)
Patchnames
SUSE-2025-659,SUSE-SLE-SERVER-12-SP5-LTSS-2025-659,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-659
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssh", "title": "Title of the patch" }, { "category": "description", "text": "This update for openssh fixes the following issues:\n\n- CVE-2025-26465: Fixed a MitM attack against OpenSSH\u0027s VerifyHostKeyDNS-enabled client (bsc#1237040).\n\n- Add a s390 specific ioctl for ECC hardware support (bsc#1225637):\n- for migration to openssh 8.4: write active/enabled switch over files only if not yet present\n (bsc#1220110)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-659,SUSE-SLE-SERVER-12-SP5-LTSS-2025-659,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-659", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0659-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:0659-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250659-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:0659-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020414.html" }, { "category": "self", "summary": "SUSE Bug 1220110", "url": "https://bugzilla.suse.com/1220110" }, { "category": "self", "summary": "SUSE Bug 1225637", "url": "https://bugzilla.suse.com/1225637" }, { "category": "self", "summary": "SUSE Bug 1237040", "url": "https://bugzilla.suse.com/1237040" }, { "category": "self", "summary": "SUSE CVE CVE-2025-26465 page", "url": "https://www.suse.com/security/cve/CVE-2025-26465/" } ], "title": "Security update for openssh", "tracking": { "current_release_date": "2025-02-23T12:03:53Z", "generator": { "date": "2025-02-23T12:03:53Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:0659-1", "initial_release_date": "2025-02-23T12:03:53Z", "revision_history": [ { "date": "2025-02-23T12:03:53Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openssh-7.2p2-81.26.1.aarch64", "product": { "name": "openssh-7.2p2-81.26.1.aarch64", "product_id": "openssh-7.2p2-81.26.1.aarch64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-7.2p2-81.26.1.aarch64", "product": { "name": "openssh-askpass-gnome-7.2p2-81.26.1.aarch64", "product_id": "openssh-askpass-gnome-7.2p2-81.26.1.aarch64" } }, { "category": "product_version", "name": "openssh-cavs-7.2p2-81.26.1.aarch64", "product": { "name": "openssh-cavs-7.2p2-81.26.1.aarch64", "product_id": "openssh-cavs-7.2p2-81.26.1.aarch64" } }, { "category": "product_version", "name": "openssh-fips-7.2p2-81.26.1.aarch64", "product": { "name": "openssh-fips-7.2p2-81.26.1.aarch64", "product_id": "openssh-fips-7.2p2-81.26.1.aarch64" } }, { "category": "product_version", "name": "openssh-helpers-7.2p2-81.26.1.aarch64", "product": { "name": "openssh-helpers-7.2p2-81.26.1.aarch64", "product_id": "openssh-helpers-7.2p2-81.26.1.aarch64" } }, { "category": "product_version", "name": "openssh-testuser-0-81.26.1.aarch64", "product": { "name": "openssh-testuser-0-81.26.1.aarch64", "product_id": "openssh-testuser-0-81.26.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "openssh-7.2p2-81.26.1.i586", "product": { "name": "openssh-7.2p2-81.26.1.i586", "product_id": "openssh-7.2p2-81.26.1.i586" } }, { "category": "product_version", "name": "openssh-askpass-gnome-7.2p2-81.26.1.i586", "product": { "name": "openssh-askpass-gnome-7.2p2-81.26.1.i586", "product_id": "openssh-askpass-gnome-7.2p2-81.26.1.i586" } }, { "category": "product_version", "name": "openssh-cavs-7.2p2-81.26.1.i586", "product": { "name": "openssh-cavs-7.2p2-81.26.1.i586", "product_id": "openssh-cavs-7.2p2-81.26.1.i586" } }, { "category": "product_version", "name": "openssh-fips-7.2p2-81.26.1.i586", "product": { "name": "openssh-fips-7.2p2-81.26.1.i586", "product_id": "openssh-fips-7.2p2-81.26.1.i586" } }, { "category": "product_version", "name": "openssh-helpers-7.2p2-81.26.1.i586", "product": { "name": "openssh-helpers-7.2p2-81.26.1.i586", "product_id": "openssh-helpers-7.2p2-81.26.1.i586" } }, { "category": "product_version", "name": "openssh-testuser-0-81.26.1.i586", "product": { "name": "openssh-testuser-0-81.26.1.i586", "product_id": "openssh-testuser-0-81.26.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "openssh-7.2p2-81.26.1.ppc64le", "product": { "name": "openssh-7.2p2-81.26.1.ppc64le", "product_id": "openssh-7.2p2-81.26.1.ppc64le" } }, { "category": "product_version", "name": "openssh-askpass-gnome-7.2p2-81.26.1.ppc64le", "product": { "name": "openssh-askpass-gnome-7.2p2-81.26.1.ppc64le", "product_id": "openssh-askpass-gnome-7.2p2-81.26.1.ppc64le" } }, { "category": "product_version", "name": "openssh-cavs-7.2p2-81.26.1.ppc64le", "product": { "name": "openssh-cavs-7.2p2-81.26.1.ppc64le", "product_id": "openssh-cavs-7.2p2-81.26.1.ppc64le" } }, { "category": "product_version", "name": "openssh-fips-7.2p2-81.26.1.ppc64le", "product": { "name": "openssh-fips-7.2p2-81.26.1.ppc64le", "product_id": "openssh-fips-7.2p2-81.26.1.ppc64le" } }, { "category": "product_version", "name": "openssh-helpers-7.2p2-81.26.1.ppc64le", "product": { "name": "openssh-helpers-7.2p2-81.26.1.ppc64le", "product_id": "openssh-helpers-7.2p2-81.26.1.ppc64le" } }, { "category": "product_version", "name": "openssh-testuser-0-81.26.1.ppc64le", "product": { "name": "openssh-testuser-0-81.26.1.ppc64le", "product_id": "openssh-testuser-0-81.26.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssh-7.2p2-81.26.1.s390", "product": { "name": "openssh-7.2p2-81.26.1.s390", "product_id": "openssh-7.2p2-81.26.1.s390" } }, { "category": "product_version", "name": "openssh-askpass-gnome-7.2p2-81.26.1.s390", "product": { "name": "openssh-askpass-gnome-7.2p2-81.26.1.s390", "product_id": "openssh-askpass-gnome-7.2p2-81.26.1.s390" } }, { "category": "product_version", "name": "openssh-cavs-7.2p2-81.26.1.s390", "product": { "name": "openssh-cavs-7.2p2-81.26.1.s390", "product_id": "openssh-cavs-7.2p2-81.26.1.s390" } }, { "category": "product_version", "name": "openssh-fips-7.2p2-81.26.1.s390", "product": { "name": "openssh-fips-7.2p2-81.26.1.s390", "product_id": "openssh-fips-7.2p2-81.26.1.s390" } }, { "category": "product_version", "name": "openssh-helpers-7.2p2-81.26.1.s390", "product": { "name": "openssh-helpers-7.2p2-81.26.1.s390", "product_id": "openssh-helpers-7.2p2-81.26.1.s390" } }, { "category": "product_version", "name": "openssh-testuser-0-81.26.1.s390", "product": { "name": "openssh-testuser-0-81.26.1.s390", "product_id": "openssh-testuser-0-81.26.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "openssh-7.2p2-81.26.1.s390x", "product": { "name": "openssh-7.2p2-81.26.1.s390x", "product_id": "openssh-7.2p2-81.26.1.s390x" } }, { "category": "product_version", "name": "openssh-askpass-gnome-7.2p2-81.26.1.s390x", "product": { "name": "openssh-askpass-gnome-7.2p2-81.26.1.s390x", "product_id": "openssh-askpass-gnome-7.2p2-81.26.1.s390x" } }, { "category": "product_version", "name": "openssh-cavs-7.2p2-81.26.1.s390x", "product": { "name": "openssh-cavs-7.2p2-81.26.1.s390x", "product_id": "openssh-cavs-7.2p2-81.26.1.s390x" } }, { "category": "product_version", "name": "openssh-fips-7.2p2-81.26.1.s390x", "product": { "name": "openssh-fips-7.2p2-81.26.1.s390x", "product_id": "openssh-fips-7.2p2-81.26.1.s390x" } }, { "category": "product_version", "name": "openssh-helpers-7.2p2-81.26.1.s390x", "product": { "name": "openssh-helpers-7.2p2-81.26.1.s390x", "product_id": "openssh-helpers-7.2p2-81.26.1.s390x" } }, { "category": "product_version", "name": "openssh-testuser-0-81.26.1.s390x", "product": { "name": "openssh-testuser-0-81.26.1.s390x", "product_id": "openssh-testuser-0-81.26.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-7.2p2-81.26.1.x86_64", "product": { "name": "openssh-7.2p2-81.26.1.x86_64", "product_id": "openssh-7.2p2-81.26.1.x86_64" } }, { "category": "product_version", "name": "openssh-askpass-gnome-7.2p2-81.26.1.x86_64", "product": { "name": "openssh-askpass-gnome-7.2p2-81.26.1.x86_64", "product_id": "openssh-askpass-gnome-7.2p2-81.26.1.x86_64" } }, { "category": "product_version", "name": "openssh-cavs-7.2p2-81.26.1.x86_64", "product": { "name": "openssh-cavs-7.2p2-81.26.1.x86_64", "product_id": "openssh-cavs-7.2p2-81.26.1.x86_64" } }, { "category": "product_version", "name": "openssh-fips-7.2p2-81.26.1.x86_64", "product": { "name": "openssh-fips-7.2p2-81.26.1.x86_64", "product_id": "openssh-fips-7.2p2-81.26.1.x86_64" } }, { "category": "product_version", "name": "openssh-helpers-7.2p2-81.26.1.x86_64", "product": { "name": "openssh-helpers-7.2p2-81.26.1.x86_64", "product_id": "openssh-helpers-7.2p2-81.26.1.x86_64" } }, { "category": "product_version", "name": "openssh-testuser-0-81.26.1.x86_64", "product": { "name": "openssh-testuser-0-81.26.1.x86_64", "product_id": "openssh-testuser-0-81.26.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product": { "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-81.26.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-7.2p2-81.26.1.aarch64" }, "product_reference": "openssh-7.2p2-81.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-81.26.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-7.2p2-81.26.1.ppc64le" }, "product_reference": "openssh-7.2p2-81.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-81.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-7.2p2-81.26.1.s390x" }, "product_reference": "openssh-7.2p2-81.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-81.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-7.2p2-81.26.1.x86_64" }, "product_reference": "openssh-7.2p2-81.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-81.26.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-askpass-gnome-7.2p2-81.26.1.aarch64" }, "product_reference": "openssh-askpass-gnome-7.2p2-81.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-81.26.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-askpass-gnome-7.2p2-81.26.1.ppc64le" }, "product_reference": "openssh-askpass-gnome-7.2p2-81.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-81.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-askpass-gnome-7.2p2-81.26.1.s390x" }, "product_reference": "openssh-askpass-gnome-7.2p2-81.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-81.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-askpass-gnome-7.2p2-81.26.1.x86_64" }, "product_reference": "openssh-askpass-gnome-7.2p2-81.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-81.26.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-fips-7.2p2-81.26.1.aarch64" }, "product_reference": "openssh-fips-7.2p2-81.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-81.26.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-fips-7.2p2-81.26.1.ppc64le" }, "product_reference": "openssh-fips-7.2p2-81.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-81.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-fips-7.2p2-81.26.1.s390x" }, "product_reference": "openssh-fips-7.2p2-81.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-81.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-fips-7.2p2-81.26.1.x86_64" }, "product_reference": "openssh-fips-7.2p2-81.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-81.26.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-helpers-7.2p2-81.26.1.aarch64" }, "product_reference": "openssh-helpers-7.2p2-81.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-81.26.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-helpers-7.2p2-81.26.1.ppc64le" }, "product_reference": "openssh-helpers-7.2p2-81.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-81.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-helpers-7.2p2-81.26.1.s390x" }, "product_reference": "openssh-helpers-7.2p2-81.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-81.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-helpers-7.2p2-81.26.1.x86_64" }, "product_reference": "openssh-helpers-7.2p2-81.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-7.2p2-81.26.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh-7.2p2-81.26.1.x86_64" }, "product_reference": "openssh-7.2p2-81.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-7.2p2-81.26.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh-askpass-gnome-7.2p2-81.26.1.x86_64" }, "product_reference": "openssh-askpass-gnome-7.2p2-81.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-7.2p2-81.26.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh-fips-7.2p2-81.26.1.x86_64" }, "product_reference": "openssh-fips-7.2p2-81.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-7.2p2-81.26.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh-helpers-7.2p2-81.26.1.x86_64" }, "product_reference": "openssh-helpers-7.2p2-81.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-26465", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-26465" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client\u0027s memory resource first, turning the attack complexity high.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-7.2p2-81.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-7.2p2-81.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-7.2p2-81.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-7.2p2-81.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-askpass-gnome-7.2p2-81.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-askpass-gnome-7.2p2-81.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-askpass-gnome-7.2p2-81.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-askpass-gnome-7.2p2-81.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-fips-7.2p2-81.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-fips-7.2p2-81.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-fips-7.2p2-81.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-fips-7.2p2-81.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-helpers-7.2p2-81.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-helpers-7.2p2-81.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-helpers-7.2p2-81.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-helpers-7.2p2-81.26.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh-7.2p2-81.26.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh-askpass-gnome-7.2p2-81.26.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh-fips-7.2p2-81.26.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh-helpers-7.2p2-81.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-26465", "url": "https://www.suse.com/security/cve/CVE-2025-26465" }, { "category": "external", "summary": "SUSE Bug 1237040 for CVE-2025-26465", "url": "https://bugzilla.suse.com/1237040" }, { "category": "external", "summary": "SUSE Bug 1237041 for CVE-2025-26465", "url": "https://bugzilla.suse.com/1237041" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-7.2p2-81.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-7.2p2-81.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-7.2p2-81.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-7.2p2-81.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-askpass-gnome-7.2p2-81.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-askpass-gnome-7.2p2-81.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-askpass-gnome-7.2p2-81.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-askpass-gnome-7.2p2-81.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-fips-7.2p2-81.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-fips-7.2p2-81.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-fips-7.2p2-81.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-fips-7.2p2-81.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-helpers-7.2p2-81.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-helpers-7.2p2-81.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-helpers-7.2p2-81.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-helpers-7.2p2-81.26.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh-7.2p2-81.26.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh-askpass-gnome-7.2p2-81.26.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh-fips-7.2p2-81.26.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh-helpers-7.2p2-81.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-7.2p2-81.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-7.2p2-81.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-7.2p2-81.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-7.2p2-81.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-askpass-gnome-7.2p2-81.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-askpass-gnome-7.2p2-81.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-askpass-gnome-7.2p2-81.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-askpass-gnome-7.2p2-81.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-fips-7.2p2-81.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-fips-7.2p2-81.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-fips-7.2p2-81.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-fips-7.2p2-81.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-helpers-7.2p2-81.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-helpers-7.2p2-81.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-helpers-7.2p2-81.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh-helpers-7.2p2-81.26.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh-7.2p2-81.26.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh-askpass-gnome-7.2p2-81.26.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh-fips-7.2p2-81.26.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh-helpers-7.2p2-81.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-23T12:03:53Z", "details": "moderate" } ], "title": "CVE-2025-26465" } ] }
suse-su-2025:0744-1
Vulnerability from csaf_suse
Published
2025-02-28 14:39
Modified
2025-02-28 14:39
Summary
Security update for openssh8.4
Notes
Title of the patch
Security update for openssh8.4
Description of the patch
This update for openssh8.4 fixes the following issues:
- CVE-2025-26465: Fixed a MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client (bsc#1237040).
Other bugfixes:
- Fix usage of local accelerator cards via openssl-ibmca (bsc#1216474, bsc#1218871).
- Add patches from upstream to change the default value of UpdateHostKeys to Yes (unless VerifyHostKeyDNS is enabled) (bsc#1222831).
- Fix hostbased ssh login failing occasionally with 'signature unverified: incorrect signature' by fixing a typo in patch (bsc#1221123).
- For now we don't ship the ssh-keycat command, but we need the patch for the other SELinux infrastructure (bsc#1214788).
- Attempts to mitigate instances of secrets lingering in memory after a session exits (bsc#1213004, bsc#1213008, bsc#1186673).
Patchnames
SUSE-2025-744,SUSE-SLE-SERVER-12-SP5-LTSS-2025-744,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-744
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssh8.4", "title": "Title of the patch" }, { "category": "description", "text": "This update for openssh8.4 fixes the following issues:\n\n- CVE-2025-26465: Fixed a MitM attack against OpenSSH\u0027s VerifyHostKeyDNS-enabled client (bsc#1237040).\n\nOther bugfixes:\n\n- Fix usage of local accelerator cards via openssl-ibmca (bsc#1216474, bsc#1218871).\n- Add patches from upstream to change the default value of UpdateHostKeys to Yes (unless VerifyHostKeyDNS is enabled) (bsc#1222831).\n- Fix hostbased ssh login failing occasionally with \u0027signature unverified: incorrect signature\u0027 by fixing a typo in patch (bsc#1221123).\n- For now we don\u0027t ship the ssh-keycat command, but we need the patch for the other SELinux infrastructure (bsc#1214788).\n- Attempts to mitigate instances of secrets lingering in memory after a session exits (bsc#1213004, bsc#1213008, bsc#1186673).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-744,SUSE-SLE-SERVER-12-SP5-LTSS-2025-744,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-744", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0744-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:0744-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250744-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:0744-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020457.html" }, { "category": "self", "summary": "SUSE Bug 1186673", "url": "https://bugzilla.suse.com/1186673" }, { "category": "self", "summary": "SUSE Bug 1213004", "url": "https://bugzilla.suse.com/1213004" }, { "category": "self", "summary": "SUSE Bug 1213008", "url": "https://bugzilla.suse.com/1213008" }, { "category": "self", "summary": "SUSE Bug 1214788", "url": "https://bugzilla.suse.com/1214788" }, { "category": "self", "summary": "SUSE Bug 1216474", "url": "https://bugzilla.suse.com/1216474" }, { "category": "self", "summary": "SUSE Bug 1218871", "url": "https://bugzilla.suse.com/1218871" }, { "category": "self", "summary": "SUSE Bug 1221123", "url": "https://bugzilla.suse.com/1221123" }, { "category": "self", "summary": "SUSE Bug 1222831", "url": "https://bugzilla.suse.com/1222831" }, { "category": "self", "summary": "SUSE Bug 1237040", "url": "https://bugzilla.suse.com/1237040" }, { "category": "self", "summary": "SUSE CVE CVE-2025-26465 page", "url": "https://www.suse.com/security/cve/CVE-2025-26465/" } ], "title": "Security update for openssh8.4", "tracking": { "current_release_date": "2025-02-28T14:39:36Z", "generator": { "date": "2025-02-28T14:39:36Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:0744-1", "initial_release_date": "2025-02-28T14:39:36Z", "revision_history": [ { "date": "2025-02-28T14:39:36Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openssh8.4-8.4p1-8.16.1.aarch64", "product": { "name": "openssh8.4-8.4p1-8.16.1.aarch64", "product_id": "openssh8.4-8.4p1-8.16.1.aarch64" } }, { "category": "product_version", "name": "openssh8.4-cavs-8.4p1-8.16.1.aarch64", "product": { "name": "openssh8.4-cavs-8.4p1-8.16.1.aarch64", "product_id": "openssh8.4-cavs-8.4p1-8.16.1.aarch64" } }, { "category": "product_version", "name": "openssh8.4-clients-8.4p1-8.16.1.aarch64", "product": { "name": "openssh8.4-clients-8.4p1-8.16.1.aarch64", "product_id": "openssh8.4-clients-8.4p1-8.16.1.aarch64" } }, { "category": "product_version", "name": "openssh8.4-common-8.4p1-8.16.1.aarch64", "product": { "name": "openssh8.4-common-8.4p1-8.16.1.aarch64", "product_id": "openssh8.4-common-8.4p1-8.16.1.aarch64" } }, { "category": "product_version", "name": "openssh8.4-fips-8.4p1-8.16.1.aarch64", "product": { "name": "openssh8.4-fips-8.4p1-8.16.1.aarch64", "product_id": "openssh8.4-fips-8.4p1-8.16.1.aarch64" } }, { "category": "product_version", "name": "openssh8.4-helpers-8.4p1-8.16.1.aarch64", "product": { "name": "openssh8.4-helpers-8.4p1-8.16.1.aarch64", "product_id": "openssh8.4-helpers-8.4p1-8.16.1.aarch64" } }, { "category": "product_version", "name": "openssh8.4-server-8.4p1-8.16.1.aarch64", "product": { "name": "openssh8.4-server-8.4p1-8.16.1.aarch64", "product_id": "openssh8.4-server-8.4p1-8.16.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "openssh8.4-8.4p1-8.16.1.i586", "product": { "name": "openssh8.4-8.4p1-8.16.1.i586", "product_id": "openssh8.4-8.4p1-8.16.1.i586" } }, { "category": "product_version", "name": "openssh8.4-cavs-8.4p1-8.16.1.i586", "product": { "name": "openssh8.4-cavs-8.4p1-8.16.1.i586", "product_id": "openssh8.4-cavs-8.4p1-8.16.1.i586" } }, { "category": "product_version", "name": "openssh8.4-clients-8.4p1-8.16.1.i586", "product": { "name": "openssh8.4-clients-8.4p1-8.16.1.i586", "product_id": "openssh8.4-clients-8.4p1-8.16.1.i586" } }, { "category": "product_version", "name": "openssh8.4-common-8.4p1-8.16.1.i586", "product": { "name": "openssh8.4-common-8.4p1-8.16.1.i586", "product_id": "openssh8.4-common-8.4p1-8.16.1.i586" } }, { "category": "product_version", "name": "openssh8.4-fips-8.4p1-8.16.1.i586", "product": { "name": "openssh8.4-fips-8.4p1-8.16.1.i586", "product_id": "openssh8.4-fips-8.4p1-8.16.1.i586" } }, { "category": "product_version", "name": "openssh8.4-helpers-8.4p1-8.16.1.i586", "product": { "name": "openssh8.4-helpers-8.4p1-8.16.1.i586", "product_id": "openssh8.4-helpers-8.4p1-8.16.1.i586" } }, { "category": "product_version", "name": "openssh8.4-server-8.4p1-8.16.1.i586", "product": { "name": "openssh8.4-server-8.4p1-8.16.1.i586", "product_id": "openssh8.4-server-8.4p1-8.16.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "openssh8.4-8.4p1-8.16.1.ppc64le", "product": { "name": "openssh8.4-8.4p1-8.16.1.ppc64le", "product_id": "openssh8.4-8.4p1-8.16.1.ppc64le" } }, { "category": "product_version", "name": "openssh8.4-cavs-8.4p1-8.16.1.ppc64le", "product": { "name": "openssh8.4-cavs-8.4p1-8.16.1.ppc64le", "product_id": "openssh8.4-cavs-8.4p1-8.16.1.ppc64le" } }, { "category": "product_version", "name": "openssh8.4-clients-8.4p1-8.16.1.ppc64le", "product": { "name": "openssh8.4-clients-8.4p1-8.16.1.ppc64le", "product_id": "openssh8.4-clients-8.4p1-8.16.1.ppc64le" } }, { "category": "product_version", "name": "openssh8.4-common-8.4p1-8.16.1.ppc64le", "product": { "name": "openssh8.4-common-8.4p1-8.16.1.ppc64le", "product_id": "openssh8.4-common-8.4p1-8.16.1.ppc64le" } }, { "category": "product_version", "name": "openssh8.4-fips-8.4p1-8.16.1.ppc64le", "product": { "name": "openssh8.4-fips-8.4p1-8.16.1.ppc64le", "product_id": "openssh8.4-fips-8.4p1-8.16.1.ppc64le" } }, { "category": "product_version", "name": "openssh8.4-helpers-8.4p1-8.16.1.ppc64le", "product": { "name": "openssh8.4-helpers-8.4p1-8.16.1.ppc64le", "product_id": "openssh8.4-helpers-8.4p1-8.16.1.ppc64le" } }, { "category": "product_version", "name": "openssh8.4-server-8.4p1-8.16.1.ppc64le", "product": { "name": "openssh8.4-server-8.4p1-8.16.1.ppc64le", "product_id": "openssh8.4-server-8.4p1-8.16.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssh8.4-8.4p1-8.16.1.s390", "product": { "name": "openssh8.4-8.4p1-8.16.1.s390", "product_id": "openssh8.4-8.4p1-8.16.1.s390" } }, { "category": "product_version", "name": "openssh8.4-cavs-8.4p1-8.16.1.s390", "product": { "name": "openssh8.4-cavs-8.4p1-8.16.1.s390", "product_id": "openssh8.4-cavs-8.4p1-8.16.1.s390" } }, { "category": "product_version", "name": "openssh8.4-clients-8.4p1-8.16.1.s390", "product": { "name": "openssh8.4-clients-8.4p1-8.16.1.s390", "product_id": "openssh8.4-clients-8.4p1-8.16.1.s390" } }, { "category": "product_version", "name": "openssh8.4-common-8.4p1-8.16.1.s390", "product": { "name": "openssh8.4-common-8.4p1-8.16.1.s390", "product_id": "openssh8.4-common-8.4p1-8.16.1.s390" } }, { "category": "product_version", "name": "openssh8.4-fips-8.4p1-8.16.1.s390", "product": { "name": "openssh8.4-fips-8.4p1-8.16.1.s390", "product_id": "openssh8.4-fips-8.4p1-8.16.1.s390" } }, { "category": "product_version", "name": "openssh8.4-helpers-8.4p1-8.16.1.s390", "product": { "name": "openssh8.4-helpers-8.4p1-8.16.1.s390", "product_id": "openssh8.4-helpers-8.4p1-8.16.1.s390" } }, { "category": "product_version", "name": "openssh8.4-server-8.4p1-8.16.1.s390", "product": { "name": "openssh8.4-server-8.4p1-8.16.1.s390", "product_id": "openssh8.4-server-8.4p1-8.16.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "openssh8.4-8.4p1-8.16.1.s390x", "product": { "name": "openssh8.4-8.4p1-8.16.1.s390x", "product_id": "openssh8.4-8.4p1-8.16.1.s390x" } }, { "category": "product_version", "name": "openssh8.4-cavs-8.4p1-8.16.1.s390x", "product": { "name": "openssh8.4-cavs-8.4p1-8.16.1.s390x", "product_id": "openssh8.4-cavs-8.4p1-8.16.1.s390x" } }, { "category": "product_version", "name": "openssh8.4-clients-8.4p1-8.16.1.s390x", "product": { "name": "openssh8.4-clients-8.4p1-8.16.1.s390x", "product_id": "openssh8.4-clients-8.4p1-8.16.1.s390x" } }, { "category": "product_version", "name": "openssh8.4-common-8.4p1-8.16.1.s390x", "product": { "name": "openssh8.4-common-8.4p1-8.16.1.s390x", "product_id": "openssh8.4-common-8.4p1-8.16.1.s390x" } }, { "category": "product_version", "name": "openssh8.4-fips-8.4p1-8.16.1.s390x", "product": { "name": "openssh8.4-fips-8.4p1-8.16.1.s390x", "product_id": "openssh8.4-fips-8.4p1-8.16.1.s390x" } }, { "category": "product_version", "name": "openssh8.4-helpers-8.4p1-8.16.1.s390x", "product": { "name": "openssh8.4-helpers-8.4p1-8.16.1.s390x", "product_id": "openssh8.4-helpers-8.4p1-8.16.1.s390x" } }, { "category": "product_version", "name": "openssh8.4-server-8.4p1-8.16.1.s390x", "product": { "name": "openssh8.4-server-8.4p1-8.16.1.s390x", "product_id": "openssh8.4-server-8.4p1-8.16.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh8.4-8.4p1-8.16.1.x86_64", "product": { "name": "openssh8.4-8.4p1-8.16.1.x86_64", "product_id": "openssh8.4-8.4p1-8.16.1.x86_64" } }, { "category": "product_version", "name": "openssh8.4-cavs-8.4p1-8.16.1.x86_64", "product": { "name": "openssh8.4-cavs-8.4p1-8.16.1.x86_64", "product_id": "openssh8.4-cavs-8.4p1-8.16.1.x86_64" } }, { "category": "product_version", "name": "openssh8.4-clients-8.4p1-8.16.1.x86_64", "product": { "name": "openssh8.4-clients-8.4p1-8.16.1.x86_64", "product_id": "openssh8.4-clients-8.4p1-8.16.1.x86_64" } }, { "category": "product_version", "name": "openssh8.4-common-8.4p1-8.16.1.x86_64", "product": { "name": "openssh8.4-common-8.4p1-8.16.1.x86_64", "product_id": "openssh8.4-common-8.4p1-8.16.1.x86_64" } }, { "category": "product_version", "name": "openssh8.4-fips-8.4p1-8.16.1.x86_64", "product": { "name": "openssh8.4-fips-8.4p1-8.16.1.x86_64", "product_id": "openssh8.4-fips-8.4p1-8.16.1.x86_64" } }, { "category": "product_version", "name": "openssh8.4-helpers-8.4p1-8.16.1.x86_64", "product": { "name": "openssh8.4-helpers-8.4p1-8.16.1.x86_64", "product_id": "openssh8.4-helpers-8.4p1-8.16.1.x86_64" } }, { "category": "product_version", "name": "openssh8.4-server-8.4p1-8.16.1.x86_64", "product": { "name": "openssh8.4-server-8.4p1-8.16.1.x86_64", "product_id": "openssh8.4-server-8.4p1-8.16.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product": { "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-8.4p1-8.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.16.1.aarch64" }, "product_reference": "openssh8.4-8.4p1-8.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-8.4p1-8.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.16.1.ppc64le" }, "product_reference": "openssh8.4-8.4p1-8.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-8.4p1-8.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.16.1.s390x" }, "product_reference": "openssh8.4-8.4p1-8.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-8.4p1-8.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.16.1.x86_64" }, "product_reference": "openssh8.4-8.4p1-8.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-clients-8.4p1-8.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.16.1.aarch64" }, "product_reference": "openssh8.4-clients-8.4p1-8.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-clients-8.4p1-8.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.16.1.ppc64le" }, "product_reference": "openssh8.4-clients-8.4p1-8.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-clients-8.4p1-8.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.16.1.s390x" }, "product_reference": "openssh8.4-clients-8.4p1-8.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-clients-8.4p1-8.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.16.1.x86_64" }, "product_reference": "openssh8.4-clients-8.4p1-8.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-common-8.4p1-8.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.16.1.aarch64" }, "product_reference": "openssh8.4-common-8.4p1-8.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-common-8.4p1-8.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.16.1.ppc64le" }, "product_reference": "openssh8.4-common-8.4p1-8.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-common-8.4p1-8.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.16.1.s390x" }, "product_reference": "openssh8.4-common-8.4p1-8.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-common-8.4p1-8.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.16.1.x86_64" }, "product_reference": "openssh8.4-common-8.4p1-8.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-fips-8.4p1-8.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.16.1.aarch64" }, "product_reference": "openssh8.4-fips-8.4p1-8.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-fips-8.4p1-8.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.16.1.ppc64le" }, "product_reference": "openssh8.4-fips-8.4p1-8.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-fips-8.4p1-8.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.16.1.s390x" }, "product_reference": "openssh8.4-fips-8.4p1-8.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-fips-8.4p1-8.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.16.1.x86_64" }, "product_reference": "openssh8.4-fips-8.4p1-8.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-helpers-8.4p1-8.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.16.1.aarch64" }, "product_reference": "openssh8.4-helpers-8.4p1-8.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-helpers-8.4p1-8.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.16.1.ppc64le" }, "product_reference": "openssh8.4-helpers-8.4p1-8.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-helpers-8.4p1-8.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.16.1.s390x" }, "product_reference": "openssh8.4-helpers-8.4p1-8.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-helpers-8.4p1-8.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.16.1.x86_64" }, "product_reference": "openssh8.4-helpers-8.4p1-8.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-server-8.4p1-8.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.16.1.aarch64" }, "product_reference": "openssh8.4-server-8.4p1-8.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-server-8.4p1-8.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.16.1.ppc64le" }, "product_reference": "openssh8.4-server-8.4p1-8.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-server-8.4p1-8.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.16.1.s390x" }, "product_reference": "openssh8.4-server-8.4p1-8.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-server-8.4p1-8.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.16.1.x86_64" }, "product_reference": "openssh8.4-server-8.4p1-8.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-8.4p1-8.16.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-8.4p1-8.16.1.x86_64" }, "product_reference": "openssh8.4-8.4p1-8.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-clients-8.4p1-8.16.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-clients-8.4p1-8.16.1.x86_64" }, "product_reference": "openssh8.4-clients-8.4p1-8.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-common-8.4p1-8.16.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-common-8.4p1-8.16.1.x86_64" }, "product_reference": "openssh8.4-common-8.4p1-8.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-fips-8.4p1-8.16.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-fips-8.4p1-8.16.1.x86_64" }, "product_reference": "openssh8.4-fips-8.4p1-8.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-helpers-8.4p1-8.16.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-helpers-8.4p1-8.16.1.x86_64" }, "product_reference": "openssh8.4-helpers-8.4p1-8.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssh8.4-server-8.4p1-8.16.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-server-8.4p1-8.16.1.x86_64" }, "product_reference": "openssh8.4-server-8.4p1-8.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-26465", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-26465" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client\u0027s memory resource first, turning the attack complexity high.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-clients-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-common-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-fips-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-helpers-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-server-8.4p1-8.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-26465", "url": "https://www.suse.com/security/cve/CVE-2025-26465" }, { "category": "external", "summary": "SUSE Bug 1237040 for CVE-2025-26465", "url": "https://bugzilla.suse.com/1237040" }, { "category": "external", "summary": "SUSE Bug 1237041 for CVE-2025-26465", "url": "https://bugzilla.suse.com/1237041" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-clients-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-common-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-fips-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-helpers-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-server-8.4p1-8.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-clients-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-common-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-fips-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-helpers-8.4p1-8.16.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-server-8.4p1-8.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-28T14:39:36Z", "details": "moderate" } ], "title": "CVE-2025-26465" } ] }
ncsc-2025-0187
Vulnerability from csaf_ncscnl
Published
2025-06-10 13:11
Modified
2025-06-10 13:11
Summary
Kwetsbaarheden verholpen in Siemens producten
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Siemens heeft kwetsbaarheden verholpen in diverse producten als RUGGEDCOM, SCALANCE, SIMATIC en Tecnomatix
Interpretaties
De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Manipulatie van gegevens
- Omzeilen van een beveiligingsmaatregel
- Omzeilen van authenticatie
- (Remote) code execution (root/admin rechten)
- (Remote) code execution (Gebruikersrechten)
- Toegang tot systeemgegevens
- Toegang tot gevoelige gegevens
- Spoofing
De kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.
Oplossingen
Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico's zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-395
Use of NullPointerException Catch to Detect NULL Pointer Dereference
CWE-332
Insufficient Entropy in PRNG
CWE-940
Improper Verification of Source of a Communication Channel
CWE-466
Return of Pointer Value Outside of Expected Range
CWE-390
Detection of Error Condition Without Action
CWE-826
Premature Release of Resource During Expected Lifetime
CWE-222
Truncation of Security-relevant Information
CWE-310
CWE-310
CWE-273
Improper Check for Dropped Privileges
CWE-364
Signal Handler Race Condition
CWE-911
Improper Update of Reference Count
CWE-131
Incorrect Calculation of Buffer Size
CWE-304
Missing Critical Step in Authentication
CWE-684
Incorrect Provision of Specified Functionality
CWE-130
Improper Handling of Length Parameter Inconsistency
CWE-268
Privilege Chaining
CWE-366
Race Condition within a Thread
CWE-150
Improper Neutralization of Escape, Meta, or Control Sequences
CWE-201
Insertion of Sensitive Information Into Sent Data
CWE-407
Inefficient Algorithmic Complexity
CWE-371
CWE-371
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE-667
Improper Locking
CWE-311
Missing Encryption of Sensitive Data
CWE-703
Improper Check or Handling of Exceptional Conditions
CWE-908
Use of Uninitialized Resource
CWE-617
Reachable Assertion
CWE-129
Improper Validation of Array Index
CWE-124
Buffer Underwrite ('Buffer Underflow')
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CWE-345
Insufficient Verification of Data Authenticity
CWE-354
Improper Validation of Integrity Check Value
CWE-325
Missing Cryptographic Step
CWE-190
Integer Overflow or Wraparound
CWE-290
Authentication Bypass by Spoofing
CWE-99
Improper Control of Resource Identifiers ('Resource Injection')
CWE-665
Improper Initialization
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-125
Out-of-bounds Read
CWE-404
Improper Resource Shutdown or Release
CWE-284
Improper Access Control
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-416
Use After Free
CWE-476
NULL Pointer Dereference
CWE-757
Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')
CWE-400
Uncontrolled Resource Consumption
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE-611
Improper Restriction of XML External Entity Reference
CWE-787
Out-of-bounds Write
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-122
Heap-based Buffer Overflow
CWE-121
Stack-based Buffer Overflow
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE-73
External Control of File Name or Path
CWE-20
Improper Input Validation
CWE-863
Incorrect Authorization
CWE-276
Incorrect Default Permissions
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als RUGGEDCOM, SCALANCE, SIMATIC en Tecnomatix", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Omzeilen van een beveiligingsmaatregel\n- Omzeilen van authenticatie\n- (Remote) code execution (root/admin rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Toegang tot gevoelige gegevens\n- Spoofing\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.", "title": "Interpretaties" }, { "category": "description", "text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Use of NullPointerException Catch to Detect NULL Pointer Dereference", "title": "CWE-395" }, { "category": "general", "text": "Insufficient Entropy in PRNG", "title": "CWE-332" }, { "category": "general", "text": "Improper Verification of Source of a Communication Channel", "title": "CWE-940" }, { "category": "general", "text": "Return of Pointer Value Outside of Expected Range", "title": "CWE-466" }, { "category": "general", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "general", "text": "Premature Release of Resource During Expected Lifetime", "title": "CWE-826" }, { "category": "general", "text": "Truncation of Security-relevant Information", "title": "CWE-222" }, { "category": "general", "text": "CWE-310", "title": "CWE-310" }, { "category": "general", "text": "Improper Check for Dropped Privileges", "title": "CWE-273" }, { "category": "general", "text": "Signal Handler Race Condition", "title": "CWE-364" }, { "category": "general", "text": "Improper Update of Reference Count", "title": "CWE-911" }, { "category": "general", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" }, { "category": "general", "text": "Missing Critical Step in Authentication", "title": "CWE-304" }, { "category": "general", "text": "Incorrect Provision of Specified Functionality", "title": "CWE-684" }, { "category": "general", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" }, { "category": "general", "text": "Privilege Chaining", "title": "CWE-268" }, { "category": "general", "text": "Race Condition within a Thread", "title": "CWE-366" }, { "category": "general", "text": "Improper Neutralization of Escape, Meta, or Control Sequences", "title": "CWE-150" }, { "category": "general", "text": "Insertion of Sensitive Information Into Sent Data", "title": "CWE-201" }, { "category": "general", "text": "Inefficient Algorithmic Complexity", "title": "CWE-407" }, { "category": "general", "text": "CWE-371", "title": "CWE-371" }, { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "Improper Locking", "title": "CWE-667" }, { "category": "general", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "general", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" }, { "category": "general", "text": "Use of Uninitialized Resource", "title": "CWE-908" }, { "category": "general", "text": "Reachable Assertion", "title": "CWE-617" }, { "category": "general", "text": "Improper Validation of Array Index", "title": "CWE-129" }, { "category": "general", "text": "Buffer Underwrite (\u0027Buffer Underflow\u0027)", "title": "CWE-124" }, { "category": "general", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Improper Validation of Integrity Check Value", "title": "CWE-354" }, { "category": "general", "text": "Missing Cryptographic Step", "title": "CWE-325" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Authentication Bypass by Spoofing", "title": "CWE-290" }, { "category": "general", "text": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)", "title": "CWE-99" }, { "category": "general", "text": "Improper Initialization", "title": "CWE-665" }, { "category": "general", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)", "title": "CWE-757" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "general", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "general", "text": "External Control of File Name or Path", "title": "CWE-73" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Incorrect Authorization", "title": "CWE-863" }, { "category": "general", "text": "Incorrect Default Permissions", "title": "CWE-276" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - ncscclear", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-082556.pdf" }, { "category": "external", "summary": "Reference - ncscclear", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-345750.pdf" }, { "category": "external", "summary": "Reference - ncscclear", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-486186.pdf" }, { "category": "external", "summary": "Reference - ncscclear", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-513708.pdf" }, { "category": "external", "summary": "Reference - ncscclear", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-633269.pdf" }, { "category": "external", "summary": "Reference - ncscclear", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-693776.pdf" } ], "title": "Kwetsbaarheden verholpen in Siemens producten", "tracking": { "current_release_date": "2025-06-10T13:11:56.672768Z", "generator": { "date": "2025-06-05T14:45:00Z", "engine": { "name": "V.A.", "version": "1.1" } }, "id": "NCSC-2025-0187", "initial_release_date": "2025-06-10T13:11:56.672768Z", "revision_history": [ { "date": "2025-06-10T13:11:56.672768Z", "number": "1.0.0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:unknown/none", "product": { "name": "vers:unknown/none", "product_id": "CSAFPID-1211853" } } ], "category": "product_name", "name": "SIMATIC S7-1500" }, { "branches": [ { "category": "product_version_range", "name": "vers:siemens/3.1.0", "product": { "name": "vers:siemens/3.1.0", "product_id": "CSAFPID-1195553" } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP Firmware" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/1.0", "product": { "name": "vers:unknown/1.0", "product_id": "CSAFPID-1211202" } } ], "category": "product_name", "name": "Simatic S7-1500 Tm Mfp Firmware" }, { "branches": [ { "category": "product_version_range", "name": "vers:siemens/7.4.3", "product": { "name": "vers:siemens/7.4.3", "product_id": "CSAFPID-2849543" } }, { "category": "product_version_range", "name": "vers:unknown/none", "product": { "name": "vers:unknown/none", "product_id": "CSAFPID-1756091" } } ], "category": "product_name", "name": "RUGGEDCOM APE1808 Firmware" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/none", "product": { "name": "vers:unknown/none", "product_id": "CSAFPID-2619544" } } ], "category": "product_name", "name": "Ruggedcom Ape1808" }, { "branches": [ { "category": "product_version_range", "name": "vers:siemens/3.0.0", "product": { "name": "vers:siemens/3.0.0", "product_id": "CSAFPID-2082475" } } ], "category": "product_name", "name": "Scalance W700 Ieee 802.11Ax Firmware" } ], "category": "product_family", "name": "Siemens" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=v3.1.0", "product": { "name": "vers:all/\u003e=v3.1.0", "product_id": "CSAFPID-1266669" } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=v3.1.0", "product": { "name": "vers:all/\u003e=v3.1.0", "product_id": "CSAFPID-1266670" } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=v3.1.0", "product": { "name": "vers:all/\u003e=v3.1.0", "product_id": "CSAFPID-1266671" } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=v3.1.0", "product": { "name": "vers:all/\u003e=v3.1.0", "product_id": "CSAFPID-1266672" } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "vers:all/*", "product_id": "CSAFPID-2460438" } }, { "category": "product_version_range", "name": "vers:unknown/\u003cv1.3.0", "product": { "name": "vers:unknown/\u003cv1.3.0", "product_id": "CSAFPID-1270701" } } ], "category": "product_name", "name": "SIMATIC S7-1500 TM MFP - BIOS" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003cv1.1", "product": { "name": "vers:unknown/\u003cv1.1", "product_id": "CSAFPID-1270700" } } ], "category": "product_name", "name": "SIMATIC S7-1500 TM MFP -\u00a0GNU/Linux subsystem" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=v3.1.0", "product": { "name": "vers:all/\u003e=v3.1.0", "product_id": "CSAFPID-1266673" } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "vers:all/*", "product_id": "CSAFPID-1272525" } } ], "category": "product_name", "name": "RUGGEDCOM APE1808" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/*", "product": { "name": "vers:unknown/*", "product_id": "CSAFPID-126262", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_ape1808:*:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "ruggedcom_ape1808" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "vers:all/*", "product_id": "CSAFPID-2905706" } } ], "category": "product_name", "name": "Energy Services" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv2404.0013", "product": { "name": "vers:all/\u003cv2404.0013", "product_id": "CSAFPID-2905742" } } ], "category": "product_name", "name": "Tecnomatix Plant Simulation V2404" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905748" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905793" } } ], "category": "product_name", "name": "SCALANCE XC316-8 (6GK5324-8TS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905749" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905794" } } ], "category": "product_name", "name": "SCALANCE XC324-4 (6GK5328-4TS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905750" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905795" } } ], "category": "product_name", "name": "SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905751" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905796" } } ], "category": "product_name", "name": "SCALANCE XC332 (6GK5332-0GA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905752" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905797" } } ], "category": "product_name", "name": "SCALANCE XC416-8 (6GK5424-8TR00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905753" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905798" } } ], "category": "product_name", "name": "SCALANCE XC424-4 (6GK5428-4TR00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905754" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905799" } } ], "category": "product_name", "name": "SCALANCE XC432 (6GK5432-0GR00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905755" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905800" } } ], "category": "product_name", "name": "SCALANCE XCH328 (6GK5328-4TS01-2EC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905756" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905801" } } ], "category": "product_name", "name": "SCALANCE XCM324 (6GK5324-8TS01-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905757" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905802" } } ], "category": "product_name", "name": "SCALANCE XCM328 (6GK5328-4TS01-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905758" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905803" } } ], "category": "product_name", "name": "SCALANCE XCM332 (6GK5332-0GA01-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905759" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905804" } } ], "category": "product_name", "name": "SCALANCE XR302-32 (6GK5334-5TS00-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905760" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905805" } } ], "category": "product_name", "name": "SCALANCE XR302-32 (6GK5334-5TS00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905761" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905806" } } ], "category": "product_name", "name": "SCALANCE XR302-32 (6GK5334-5TS00-4AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905762" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905807" } } ], "category": "product_name", "name": "SCALANCE XR322-12 (6GK5334-3TS00-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905763" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905808" } } ], "category": "product_name", "name": "SCALANCE XR322-12 (6GK5334-3TS00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905764" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905809" } } ], "category": "product_name", "name": "SCALANCE XR322-12 (6GK5334-3TS00-4AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905765" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905810" } } ], "category": "product_name", "name": "SCALANCE XR326-8 (6GK5334-2TS00-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905766" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905811" } } ], "category": "product_name", "name": "SCALANCE XR326-8 (6GK5334-2TS00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905767" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905812" } } ], "category": "product_name", "name": "SCALANCE XR326-8 (6GK5334-2TS00-4AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905768" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905813" } } ], "category": "product_name", "name": "SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905769" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905814" } } ], "category": "product_name", "name": "SCALANCE XR502-32 (6GK5534-5TR00-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905770" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905815" } } ], "category": "product_name", "name": "SCALANCE XR502-32 (6GK5534-5TR00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905771" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905816" } } ], "category": "product_name", "name": "SCALANCE XR502-32 (6GK5534-5TR00-4AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905772" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905817" } } ], "category": "product_name", "name": "SCALANCE XR522-12 (6GK5534-3TR00-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905773" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905818" } } ], "category": "product_name", "name": "SCALANCE XR522-12 (6GK5534-3TR00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905774" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905819" } } ], "category": "product_name", "name": "SCALANCE XR522-12 (6GK5534-3TR00-4AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905775" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905820" } } ], "category": "product_name", "name": "SCALANCE XR526-8 (6GK5534-2TR00-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905776" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905821" } } ], "category": "product_name", "name": "SCALANCE XR526-8 (6GK5534-2TR00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905777" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905822" } } ], "category": "product_name", "name": "SCALANCE XR526-8 (6GK5534-2TR00-4AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905778" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905823" } } ], "category": "product_name", "name": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905786" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905831" } } ], "category": "product_name", "name": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905785" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905830" } } ], "category": "product_name", "name": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905787" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905832" } } ], "category": "product_name", "name": "SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905783" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905828" } } ], "category": "product_name", "name": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905782" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905827" } } ], "category": "product_name", "name": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905784" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905829" } } ], "category": "product_name", "name": "SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905780" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905825" } } ], "category": "product_name", "name": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905779" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905824" } } ], "category": "product_name", "name": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cv3.1", "product": { "name": "vers:all/\u003cv3.1", "product_id": "CSAFPID-2905781" } }, { "category": "product_version_range", "name": "vers:all/\u003cv3.2", "product": { "name": "vers:all/\u003cv3.2", "product_id": "CSAFPID-2905826" } } ], "category": "product_name", "name": "SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-41617", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "other", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "other", "text": "Improper Check for Dropped Privileges", "title": "CWE-273" }, { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2021-41617 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-41617.json" } ], "title": "CVE-2021-41617" }, { "cve": "CVE-2023-4527", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4527 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-4527.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2023-4527" }, { "cve": "CVE-2023-4806", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4806 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-4806.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2023-4806" }, { "cve": "CVE-2023-4911", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4911 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-4911.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2023-4911" }, { "cve": "CVE-2023-5363", "cwe": { "id": "CWE-325", "name": "Missing Cryptographic Step" }, "notes": [ { "category": "other", "text": "Missing Cryptographic Step", "title": "CWE-325" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Incorrect Provision of Specified Functionality", "title": "CWE-684" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5363 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-5363.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2023-5363" }, { "cve": "CVE-2023-6246", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2023-6246 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-6246.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2023-6246" }, { "cve": "CVE-2023-6779", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2023-6779 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-6779.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2023-6779" }, { "cve": "CVE-2023-6780", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "other", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2023-6780 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-6780.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2023-6780" }, { "cve": "CVE-2023-28531", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "other", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2023-28531 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-28531.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2023-28531" }, { "cve": "CVE-2023-38545", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2023-38545 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-38545.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2023-38545" }, { "cve": "CVE-2023-38546", "cwe": { "id": "CWE-73", "name": "External Control of File Name or Path" }, "notes": [ { "category": "other", "text": "External Control of File Name or Path", "title": "CWE-73" }, { "category": "other", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2023-38546 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-38546.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2023-38546" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2023-44487 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-44487.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2023-44487" }, { "cve": "CVE-2023-46218", "cwe": { "id": "CWE-201", "name": "Insertion of Sensitive Information Into Sent Data" }, "notes": [ { "category": "other", "text": "Insertion of Sensitive Information Into Sent Data", "title": "CWE-201" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2023-46218 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-46218.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2023-46218" }, { "cve": "CVE-2023-46219", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "other", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2023-46219 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-46219.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2023-46219" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "other", "text": "Truncation of Security-relevant Information", "title": "CWE-222" }, { "category": "other", "text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)", "title": "CWE-757" }, { "category": "other", "text": "Improper Validation of Integrity Check Value", "title": "CWE-354" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/AU:N/R:A/V:D/RE:L/U:Amber", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2023-48795 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-48795.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-51384", "cwe": { "id": "CWE-304", "name": "Missing Critical Step in Authentication" }, "notes": [ { "category": "other", "text": "Missing Critical Step in Authentication", "title": "CWE-304" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51384 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-51384.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2023-51384" }, { "cve": "CVE-2023-51385", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51385 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-51385.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2023-51385" }, { "cve": "CVE-2023-52927", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52927 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-52927.json" } ], "title": "CVE-2023-52927" }, { "cve": "CVE-2024-2961", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2961 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-2961.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2024-2961" }, { "cve": "CVE-2024-6119", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6119 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-6119.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2024-6119" }, { "cve": "CVE-2024-6387", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "other", "text": "Signal Handler Race Condition", "title": "CWE-364" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6387 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-6387.json" } ], "title": "CVE-2024-6387" }, { "cve": "CVE-2024-12133", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Inefficient Algorithmic Complexity", "title": "CWE-407" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2024-12133 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-12133.json" } ], "title": "CVE-2024-12133" }, { "cve": "CVE-2024-12243", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Inefficient Algorithmic Complexity", "title": "CWE-407" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2024-12243 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-12243.json" } ], "title": "CVE-2024-12243" }, { "cve": "CVE-2024-24855", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "other", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24855 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-24855.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2024-24855" }, { "cve": "CVE-2024-26596", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26596 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-26596.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2024-26596" }, { "cve": "CVE-2024-28085", "cwe": { "id": "CWE-268", "name": "Privilege Chaining" }, "notes": [ { "category": "other", "text": "Privilege Chaining", "title": "CWE-268" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Improper Neutralization of Escape, Meta, or Control Sequences", "title": "CWE-150" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28085 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-28085.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2024-28085" }, { "cve": "CVE-2024-33599", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2024-33599 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-33599.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2024-33599" }, { "cve": "CVE-2024-33600", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2024-33600 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-33600.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2024-33600" }, { "cve": "CVE-2024-33601", "cwe": { "id": "CWE-703", "name": "Improper Check or Handling of Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" }, { "category": "other", "text": "Reachable Assertion", "title": "CWE-617" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2024-33601 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-33601.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2024-33601" }, { "cve": "CVE-2024-33602", "cwe": { "id": "CWE-466", "name": "Return of Pointer Value Outside of Expected Range" }, "notes": [ { "category": "other", "text": "Return of Pointer Value Outside of Expected Range", "title": "CWE-466" }, { "category": "other", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2024-33602 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-33602.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2024-33602" }, { "cve": "CVE-2024-34397", "cwe": { "id": "CWE-940", "name": "Improper Verification of Source of a Communication Channel" }, "notes": [ { "category": "other", "text": "Improper Verification of Source of a Communication Channel", "title": "CWE-940" }, { "category": "other", "text": "Authentication Bypass by Spoofing", "title": "CWE-290" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34397 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-34397.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2024-34397" }, { "cve": "CVE-2024-37370", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" }, { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37370 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-37370.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2024-37370" }, { "cve": "CVE-2024-37371", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" }, { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37371 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-37371.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2024-37371" }, { "cve": "CVE-2024-41797", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "other", "text": "Improper Privilege Management", "title": "CWE-269" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41797 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-41797.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2024-41797" }, { "cve": "CVE-2024-45490", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "other", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" }, { "category": "other", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45490 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-45490.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2024-45490" }, { "cve": "CVE-2024-45491", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45491 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-45491.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2024-45491" }, { "cve": "CVE-2024-45492", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45492 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-45492.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2024-45492" }, { "cve": "CVE-2024-50246", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2024-50246 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-50246.json" } ], "title": "CVE-2024-50246" }, { "cve": "CVE-2024-53166", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2024-53166 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-53166.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2024-53166" }, { "cve": "CVE-2024-57977", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "other", "text": "Improper Locking", "title": "CWE-667" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2024-57977 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-57977.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2024-57977" }, { "cve": "CVE-2024-57996", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "notes": [ { "category": "other", "text": "Improper Validation of Array Index", "title": "CWE-129" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2024-57996 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-57996.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2024-57996" }, { "cve": "CVE-2024-58005", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)", "title": "CWE-99" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2024-58005 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-58005.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2024-58005" }, { "cve": "CVE-2025-0133", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/S:N/AU:N/R:U/V:D/RE:M/U:Amber", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-0133 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0133.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2025-0133" }, { "cve": "CVE-2025-4373", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "other", "text": "Buffer Underwrite (\u0027Buffer Underflow\u0027)", "title": "CWE-124" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-4373 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4373.json" } ], "title": "CVE-2025-4373" }, { "cve": "CVE-2025-4598", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "other", "text": "Signal Handler Race Condition", "title": "CWE-364" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-4598 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4598.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2025-4598" }, { "cve": "CVE-2025-21701", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21701 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21701.json" } ], "title": "CVE-2025-21701" }, { "cve": "CVE-2025-21702", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21702 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21702.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2025-21702" }, { "cve": "CVE-2025-21712", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21712 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21712.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2025-21712" }, { "cve": "CVE-2025-21724", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21724 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21724.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2025-21724" }, { "cve": "CVE-2025-21728", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21728 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21728.json" } ], "title": "CVE-2025-21728" }, { "cve": "CVE-2025-21745", "cwe": { "id": "CWE-911", "name": "Improper Update of Reference Count" }, "notes": [ { "category": "other", "text": "Improper Update of Reference Count", "title": "CWE-911" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21745 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21745.json" } ], "title": "CVE-2025-21745" }, { "cve": "CVE-2025-21756", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21756 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21756.json" } ], "title": "CVE-2025-21756" }, { "cve": "CVE-2025-21758", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21758 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21758.json" } ], "title": "CVE-2025-21758" }, { "cve": "CVE-2025-21765", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21765 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21765.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2025-21765" }, { "cve": "CVE-2025-21766", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21766 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21766.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2025-21766" }, { "cve": "CVE-2025-21767", "cwe": { "id": "CWE-332", "name": "Insufficient Entropy in PRNG" }, "notes": [ { "category": "other", "text": "Insufficient Entropy in PRNG", "title": "CWE-332" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21767 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21767.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2025-21767" }, { "cve": "CVE-2025-21795", "cwe": { "id": "CWE-371", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-371", "title": "CWE-371" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21795 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21795.json" } ], "title": "CVE-2025-21795" }, { "cve": "CVE-2025-21796", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21796 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21796.json" } ], "title": "CVE-2025-21796" }, { "cve": "CVE-2025-21848", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "other", "text": "Use of NullPointerException Catch to Detect NULL Pointer Dereference", "title": "CWE-395" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21848 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21848.json" } ], "title": "CVE-2025-21848" }, { "cve": "CVE-2025-21862", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "other", "text": "Improper Initialization", "title": "CWE-665" }, { "category": "other", "text": "Use of Uninitialized Resource", "title": "CWE-908" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21862 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21862.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2025-21862" }, { "cve": "CVE-2025-21864", "cwe": { "id": "CWE-371", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-371", "title": "CWE-371" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21864 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21864.json" } ], "title": "CVE-2025-21864" }, { "cve": "CVE-2025-21865", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21865 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21865.json" } ], "title": "CVE-2025-21865" }, { "cve": "CVE-2025-26465", "cwe": { "id": "CWE-310", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-310", "title": "CWE-310" }, { "category": "other", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26465 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-26465.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2025-26465" }, { "cve": "CVE-2025-31115", "cwe": { "id": "CWE-366", "name": "Race Condition within a Thread" }, "notes": [ { "category": "other", "text": "Race Condition within a Thread", "title": "CWE-366" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "other", "text": "Use After Free", "title": "CWE-416" }, { "category": "other", "text": "Premature Release of Resource During Expected Lifetime", "title": "CWE-826" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31115 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-31115.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2025-31115" }, { "cve": "CVE-2025-32454", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32454 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32454.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2025-32454" }, { "cve": "CVE-2025-40567", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "notes": [ { "category": "other", "text": "Incorrect Authorization", "title": "CWE-863" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-40567 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40567.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2025-40567" }, { "cve": "CVE-2025-40568", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "notes": [ { "category": "other", "text": "Incorrect Authorization", "title": "CWE-863" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-40568 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40568.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2025-40568" }, { "cve": "CVE-2025-40569", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-40569 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40569.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2025-40569" }, { "cve": "CVE-2025-40585", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "notes": [ { "category": "other", "text": "Incorrect Default Permissions", "title": "CWE-276" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-40585 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40585.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2025-40585" }, { "cve": "CVE-2025-46836", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] }, "references": [ { "category": "self", "summary": "CVE-2025-46836 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-46836.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-1211853", "CSAFPID-1266669", "CSAFPID-1266670", "CSAFPID-1195553", "CSAFPID-1266671", "CSAFPID-1266672", "CSAFPID-2460438", "CSAFPID-1270701", "CSAFPID-1270700", "CSAFPID-1266673", "CSAFPID-1211202", "CSAFPID-1272525", "CSAFPID-2849543", "CSAFPID-1756091", "CSAFPID-2619544", "CSAFPID-126262", "CSAFPID-2082475", "CSAFPID-2905706", "CSAFPID-2905742", "CSAFPID-2905748", "CSAFPID-2905793", "CSAFPID-2905749", "CSAFPID-2905794", "CSAFPID-2905750", "CSAFPID-2905795", "CSAFPID-2905751", "CSAFPID-2905796", "CSAFPID-2905752", "CSAFPID-2905797", "CSAFPID-2905753", "CSAFPID-2905798", "CSAFPID-2905754", "CSAFPID-2905799", "CSAFPID-2905755", "CSAFPID-2905800", "CSAFPID-2905756", "CSAFPID-2905801", "CSAFPID-2905757", "CSAFPID-2905802", "CSAFPID-2905758", "CSAFPID-2905803", "CSAFPID-2905759", "CSAFPID-2905804", "CSAFPID-2905760", "CSAFPID-2905805", "CSAFPID-2905761", "CSAFPID-2905806", "CSAFPID-2905762", "CSAFPID-2905807", "CSAFPID-2905763", "CSAFPID-2905808", "CSAFPID-2905764", "CSAFPID-2905809", "CSAFPID-2905765", "CSAFPID-2905810", "CSAFPID-2905766", "CSAFPID-2905811", "CSAFPID-2905767", "CSAFPID-2905812", "CSAFPID-2905768", "CSAFPID-2905813", "CSAFPID-2905769", "CSAFPID-2905814", "CSAFPID-2905770", "CSAFPID-2905815", "CSAFPID-2905771", "CSAFPID-2905816", "CSAFPID-2905772", "CSAFPID-2905817", "CSAFPID-2905773", "CSAFPID-2905818", "CSAFPID-2905774", "CSAFPID-2905819", "CSAFPID-2905775", "CSAFPID-2905820", "CSAFPID-2905776", "CSAFPID-2905821", "CSAFPID-2905777", "CSAFPID-2905822", "CSAFPID-2905778", "CSAFPID-2905823", "CSAFPID-2905786", "CSAFPID-2905831", "CSAFPID-2905785", "CSAFPID-2905830", "CSAFPID-2905787", "CSAFPID-2905832", "CSAFPID-2905783", "CSAFPID-2905828", "CSAFPID-2905782", "CSAFPID-2905827", "CSAFPID-2905784", "CSAFPID-2905829", "CSAFPID-2905780", "CSAFPID-2905825", "CSAFPID-2905779", "CSAFPID-2905824", "CSAFPID-2905781", "CSAFPID-2905826" ] } ], "title": "CVE-2025-46836" } ] }
ncsc-2025-0151
Vulnerability from csaf_ncscnl
Published
2025-05-13 09:19
Modified
2025-05-13 09:19
Summary
Kwetsbaarheden verholpen in Apple macOS
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Apple heeft kwetsbaarheden verholpen in macOS (Specifiek voor Ventura 13.7.6, Sequoia 15.5 en Sonoma 14.7.6).
Interpretaties
De kwetsbaarheden omvatten verschillende problemen, zoals geheugenbeschadiging door het verwerken van kwaadwillig gemaakte webinhoud, ongeautoriseerde toegang tot gevoelige gebruikersdata, en onverwachte systeemterminaties. Deze kwetsbaarheden kunnen worden misbruikt door kwaadwillenden om zich verhoogde rechten toe te kennen en zo toegang te krijgen tot gevoelige informatie of om de stabiliteit van het systeem in gevaar te brengen.
Oplossingen
Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-390
Detection of Error Condition Without Action
CWE-310
CWE-310
CWE-415
Double Free
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CWE-265
CWE-265
CWE-404
Improper Resource Shutdown or Release
CWE-275
CWE-275
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-416
Use After Free
CWE-400
Uncontrolled Resource Consumption
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-674
Uncontrolled Recursion
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-121
Stack-based Buffer Overflow
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Apple heeft kwetsbaarheden verholpen in macOS (Specifiek voor Ventura 13.7.6, Sequoia 15.5 en Sonoma 14.7.6).", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden omvatten verschillende problemen, zoals geheugenbeschadiging door het verwerken van kwaadwillig gemaakte webinhoud, ongeautoriseerde toegang tot gevoelige gebruikersdata, en onverwachte systeemterminaties. Deze kwetsbaarheden kunnen worden misbruikt door kwaadwillenden om zich verhoogde rechten toe te kennen en zo toegang te krijgen tot gevoelige informatie of om de stabiliteit van het systeem in gevaar te brengen.", "title": "Interpretaties" }, { "category": "description", "text": "Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "general", "text": "CWE-310", "title": "CWE-310" }, { "category": "general", "text": "Double Free", "title": "CWE-415" }, { "category": "general", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" }, { "category": "general", "text": "CWE-265", "title": "CWE-265" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "CWE-275", "title": "CWE-275" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://support.apple.com/en-us/122718" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://support.apple.com/en-us/122717" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://support.apple.com/en-us/122716" } ], "title": "Kwetsbaarheden verholpen in Apple macOS", "tracking": { "current_release_date": "2025-05-13T09:19:37.094950Z", "generator": { "date": "2025-02-25T15:15:00Z", "engine": { "name": "V.A.", "version": "1.0" } }, "id": "NCSC-2025-0151", "initial_release_date": "2025-05-13T09:19:37.094950Z", "revision_history": [ { "date": "2025-05-13T09:19:37.094950Z", "number": "1.0.0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003e=13.0|\u003c13.7.5", "product": { "name": "vers:unknown/\u003e=13.0|\u003c13.7.5", "product_id": "CSAFPID-2620946", "product_identification_helper": { "cpe": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:unknown/\u003e=14.0|\u003c14.7.5", "product": { "name": "vers:unknown/\u003e=14.0|\u003c14.7.5", "product_id": "CSAFPID-2620935", "product_identification_helper": { "cpe": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "macOS" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003e=15.0|\u003c15.4", "product": { "name": "vers:unknown/\u003e=15.0|\u003c15.4", "product_id": "CSAFPID-2592049" } } ], "category": "product_name", "name": "macOS" } ], "category": "product_family", "name": "Apple" } ], "category": "vendor", "name": "Apple" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-8176", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "other", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2024-8176", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8176.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] } ], "title": "CVE-2024-8176" }, { "cve": "CVE-2025-24142", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24142", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24142.json" } ], "title": "CVE-2025-24142" }, { "cve": "CVE-2025-24144", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24144", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24144.json" } ], "title": "CVE-2025-24144" }, { "cve": "CVE-2025-24155", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24155", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24155.json" } ], "title": "CVE-2025-24155" }, { "cve": "CVE-2025-24213", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24213", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24213.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] } ], "title": "CVE-2025-24213" }, { "cve": "CVE-2025-24222", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24222", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24222.json" } ], "title": "CVE-2025-24222" }, { "cve": "CVE-2025-24223", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24223", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24223.json" } ], "title": "CVE-2025-24223" }, { "cve": "CVE-2025-24258", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24258", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24258.json" } ], "title": "CVE-2025-24258" }, { "cve": "CVE-2025-24274", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24274", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24274.json" } ], "title": "CVE-2025-24274" }, { "cve": "CVE-2025-26465", "cwe": { "id": "CWE-310", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-310", "title": "CWE-310" }, { "category": "other", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26465", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26465.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] } ], "title": "CVE-2025-26465" }, { "cve": "CVE-2025-26466", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26466", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26466.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] } ], "title": "CVE-2025-26466" }, { "cve": "CVE-2025-30440", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30440", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30440.json" } ], "title": "CVE-2025-30440" }, { "cve": "CVE-2025-30442", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30442", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30442.json" } ], "title": "CVE-2025-30442" }, { "cve": "CVE-2025-30443", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30443", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30443.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] } ], "title": "CVE-2025-30443" }, { "cve": "CVE-2025-30448", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30448", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30448.json" } ], "title": "CVE-2025-30448" }, { "cve": "CVE-2025-30453", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30453", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30453.json" } ], "title": "CVE-2025-30453" }, { "cve": "CVE-2025-31196", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31196", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31196.json" } ], "title": "CVE-2025-31196" }, { "cve": "CVE-2025-31204", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31204", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31204.json" } ], "title": "CVE-2025-31204" }, { "cve": "CVE-2025-31205", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31205", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31205.json" } ], "title": "CVE-2025-31205" }, { "cve": "CVE-2025-31206", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31206", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31206.json" } ], "title": "CVE-2025-31206" }, { "cve": "CVE-2025-31208", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31208", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31208.json" } ], "title": "CVE-2025-31208" }, { "cve": "CVE-2025-31209", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31209", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31209.json" } ], "title": "CVE-2025-31209" }, { "cve": "CVE-2025-31212", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31212", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31212.json" } ], "title": "CVE-2025-31212" }, { "cve": "CVE-2025-31213", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31213", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31213.json" } ], "title": "CVE-2025-31213" }, { "cve": "CVE-2025-31215", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31215", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31215.json" } ], "title": "CVE-2025-31215" }, { "cve": "CVE-2025-31217", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31217", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31217.json" } ], "title": "CVE-2025-31217" }, { "cve": "CVE-2025-31218", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31218", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31218.json" } ], "title": "CVE-2025-31218" }, { "cve": "CVE-2025-31219", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31219", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31219.json" } ], "title": "CVE-2025-31219" }, { "cve": "CVE-2025-31220", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31220", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31220.json" } ], "title": "CVE-2025-31220" }, { "cve": "CVE-2025-31221", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31221", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31221.json" } ], "title": "CVE-2025-31221" }, { "cve": "CVE-2025-31222", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31222", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31222.json" } ], "title": "CVE-2025-31222" }, { "cve": "CVE-2025-31223", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31223", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31223.json" } ], "title": "CVE-2025-31223" }, { "cve": "CVE-2025-31224", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31224", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31224.json" } ], "title": "CVE-2025-31224" }, { "cve": "CVE-2025-31226", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31226", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31226.json" } ], "title": "CVE-2025-31226" }, { "cve": "CVE-2025-31232", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31232", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31232.json" } ], "title": "CVE-2025-31232" }, { "cve": "CVE-2025-31233", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31233", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31233.json" } ], "title": "CVE-2025-31233" }, { "cve": "CVE-2025-31234", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31234", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31234.json" } ], "title": "CVE-2025-31234" }, { "cve": "CVE-2025-31235", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "other", "text": "Double Free", "title": "CWE-415" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31235", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31235.json" } ], "title": "CVE-2025-31235" }, { "cve": "CVE-2025-31236", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31236", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31236.json" } ], "title": "CVE-2025-31236" }, { "cve": "CVE-2025-31237", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31237", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31237.json" } ], "title": "CVE-2025-31237" }, { "cve": "CVE-2025-31238", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31238", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31238.json" } ], "title": "CVE-2025-31238" }, { "cve": "CVE-2025-31239", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31239", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31239.json" } ], "title": "CVE-2025-31239" }, { "cve": "CVE-2025-31240", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31240", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31240.json" } ], "title": "CVE-2025-31240" }, { "cve": "CVE-2025-31241", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "other", "text": "Double Free", "title": "CWE-415" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31241", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31241.json" } ], "title": "CVE-2025-31241" }, { "cve": "CVE-2025-31242", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31242", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31242.json" } ], "title": "CVE-2025-31242" }, { "cve": "CVE-2025-31244", "cwe": { "id": "CWE-265", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-265", "title": "CWE-265" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31244", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31244.json" } ], "title": "CVE-2025-31244" }, { "cve": "CVE-2025-31245", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31245", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31245.json" } ], "title": "CVE-2025-31245" }, { "cve": "CVE-2025-31246", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31246", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31246.json" } ], "title": "CVE-2025-31246" }, { "cve": "CVE-2025-31247", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31247", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31247.json" } ], "title": "CVE-2025-31247" }, { "cve": "CVE-2025-31249", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31249", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31249.json" } ], "title": "CVE-2025-31249" }, { "cve": "CVE-2025-31250", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31250", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31250.json" } ], "title": "CVE-2025-31250" }, { "cve": "CVE-2025-31251", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31251", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31251.json" } ], "title": "CVE-2025-31251" }, { "cve": "CVE-2025-31256", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31256", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31256.json" } ], "title": "CVE-2025-31256" }, { "cve": "CVE-2025-31257", "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31257", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31257.json" } ], "title": "CVE-2025-31257" }, { "cve": "CVE-2025-31258", "cwe": { "id": "CWE-265", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-265", "title": "CWE-265" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31258", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31258.json" } ], "title": "CVE-2025-31258" }, { "cve": "CVE-2025-31259", "notes": [ { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31259", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31259.json" } ], "title": "CVE-2025-31259" }, { "cve": "CVE-2025-31260", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2620946", "CSAFPID-2620935", "CSAFPID-2592049" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31260", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31260.json" } ], "title": "CVE-2025-31260" } ] }
fkie_cve-2025-26465
Vulnerability from fkie_nvd
Published
2025-02-18 19:15
Modified
2025-06-02 15:15
Severity ?
6.8 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
6.8 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
6.8 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Summary
A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openbsd | openssh | * | |
openbsd | openssh | 6.8 | |
openbsd | openssh | 9.9 | |
openbsd | openssh | 9.9 | |
netapp | active_iq_unified_manager | - | |
netapp | ontap | 9 | |
redhat | openshift_container_platform | 4.0 | |
debian | debian_linux | 11.0 | |
debian | debian_linux | 12.0 | |
redhat | enterprise_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD9E4318-20E3-420F-8EF5-7C05C3386586", "versionEndIncluding": "9.8", "versionStartIncluding": "6.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:6.8:p1:*:*:*:*:*:*", "matchCriteriaId": "50836FA3-8116-4D58-B73E-B4830FB3A551", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:9.9:-:*:*:*:*:*:*", "matchCriteriaId": "E2B53BBB-6916-478C-A896-77C7F7E7D5DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:9.9:p1:*:*:*:*:*:*", "matchCriteriaId": "F7A2B794-BA83-4A01-BD2E-541F18CB9E37", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*", "matchCriteriaId": "A20333EE-4C13-426E-8B54-D78679D5DDB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "932D137F-528B-4526-9A89-CD59FA1AB0FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client\u0027s memory resource first, turning the attack complexity high." }, { "lang": "es", "value": "Se encontr\u00f3 una vulnerabilidad en OpenSSH cuando la opci\u00f3n VerifyHostKeyDNS est\u00e1 habilitada. Un ataque de m\u00e1quina en el medio puede ser realizado mediante una m\u00e1quina maliciosa que se hace pasar por un servidor leg\u00edtimo. Este problema ocurre debido a c\u00f3mo los c\u00f3digos de error de OpenSSH Mishandles en condiciones espec\u00edficas al verificar la clave del host. Para que un ataque se considere exitoso, el atacante debe lograr agotar el recurso de memoria del cliente primero, lo que gira la complejidad del ataque." } ], "id": "CVE-2025-26465", "lastModified": "2025-06-02T15:15:33.437", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.2, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-02-18T19:15:29.230", "references": [ { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2025:3837" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2025:6993" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2025:8385" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2025-26465" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344780" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/oss-sec/2025/q1/144" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://blog.qualys.com/vulnerabilities-threat-research/2025/02/18/qualys-tru-discovers-two-vulnerabilities-in-openssh-cve-2025-26465-cve-2025-26466" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1237040" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://ftp.openbsd.org/pub/OpenBSD/patches/7.6/common/008_ssh.patch.sig" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2025/02/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.mindrot.org/pipermail/openssh-unix-announce/2025-February/000161.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2025-26465" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20250228-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://ubuntu.com/security/CVE-2025-26465" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://www.openssh.com/releasenotes.html#9.9p2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2025/02/18/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2025/02/18/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Press/Media Coverage" ], "url": "https://www.theregister.com/2025/02/18/openssh_vulnerabilities_mitm_dos/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.vicarius.io/vsociety/posts/cve-2025-26465-detect-vulnerable-openssh" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://www.vicarius.io/vsociety/posts/cve-2025-26465-mitigate-vulnerable-openssh" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/oss-sec/2025/q1/144" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-390" } ], "source": "secalert@redhat.com", "type": "Secondary" } ] }
opensuse-su-2025:14820-1
Vulnerability from csaf_opensuse
Published
2025-02-18 00:00
Modified
2025-02-18 00:00
Summary
openssh-9.9p2-1.1 on GA media
Notes
Title of the patch
openssh-9.9p2-1.1 on GA media
Description of the patch
These are all security issues fixed in the openssh-9.9p2-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-14820
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "openssh-9.9p2-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the openssh-9.9p2-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-14820", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14820-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2025:14820-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N26B32FQ4LFRH3U2SONNEYKLATWGNDP4/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2025:14820-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N26B32FQ4LFRH3U2SONNEYKLATWGNDP4/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-26465 page", "url": "https://www.suse.com/security/cve/CVE-2025-26465/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-26466 page", "url": "https://www.suse.com/security/cve/CVE-2025-26466/" } ], "title": "openssh-9.9p2-1.1 on GA media", "tracking": { "current_release_date": "2025-02-18T00:00:00Z", "generator": { "date": "2025-02-18T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:14820-1", "initial_release_date": "2025-02-18T00:00:00Z", "revision_history": [ { "date": "2025-02-18T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openssh-9.9p2-1.1.aarch64", "product": { "name": "openssh-9.9p2-1.1.aarch64", "product_id": "openssh-9.9p2-1.1.aarch64" } }, { "category": "product_version", "name": "openssh-cavs-9.9p2-1.1.aarch64", "product": { "name": "openssh-cavs-9.9p2-1.1.aarch64", "product_id": "openssh-cavs-9.9p2-1.1.aarch64" } }, { "category": "product_version", "name": "openssh-clients-9.9p2-1.1.aarch64", "product": { "name": "openssh-clients-9.9p2-1.1.aarch64", "product_id": "openssh-clients-9.9p2-1.1.aarch64" } }, { "category": "product_version", "name": "openssh-common-9.9p2-1.1.aarch64", "product": { "name": "openssh-common-9.9p2-1.1.aarch64", "product_id": "openssh-common-9.9p2-1.1.aarch64" } }, { "category": "product_version", "name": "openssh-fips-9.9p2-1.1.aarch64", "product": { "name": "openssh-fips-9.9p2-1.1.aarch64", "product_id": "openssh-fips-9.9p2-1.1.aarch64" } }, { "category": "product_version", "name": "openssh-helpers-9.9p2-1.1.aarch64", "product": { "name": "openssh-helpers-9.9p2-1.1.aarch64", "product_id": "openssh-helpers-9.9p2-1.1.aarch64" } }, { "category": "product_version", "name": "openssh-server-9.9p2-1.1.aarch64", "product": { "name": "openssh-server-9.9p2-1.1.aarch64", "product_id": "openssh-server-9.9p2-1.1.aarch64" } }, { "category": "product_version", "name": "openssh-server-config-rootlogin-9.9p2-1.1.aarch64", "product": { "name": "openssh-server-config-rootlogin-9.9p2-1.1.aarch64", "product_id": "openssh-server-config-rootlogin-9.9p2-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "openssh-9.9p2-1.1.ppc64le", "product": { "name": "openssh-9.9p2-1.1.ppc64le", "product_id": "openssh-9.9p2-1.1.ppc64le" } }, { "category": "product_version", "name": "openssh-cavs-9.9p2-1.1.ppc64le", "product": { "name": "openssh-cavs-9.9p2-1.1.ppc64le", "product_id": "openssh-cavs-9.9p2-1.1.ppc64le" } }, { "category": "product_version", "name": "openssh-clients-9.9p2-1.1.ppc64le", "product": { "name": "openssh-clients-9.9p2-1.1.ppc64le", "product_id": "openssh-clients-9.9p2-1.1.ppc64le" } }, { "category": "product_version", "name": "openssh-common-9.9p2-1.1.ppc64le", "product": { "name": "openssh-common-9.9p2-1.1.ppc64le", "product_id": "openssh-common-9.9p2-1.1.ppc64le" } }, { "category": "product_version", "name": "openssh-fips-9.9p2-1.1.ppc64le", "product": { "name": "openssh-fips-9.9p2-1.1.ppc64le", "product_id": "openssh-fips-9.9p2-1.1.ppc64le" } }, { "category": "product_version", "name": "openssh-helpers-9.9p2-1.1.ppc64le", "product": { "name": "openssh-helpers-9.9p2-1.1.ppc64le", "product_id": "openssh-helpers-9.9p2-1.1.ppc64le" } }, { "category": "product_version", "name": "openssh-server-9.9p2-1.1.ppc64le", "product": { "name": "openssh-server-9.9p2-1.1.ppc64le", "product_id": "openssh-server-9.9p2-1.1.ppc64le" } }, { "category": "product_version", "name": "openssh-server-config-rootlogin-9.9p2-1.1.ppc64le", "product": { "name": "openssh-server-config-rootlogin-9.9p2-1.1.ppc64le", "product_id": "openssh-server-config-rootlogin-9.9p2-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssh-9.9p2-1.1.s390x", "product": { "name": "openssh-9.9p2-1.1.s390x", "product_id": "openssh-9.9p2-1.1.s390x" } }, { "category": "product_version", "name": "openssh-cavs-9.9p2-1.1.s390x", "product": { "name": "openssh-cavs-9.9p2-1.1.s390x", "product_id": "openssh-cavs-9.9p2-1.1.s390x" } }, { "category": "product_version", "name": "openssh-clients-9.9p2-1.1.s390x", "product": { "name": "openssh-clients-9.9p2-1.1.s390x", "product_id": "openssh-clients-9.9p2-1.1.s390x" } }, { "category": "product_version", "name": "openssh-common-9.9p2-1.1.s390x", "product": { "name": "openssh-common-9.9p2-1.1.s390x", "product_id": "openssh-common-9.9p2-1.1.s390x" } }, { "category": "product_version", "name": "openssh-fips-9.9p2-1.1.s390x", "product": { "name": "openssh-fips-9.9p2-1.1.s390x", "product_id": "openssh-fips-9.9p2-1.1.s390x" } }, { "category": "product_version", "name": "openssh-helpers-9.9p2-1.1.s390x", "product": { "name": "openssh-helpers-9.9p2-1.1.s390x", "product_id": "openssh-helpers-9.9p2-1.1.s390x" } }, { "category": "product_version", "name": "openssh-server-9.9p2-1.1.s390x", "product": { "name": "openssh-server-9.9p2-1.1.s390x", "product_id": "openssh-server-9.9p2-1.1.s390x" } }, { "category": "product_version", "name": "openssh-server-config-rootlogin-9.9p2-1.1.s390x", "product": { "name": "openssh-server-config-rootlogin-9.9p2-1.1.s390x", "product_id": "openssh-server-config-rootlogin-9.9p2-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-9.9p2-1.1.x86_64", "product": { "name": "openssh-9.9p2-1.1.x86_64", "product_id": "openssh-9.9p2-1.1.x86_64" } }, { "category": "product_version", "name": "openssh-cavs-9.9p2-1.1.x86_64", "product": { "name": "openssh-cavs-9.9p2-1.1.x86_64", "product_id": "openssh-cavs-9.9p2-1.1.x86_64" } }, { "category": "product_version", "name": "openssh-clients-9.9p2-1.1.x86_64", "product": { "name": "openssh-clients-9.9p2-1.1.x86_64", "product_id": "openssh-clients-9.9p2-1.1.x86_64" } }, { "category": "product_version", "name": "openssh-common-9.9p2-1.1.x86_64", "product": { "name": "openssh-common-9.9p2-1.1.x86_64", "product_id": "openssh-common-9.9p2-1.1.x86_64" } }, { "category": "product_version", "name": "openssh-fips-9.9p2-1.1.x86_64", "product": { "name": "openssh-fips-9.9p2-1.1.x86_64", "product_id": "openssh-fips-9.9p2-1.1.x86_64" } }, { "category": "product_version", "name": "openssh-helpers-9.9p2-1.1.x86_64", "product": { "name": "openssh-helpers-9.9p2-1.1.x86_64", "product_id": "openssh-helpers-9.9p2-1.1.x86_64" } }, { "category": "product_version", "name": "openssh-server-9.9p2-1.1.x86_64", "product": { "name": "openssh-server-9.9p2-1.1.x86_64", "product_id": "openssh-server-9.9p2-1.1.x86_64" } }, { "category": "product_version", "name": "openssh-server-config-rootlogin-9.9p2-1.1.x86_64", "product": { "name": "openssh-server-config-rootlogin-9.9p2-1.1.x86_64", "product_id": "openssh-server-config-rootlogin-9.9p2-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-9.9p2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-9.9p2-1.1.aarch64" }, "product_reference": "openssh-9.9p2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-9.9p2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-9.9p2-1.1.ppc64le" }, "product_reference": "openssh-9.9p2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-9.9p2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-9.9p2-1.1.s390x" }, "product_reference": "openssh-9.9p2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-9.9p2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-9.9p2-1.1.x86_64" }, "product_reference": "openssh-9.9p2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-9.9p2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.aarch64" }, "product_reference": "openssh-cavs-9.9p2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-9.9p2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.ppc64le" }, "product_reference": "openssh-cavs-9.9p2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-9.9p2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.s390x" }, "product_reference": "openssh-cavs-9.9p2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-9.9p2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.x86_64" }, "product_reference": "openssh-cavs-9.9p2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-9.9p2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.aarch64" }, "product_reference": "openssh-clients-9.9p2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-9.9p2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.ppc64le" }, "product_reference": "openssh-clients-9.9p2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-9.9p2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.s390x" }, "product_reference": "openssh-clients-9.9p2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-9.9p2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.x86_64" }, "product_reference": "openssh-clients-9.9p2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-9.9p2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.aarch64" }, "product_reference": "openssh-common-9.9p2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-9.9p2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.ppc64le" }, "product_reference": "openssh-common-9.9p2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-9.9p2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.s390x" }, "product_reference": "openssh-common-9.9p2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-9.9p2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.x86_64" }, "product_reference": "openssh-common-9.9p2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-9.9p2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.aarch64" }, "product_reference": "openssh-fips-9.9p2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-9.9p2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.ppc64le" }, "product_reference": "openssh-fips-9.9p2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-9.9p2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.s390x" }, "product_reference": "openssh-fips-9.9p2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-9.9p2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.x86_64" }, "product_reference": "openssh-fips-9.9p2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-9.9p2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.aarch64" }, "product_reference": "openssh-helpers-9.9p2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-9.9p2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.ppc64le" }, "product_reference": "openssh-helpers-9.9p2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-9.9p2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.s390x" }, "product_reference": "openssh-helpers-9.9p2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-9.9p2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.x86_64" }, "product_reference": "openssh-helpers-9.9p2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-9.9p2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.aarch64" }, "product_reference": "openssh-server-9.9p2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-9.9p2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.ppc64le" }, "product_reference": "openssh-server-9.9p2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-9.9p2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.s390x" }, "product_reference": "openssh-server-9.9p2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-9.9p2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.x86_64" }, "product_reference": "openssh-server-9.9p2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-config-rootlogin-9.9p2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.aarch64" }, "product_reference": "openssh-server-config-rootlogin-9.9p2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-config-rootlogin-9.9p2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.ppc64le" }, "product_reference": "openssh-server-config-rootlogin-9.9p2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-config-rootlogin-9.9p2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.s390x" }, "product_reference": "openssh-server-config-rootlogin-9.9p2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-config-rootlogin-9.9p2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.x86_64" }, "product_reference": "openssh-server-config-rootlogin-9.9p2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-26465", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-26465" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client\u0027s memory resource first, turning the attack complexity high.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-26465", "url": "https://www.suse.com/security/cve/CVE-2025-26465" }, { "category": "external", "summary": "SUSE Bug 1237040 for CVE-2025-26465", "url": "https://bugzilla.suse.com/1237040" }, { "category": "external", "summary": "SUSE Bug 1237041 for CVE-2025-26465", "url": "https://bugzilla.suse.com/1237041" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:openssh-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-26465" }, { "cve": "CVE-2025-26466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-26466" } ], "notes": [ { "category": "general", "text": "A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-26466", "url": "https://www.suse.com/security/cve/CVE-2025-26466" }, { "category": "external", "summary": "SUSE Bug 1237041 for CVE-2025-26466", "url": "https://bugzilla.suse.com/1237041" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:openssh-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-cavs-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-clients-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-common-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-fips-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-helpers-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-server-9.9p2-1.1.x86_64", "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.aarch64", "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.ppc64le", "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.s390x", "openSUSE Tumbleweed:openssh-server-config-rootlogin-9.9p2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-26466" } ] }
wid-sec-w-2025-0394
Vulnerability from csaf_certbund
Published
2025-02-17 23:00
Modified
2025-07-31 22:00
Summary
OpenSSH: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
OpenSSH ist eine Open Source Implementierung des Secure Shell Protokolls.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in OpenSSH ausnutzen, um kryptografische Sicherheitsvorkehrungen zu umgehen und um einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "OpenSSH ist eine Open Source Implementierung des Secure Shell Protokolls.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in OpenSSH ausnutzen, um kryptografische Sicherheitsvorkehrungen zu umgehen und um einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0394 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0394.json" }, { "category": "self", "summary": "WID-SEC-2025-0394 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0394" }, { "category": "external", "summary": "Qualys Security Advisory vom 2025-02-18", "url": "https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt" }, { "category": "external", "summary": "Qualys Blog vom 2025-02-18", "url": "https://blog.qualys.com/vulnerabilities-threat-research/2025/02/18/qualys-tru-discovers-two-vulnerabilities-in-openssh-cve-2025-26465-cve-2025-26466" }, { "category": "external", "summary": "OpenSSH Release Notes vom 2025-02-18", "url": "https://www.openssh.com/releasenotes.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5868 vom 2025-02-18", "url": "https://lists.debian.org/debian-security-announce/2025/msg00030.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4057 vom 2025-02-18", "url": "https://lists.debian.org/debian-lts-announce/2025/02/msg00020.html" }, { "category": "external", "summary": "OpenBSD Errata 7.5", "url": "https://www.openbsd.org/errata75.html" }, { "category": "external", "summary": "OpenBSD Errata 7.6", "url": "https://www.openbsd.org/errata76.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2025-62F6CB2785 vom 2025-02-18", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-62f6cb2785" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202502-01 vom 2025-02-19", "url": "https://security.gentoo.org/glsa/202502-01" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7270-1 vom 2025-02-18", "url": "https://ubuntu.com/security/notices/USN-7270-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7270-2 vom 2025-02-18", "url": "https://ubuntu.com/security/notices/USN-7270-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0585-1 vom 2025-02-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020372.html" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:14820-1 vom 2025-02-19", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/N26B32FQ4LFRH3U2SONNEYKLATWGNDP4/" }, { "category": "external", "summary": "FreeBSD Security Advisory FREEBSD-SA-25:05.OPENSSH vom 2025-02-21", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-25:05.openssh.asc" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0605-1 vom 2025-02-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020381.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0605-1 vom 2025-02-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/GGMBNUMHNWAKKPCVKBQBXE7C4WSYOBAY/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0659-1 vom 2025-02-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020414.html" }, { "category": "external", "summary": "Redteam Pentesting Advisory RT-SA-2016-004 vom 2025-02-26", "url": "https://wiki.securepoint.de/UTM/Changelog" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0744-1 vom 2025-02-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020457.html" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20250228-0003 vom 2025-02-28", "url": "https://security.netapp.com/advisory/ntap-20250228-0003/" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2769 vom 2025-03-07", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2769.html" }, { "category": "external", "summary": "IBM Security Bulletin 7186519 vom 2025-03-17", "url": "https://www.ibm.com/support/pages/node/7186519" }, { "category": "external", "summary": "Dell Security Advisory DSA-2025-145 vom 2025-04-08", "url": "https://www.dell.com/support/kbdoc/de-de/000299624/dsa-2025-145-security-update-for-dell-idrac9-vulnerability" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3837 vom 2025-04-14", "url": "https://access.redhat.com/errata/RHSA-2025:3837" }, { "category": "external", "summary": "F5 Security Advisory K000150879 vom 2025-04-16", "url": "https://my.f5.com/manage/s/article/K000150879" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:6993 vom 2025-05-13", "url": "https://access.redhat.com/errata/RHSA-2025:6993" }, { "category": "external", "summary": "FortiGuard Labs PSIRT Advisory FG-IR-25-122 vom 2025-05-13", "url": "https://www.fortiguard.com/psirt/FG-IR-25-122" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8274 vom 2025-05-29", "url": "https://rhn.redhat.com/errata/RHSA-2025:8274.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8277 vom 2025-05-28", "url": "https://access.redhat.com/errata/RHSA-2025:8277" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8278 vom 2025-05-29", "url": "https://rhn.redhat.com/errata/RHSA-2025:8278.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8278 vom 2025-05-28", "url": "https://access.redhat.com/errata/RHSA-2025:8278" }, { "category": "external", "summary": "Dell Security Advisory DSA-2025-213 vom 2025-05-30", "url": "https://www.dell.com/support/kbdoc/de-de/000326299/dsa-2025-213-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-multiple-third-party-vulnerabilities" }, { "category": "external", "summary": "XEROX Security Advisory XRX25-012 vom 2025-06-02", "url": "https://security.business.xerox.com/wp-content/uploads/2025/06/Xerox-Security-Bulletin-XRX25-012-for-Xerox-FreeFlow-Print-Server-v9.pdf" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20226-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021099.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20160-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021190.html" }, { "category": "external", "summary": "QNAP Security Advisory QSA-25-14 vom 2025-06-06", "url": "https://www.qnap.com/de-de/security-advisory/QSA-25-14" }, { "category": "external", "summary": "Siemens Security Advisory SSA-082556 vom 2025-06-10", "url": "https://cert-portal.siemens.com/productcert/html/ssa-082556.html" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20250228-0002 vom 2025-06-27", "url": "https://security.netapp.com/advisory/NTAP-20250228-0002" }, { "category": "external", "summary": "WatchGuard Security Advisory WGSA-2025-00009 vom 2025-07-10", "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00009" }, { "category": "external", "summary": "HPE Security Bulletin vom 2025-07-23", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbux04903en_us\u0026docLocale=en_US" }, { "category": "external", "summary": "Dell Security Advisory DSA-2025-262 vom 2025-08-01", "url": "https://www.dell.com/support/kbdoc/000337955" } ], "source_lang": "en-US", "title": "OpenSSH: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-07-31T22:00:00.000+00:00", "generator": { "date": "2025-08-01T07:14:35.658+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-0394", "initial_release_date": "2025-02-17T23:00:00.000+00:00", "revision_history": [ { "date": "2025-02-17T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-02-18T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Fedora, Gentoo, Ubuntu und SUSE aufgenommen" }, { "date": "2025-02-19T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2025-02-20T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von FreeBSD und SUSE aufgenommen" }, { "date": "2025-02-23T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-26T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von RedTeam Pentesting aufgenommen" }, { "date": "2025-03-02T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE und NetApp aufgenommen" }, { "date": "2025-03-09T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-03-17T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-04-08T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2025-04-13T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-04-16T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2025-05-12T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-13T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Fortinet aufgenommen" }, { "date": "2025-05-29T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-06-02T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2025-06-03T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-09T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von QNAP aufgenommen" }, { "date": "2025-06-10T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Siemens aufgenommen" }, { "date": "2025-06-26T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von NetApp aufgenommen" }, { "date": "2025-07-10T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von WatchGuard aufgenommen" }, { "date": "2025-07-23T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2025-07-31T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Dell aufgenommen" } ], "status": "final", "version": "23" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell Avamar", "product": { "name": "Dell Avamar", "product_id": "T039664", "product_identification_helper": { "cpe": "cpe:/a:dell:avamar:-" } } }, { "branches": [ { "category": "product_name", "name": "Dell NetWorker", "product": { "name": "Dell NetWorker", "product_id": "T034583", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:virtual" } } }, { "category": "product_version_range", "name": "\u003c19.12.0.2", "product": { "name": "Dell NetWorker \u003c19.12.0.2", "product_id": "T045790" } }, { "category": "product_version", "name": "19.12.0.2", "product": { "name": "Dell NetWorker 19.12.0.2", "product_id": "T045790-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:19.12.0.2" } } }, { "category": "product_version_range", "name": "\u003c19.11.0.6", "product": { "name": "Dell NetWorker \u003c19.11.0.6", "product_id": "T045791" } }, { "category": "product_version", "name": "19.11.0.6", "product": { "name": "Dell NetWorker 19.11.0.6", "product_id": "T045791-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:19.11.0.6" } } } ], "category": "product_name", "name": "NetWorker" }, { "branches": [ { "category": "product_version_range", "name": "\u003c7.00.00.181", "product": { "name": "Dell integrated Dell Remote Access Controller \u003c7.00.00.181", "product_id": "T042656" } }, { "category": "product_version", "name": "7.00.00.181", "product": { "name": "Dell integrated Dell Remote Access Controller 7.00.00.181", "product_id": "T042656-fixed", "product_identification_helper": { "cpe": "cpe:/h:dell:idrac:7.00.00.181" } } }, { "category": "product_version_range", "name": "\u003c7.20.30.50", "product": { "name": "Dell integrated Dell Remote Access Controller \u003c7.20.30.50", "product_id": "T042657" } }, { "category": "product_version", "name": "7.20.30.50", "product": { "name": "Dell integrated Dell Remote Access Controller 7.20.30.50", "product_id": "T042657-fixed", "product_identification_helper": { "cpe": "cpe:/h:dell:idrac:7.20.30.50" } } } ], "category": "product_name", "name": "integrated Dell Remote Access Controller" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "F5 BIG-IP", "product": { "name": "F5 BIG-IP", "product_id": "T001663", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:-" } } } ], "category": "vendor", "name": "F5" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.6.3", "product": { "name": "Fortinet FortiAnalyzer \u003c7.6.3", "product_id": "T043586" } }, { "category": "product_version", "name": "7.6.3", "product": { "name": "Fortinet FortiAnalyzer 7.6.3", "product_id": "T043586-fixed", "product_identification_helper": { "cpe": "cpe:/a:fortinet:fortianalyzer:7.6.3" } } }, { "category": "product_version_range", "name": "\u003c7.4.7", "product": { "name": "Fortinet FortiAnalyzer \u003c7.4.7", "product_id": "T043587" } }, { "category": "product_version", "name": "7.4.7", "product": { "name": "Fortinet FortiAnalyzer 7.4.7", "product_id": "T043587-fixed", "product_identification_helper": { "cpe": "cpe:/a:fortinet:fortianalyzer:7.4.7" } } }, { "category": "product_version_range", "name": "\u003c7.2.11", "product": { "name": "Fortinet FortiAnalyzer \u003c7.2.11", "product_id": "T043588" } }, { "category": "product_version", "name": "7.2.11", "product": { "name": "Fortinet FortiAnalyzer 7.2.11", "product_id": "T043588-fixed", "product_identification_helper": { "cpe": "cpe:/a:fortinet:fortianalyzer:7.2.11" } } } ], "category": "product_name", "name": "FortiAnalyzer" }, { "branches": [ { "category": "product_version_range", "name": "\u003c7.6.3", "product": { "name": "Fortinet FortiManager \u003c7.6.3", "product_id": "T043589" } }, { "category": "product_version", "name": "7.6.3", "product": { "name": "Fortinet FortiManager 7.6.3", "product_id": "T043589-fixed", "product_identification_helper": { "cpe": "cpe:/a:fortinet:fortimanager:7.6.3" } } }, { "category": "product_version_range", "name": "\u003c7.4.7", "product": { "name": "Fortinet FortiManager \u003c7.4.7", "product_id": "T043590" } }, { "category": "product_version", "name": "7.4.7", "product": { "name": "Fortinet FortiManager 7.4.7", "product_id": "T043590-fixed", "product_identification_helper": { "cpe": "cpe:/a:fortinet:fortimanager:7.4.7" } } }, { "category": "product_version_range", "name": "\u003c7.2.11", "product": { "name": "Fortinet FortiManager \u003c7.2.11", "product_id": "T043591" } }, { "category": "product_version", "name": "7.2.11", "product": { "name": "Fortinet FortiManager 7.2.11", "product_id": "T043591-fixed", "product_identification_helper": { "cpe": "cpe:/a:fortinet:fortimanager:7.2.11" } } } ], "category": "product_name", "name": "FortiManager" } ], "category": "vendor", "name": "Fortinet" }, { "branches": [ { "category": "product_name", "name": "FreeBSD Project FreeBSD OS", "product": { "name": "FreeBSD Project FreeBSD OS", "product_id": "4035", "product_identification_helper": { "cpe": "cpe:/o:freebsd:freebsd:-" } } } ], "category": "vendor", "name": "FreeBSD Project" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cSecure Shell A.09.30.010", "product": { "name": "HPE HP-UX \u003cSecure Shell A.09.30.010", "product_id": "T045630" } }, { "category": "product_version", "name": "Secure Shell A.09.30.010", "product": { "name": "HPE HP-UX Secure Shell A.09.30.010", "product_id": "T045630-fixed", "product_identification_helper": { "cpe": "cpe:/o:hp:hp-ux:secure_shell_a.09.30.010" } } } ], "category": "product_name", "name": "HP-UX" } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "7.3", "product": { "name": "IBM AIX 7.3", "product_id": "1139691", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:7.3" } } }, { "category": "product_version", "name": "7.2", "product": { "name": "IBM AIX 7.2", "product_id": "434967", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:7.2" } } } ], "category": "product_name", "name": "AIX" }, { "branches": [ { "category": "product_version", "name": "3.1", "product": { "name": "IBM VIOS 3.1", "product_id": "1039165", "product_identification_helper": { "cpe": "cpe:/a:ibm:vios:3.1" } } }, { "category": "product_version", "name": "4.1", "product": { "name": "IBM VIOS 4.1", "product_id": "1522854", "product_identification_helper": { "cpe": "cpe:/a:ibm:vios:4.1" } } } ], "category": "product_name", "name": "VIOS" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "NetApp AFF", "product": { "name": "NetApp AFF", "product_id": "T020536", "product_identification_helper": { "cpe": "cpe:/h:netapp:aff:-" } } }, { "category": "product_name", "name": "NetApp ActiveIQ Unified Manager", "product": { "name": "NetApp ActiveIQ Unified Manager", "product_id": "T025152", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere" } } }, { "branches": [ { "category": "product_version", "name": "9", "product": { "name": "NetApp Data ONTAP 9", "product_id": "T039981", "product_identification_helper": { "cpe": "cpe:/a:netapp:data_ontap:9" } } } ], "category": "product_name", "name": "Data ONTAP" }, { "category": "product_name", "name": "NetApp FAS", "product": { "name": "NetApp FAS", "product_id": "T011540", "product_identification_helper": { "cpe": "cpe:/h:netapp:fas:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "6.8p1-9.9p1", "product": { "name": "Open Source OpenSSH 6.8p1-9.9p1", "product_id": "T041261", "product_identification_helper": { "cpe": "cpe:/a:openbsd:openssh:6.8p1" } } }, { "category": "product_version", "name": "9.5p1-9.9p1", "product": { "name": "Open Source OpenSSH 9.5p1-9.9p1", "product_id": "T041262", "product_identification_helper": { "cpe": "cpe:/a:openbsd:openssh:9.5p1" } } }, { "category": "product_version_range", "name": "\u003c9.9p2", "product": { "name": "Open Source OpenSSH \u003c9.9p2", "product_id": "T041263" } }, { "category": "product_version", "name": "9.9p2", "product": { "name": "Open Source OpenSSH 9.9p2", "product_id": "T041263-fixed", "product_identification_helper": { "cpe": "cpe:/a:openbsd:openssh:9.9p2" } } } ], "category": "product_name", "name": "OpenSSH" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "7.5", "product": { "name": "OpenBSD OpenBSD 7.5", "product_id": "T033898", "product_identification_helper": { "cpe": "cpe:/a:openbsd:openbsd:7.5" } } }, { "category": "product_version", "name": "7.6", "product": { "name": "OpenBSD OpenBSD 7.6", "product_id": "T038347", "product_identification_helper": { "cpe": "cpe:/a:openbsd:openbsd:7.6" } } } ], "category": "product_name", "name": "OpenBSD" } ], "category": "vendor", "name": "OpenBSD" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "QTS \u003c5.2.4.3079 build 20250321", "product": { "name": "QNAP NAS QTS \u003c5.2.4.3079 build 20250321", "product_id": "T044422" } }, { "category": "product_version", "name": "QTS 5.2.4.3079 build 20250321", "product": { "name": "QNAP NAS QTS 5.2.4.3079 build 20250321", "product_id": "T044422-fixed", "product_identification_helper": { "cpe": "cpe:/h:qnap:nas:qts__5.2.4.3079_build_20250321" } } }, { "category": "product_version_range", "name": "QuTS hero \u003ch5.2.4.3079 build 20250321", "product": { "name": "QNAP NAS QuTS hero \u003ch5.2.4.3079 build 20250321", "product_id": "T044423" } }, { "category": "product_version", "name": "QuTS hero h5.2.4.3079 build 20250321", "product": { "name": "QNAP NAS QuTS hero h5.2.4.3079 build 20250321", "product_id": "T044423-fixed", "product_identification_helper": { "cpe": "cpe:/h:qnap:nas:quts_hero__h5.2.4.3079_build_20250321" } } } ], "category": "product_name", "name": "NAS" } ], "category": "vendor", "name": "QNAP" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c14.0.2", "product": { "name": "Securepoint UTM \u003c14.0.2", "product_id": "T041442" } }, { "category": "product_version", "name": "14.0.2", "product": { "name": "Securepoint UTM 14.0.2", "product_id": "T041442-fixed", "product_identification_helper": { "cpe": "cpe:/o:securepoint:unified_threat_management:14.0.2" } } } ], "category": "product_name", "name": "UTM" } ], "category": "vendor", "name": "Securepoint" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "1500 CPU", "product": { "name": "Siemens SIMATIC S7 1500 CPU", "product_id": "T025776", "product_identification_helper": { "cpe": "cpe:/h:siemens:simatic_s7:1500_cpu" } } } ], "category": "product_name", "name": "SIMATIC S7" } ], "category": "vendor", "name": "Siemens" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c12.11.3", "product": { "name": "WatchGuard Firebox \u003c12.11.3", "product_id": "T045310" } }, { "category": "product_version", "name": "12.11.3", "product": { "name": "WatchGuard Firebox 12.11.3", "product_id": "T045310-fixed", "product_identification_helper": { "cpe": "cpe:/a:watchguard:firebox:12.11.3" } } } ], "category": "product_name", "name": "Firebox" } ], "category": "vendor", "name": "WatchGuard" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "9", "product": { "name": "Xerox FreeFlow Print Server 9", "product_id": "T002977", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:9" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-26465", "product_status": { "known_affected": [ "T033898", "T025152", "67646", "4035", "T011540", "T034583", "T038347", "T002977", "1139691", "T043586", "T041263", "T043587", "T041262", "T043588", "T041261", "T043589", "T042656", "T042657", "T001663", "398363", "T025776", "T041442", "434967", "1039165", "1522854", "T012167", "T039981", "74185", "T039664", "T044423", "T044422", "2951", "T002207", "T020536", "T000126", "T027843", "T045790", "T043590", "T043591", "T045791", "T045310", "T045630" ] }, "release_date": "2025-02-17T23:00:00.000+00:00", "title": "CVE-2025-26465" }, { "cve": "CVE-2025-26466", "product_status": { "known_affected": [ "T033898", "T025152", "67646", "4035", "T011540", "T034583", "T038347", "T002977", "1139691", "T043586", "T041263", "T043587", "T041262", "T043588", "T043589", "T042656", "T042657", "T001663", "398363", "T025776", "T041442", "434967", "1039165", "1522854", "T012167", "T039981", "74185", "T039664", "T044423", "T044422", "2951", "T002207", "T020536", "T000126", "T027843", "T045790", "T043590", "T043591", "T045791", "T045310", "T045630" ] }, "release_date": "2025-02-17T23:00:00.000+00:00", "title": "CVE-2025-26466" } ] }
ghsa-jrwv-mv4h-7rrq
Vulnerability from github
Published
2025-02-18 21:32
Modified
2025-02-19 15:32
Severity ?
VLAI Severity ?
Details
A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
{ "affected": [], "aliases": [ "CVE-2025-26465" ], "database_specific": { "cwe_ids": [ "CWE-390" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-02-18T19:15:29Z", "severity": "MODERATE" }, "details": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client\u0027s memory resource first, turning the attack complexity high.", "id": "GHSA-jrwv-mv4h-7rrq", "modified": "2025-02-19T15:32:12Z", "published": "2025-02-18T21:32:51Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-26465" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2025-26465" }, { "type": "WEB", "url": "https://blog.qualys.com/vulnerabilities-threat-research/2025/02/18/qualys-tru-discovers-two-vulnerabilities-in-openssh-cve-2025-26465-cve-2025-26466" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344780" }, { "type": "WEB", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1237040" }, { "type": "WEB", "url": "https://ftp.openbsd.org/pub/OpenBSD/patches/7.6/common/008_ssh.patch.sig" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2025/02/msg00020.html" }, { "type": "WEB", "url": "https://lists.mindrot.org/pipermail/openssh-unix-announce/2025-February/000161.html" }, { "type": "WEB", "url": "https://seclists.org/oss-sec/2025/q1/144" }, { "type": "WEB", "url": "https://security-tracker.debian.org/tracker/CVE-2025-26465" }, { "type": "WEB", "url": "https://ubuntu.com/security/CVE-2025-26465" }, { "type": "WEB", "url": "https://www.openssh.com/releasenotes.html#9.9p2" }, { "type": "WEB", "url": "https://www.openwall.com/lists/oss-security/2025/02/18/1" }, { "type": "WEB", "url": "https://www.openwall.com/lists/oss-security/2025/02/18/4" }, { "type": "WEB", "url": "https://www.theregister.com/2025/02/18/openssh_vulnerabilities_mitm_dos" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "type": "CVSS_V3" } ] }
sca-2025-0009
Vulnerability from csaf_sick
Published
2025-08-01 13:00
Modified
2025-08-01 13:00
Summary
Vulnerabilities affecting SICK TDC-E210GC
Notes
summary
SICK has identified multiple vulnerabilities in the SICK TDC-E210GC product. The advisory includes a total of 23 vulnerabilities, of which 14 are confirmed as affected and 9 as known not affected. At this time, SICK is not aware of any public exploits specifically targeting these vulnerabilities. Customers are strongly advised to apply the recommended workaround for the affected vulnerabilities to reduce potential risk.
General Security Measures
As general security measures, SICK recommends to minimize network exposure of the devices, restrict network access and follow recommended security practices in order to run the devices in a protected IT environment.
Vulnerability Classification
SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer’s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en-US", "notes": [ { "category": "summary", "text": "SICK has identified multiple vulnerabilities in the SICK TDC-E210GC product. The advisory includes a total of 23 vulnerabilities, of which 14 are confirmed as affected and 9 as known not affected. At this time, SICK is not aware of any public exploits specifically targeting these vulnerabilities. Customers are strongly advised to apply the recommended workaround for the affected vulnerabilities to reduce potential risk.", "title": "summary" }, { "category": "general", "text": "As general security measures, SICK recommends to minimize network exposure of the devices, restrict network access and follow recommended security practices in order to run the devices in a protected IT environment.", "title": "General Security Measures" }, { "category": "general", "text": "SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer\u2019s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.", "title": "Vulnerability Classification" } ], "publisher": { "category": "vendor", "contact_details": "psirt@sick.de", "issuing_authority": "SICK AG issues and issues in EHS products (when related to the Endress+Hauser SICK (EHS) joint venture).", "name": "SICK PSIRT", "namespace": "https://www.sick.com/psirt" }, "references": [ { "summary": "SICK PSIRT Security Advisories", "url": "https://sick.com/psirt" }, { "summary": "SICK Operating Guidelines", "url": "https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf" }, { "summary": "ICS-CERT recommended practices on Industrial Security", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "summary": "CVSS v3.1 Calculator", "url": "https://www.first.org/cvss/calculator/3.1" }, { "category": "self", "summary": "The canonical URL.", "url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0009.json" } ], "title": "Vulnerabilities affecting SICK TDC-E210GC", "tracking": { "current_release_date": "2025-08-01T13:00:00.000Z", "generator": { "date": "2025-08-01T08:14:37.621Z", "engine": { "name": "Secvisogram", "version": "2.5.32" } }, "id": "SCA-2025-0009", "initial_release_date": "2025-08-01T13:00:00.000Z", "revision_history": [ { "date": "2025-08-01T13:00:00.000Z", "number": "1", "summary": "Initial version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SICK TDC-E210GC all versions", "product_id": "CSAFPID-0001", "product_identification_helper": { "skus": [ "6070344" ] } } } ], "category": "product_name", "name": "TDC-E210GC" } ], "category": "product_family", "name": "Telematic Data Collector" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SICK TDC-E210GC Firmware all versions", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "TDC-E210GC Firmware" } ], "category": "vendor", "name": "SICK AG" } ], "relationships": [ { "category": "installed_on", "full_product_name": { "name": "SICK TDC-E210GC all Firmware versions", "product_id": "CSAFPID-0003" }, "product_reference": "CSAFPID-0002", "relates_to_product_reference": "CSAFPID-0001" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-38408", "cwe": { "id": "CWE-428", "name": "Unquoted Search Path or Element" }, "notes": [ { "category": "summary", "text": "The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "environmentalScore": 9.8, "environmentalSeverity": "CRITICAL", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 9.8, "temporalSeverity": "CRITICAL", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH Remote Code Execution Due to an Inssufficiently Trustworthy Search Path" }, { "cve": "CVE-2021-23017", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "notes": [ { "category": "summary", "text": "A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7.7, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.7, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "NGINX Off-by-One Error" }, { "cve": "CVE-2020-12062", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client\u0027s download directory by creating a crafted subdirectory anywhere on the remote server. The victim must use the command scp -rp to download a file hierarchy containing, anywhere inside, this crafted subdirectory. NOTE: the vendor points out that \"this attack can achieve no more than a hostile peer is already able to achieve within the scp protocol\" and \"utimes does not fail under normal circumstances.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "environmentalScore": 7.5, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.5, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Inproper Input Validation in OpenSSH 8.2" }, { "cve": "CVE-2021-41874", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An unauthorized access vulnerabiitly exists in all versions of Portainer, which could let a malicious user obtain sensitive information. NOTE: Portainer has received no detail of this CVE report. There is also no response after multiple attempts of contacting the original source.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7.5, "environmentalSeverity": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.5, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Unauthorized Access Vulnerabiitly in All Versions of Portainer" }, { "cve": "CVE-2021-25217", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "In ISC DHCP 4.1-ESV-R1 -\u003e 4.1-ESV-R16, ISC DHCP 4.4.0 -\u003e 4.4.2 (Other branches of ISC DHCP (i.e., releases in the 4.0.x series or lower and releases in the 4.3.x series) are beyond their End-of-Life (EOL) and no longer supported by ISC. From inspection it is clear that the defect is also present in releases from those series, but they have not been officially tested for the vulnerability), The outcome of encountering the defect while reading a lease that will trigger it varies, according to: the component being affected (i.e., dhclient or dhcpd) whether the package was built as a 32-bit or 64-bit binary whether the compiler flag -fstack-protection-strong was used when compiling In dhclient, ISC has not successfully reproduced the error on a 64-bit system. However, on a 32-bit system it is possible to cause dhclient to crash when reading an improper lease, which could cause network connectivity problems for an affected system due to the absence of a running DHCP client process. In dhcpd, when run in DHCPv4 or DHCPv6 mode: if the dhcpd server binary was built for a 32-bit architecture AND the -fstack-protection-strong flag was specified to the compiler, dhcpd may exit while parsing a lease file containing an objectionable lease, resulting in lack of service to clients. Additionally, the offending lease and the lease immediately following it in the lease database may be improperly deleted. if the dhcpd server binary was built for a 64-bit architecture OR if the -fstack-protection-strong compiler flag was NOT specified, the crash will not occur, but it is possible for the offending lease and the lease which immediately followed it to be improperly deleted.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "environmentalScore": 7.4, "environmentalSeverity": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "temporalScore": 7.4, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "A Buffer Overrun in Lease File Parsing Code Can Be Used to Exploit a Common Vulnerability Shared by DHCPD and Dhclient" }, { "cve": "CVE-2021-3618", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim\u0027s traffic at the TCP/IP layer can redirect traffic from one subdomainto another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7.4, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.4, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Broken Authentication of TLS" }, { "cve": "CVE-2021-28041", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "SSH-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7.1, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "temporalScore": 7.1, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Double Free in OpenSSH" }, { "cve": "CVE-2020-15778", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of \"anomalous argument transfers\" because that could \"stand a great chance of breaking existing workflows.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7.8, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.8, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Command Injection in the OpenSSH scp.c to Remote Function" }, { "cve": "CVE-2021-42650", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "Cross Site Scripting (XSS) vulnerability exists in Portainer before 2.9.1 via the node input box in Custom Templates.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "environmentalScore": 6.1, "environmentalSeverity": "MEDIUM", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "temporalScore": 6.1, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Portainer XSS Vulnerability" }, { "cve": "CVE-2016-20012", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "environmentalScore": 5.3, "environmentalSeverity": "MEDIUM", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 5.3, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH User Enumeration" }, { "cve": "CVE-2025-26465", "cwe": { "id": "CWE-390", "name": "Detection of Error Condition Without Action" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client\u0027s memory resource first, turning the attack complexity high.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "environmentalScore": 6.8, "environmentalSeverity": "MEDIUM", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 6.8, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH VerifyHostKeyDNS Vulnerable to Mashine-in-the-Middle" }, { "cve": "CVE-2019-20372", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "environmentalScore": 5.3, "environmentalSeverity": "MEDIUM", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 5.3, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "NGINX Allows HTTP Request Smuggling" }, { "cve": "CVE-2020-14145", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "environmentalScore": 5.9, "environmentalSeverity": "MEDIUM", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 5.9, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH Information Leak in the Algorithm Negotiation" }, { "cve": "CVE-2021-36368", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user\u0027s behalf. NOTE: the vendor\u0027s position is \"this is not an authentication bypass, since nothing is being bypassed.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "environmentalScore": 6.8, "environmentalSeverity": "MEDIUM", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 6.8, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH Vulnerable to Authentication Bypass" }, { "cve": "CVE-2022-24961", "cwe": { "id": "CWE-390", "name": "Detection of Error Condition Without Action" }, "notes": [ { "category": "summary", "text": "In Portainer Agent before 2.11.1, an API server can continue running even if not associated with a Portainer instance in the past few days. The vulnerability allows the API server to run even when not linked to a Portainer instance recently, posing a security risk.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "environmentalScore": 9.8, "environmentalSeverity": "CRITICAL", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 9.8, "temporalSeverity": "CRITICAL", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Portainer Agent API Server Vulnerability" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "environmentalScore": 7.5, "environmentalSeverity": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.5, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Denial of Service in HTTP/2 Protocol" }, { "cve": "CVE-2021-41617", "cwe": { "id": "CWE-273", "name": "Improper Check for Dropped Privileges" }, "notes": [ { "category": "summary", "text": "sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "temporalScore": 7, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH Privilege Escalation" }, { "cve": "CVE-2023-51767", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "temporalScore": 7, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH Authentication Bypass Vulnerability" }, { "cve": "CVE-2008-3844", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7.5, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.5, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Trojan Horse at RHEL4 for OpenSSH" }, { "cve": "CVE-2022-2929", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "In ISC DHCP 1.0 -\u003e 4.4.3, ISC DHCP 4.1-ESV-R1 -\u003e 4.1-ESV-R16-P1 a system with access to a DHCP server, sending DHCP packets crafted to include fqdn labels longer than 63 bytes, could eventually cause the server to run out of memory.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "environmentalScore": 6.5, "environmentalSeverity": "MEDIUM", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 6.5, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "DHCP Memory Leak" }, { "cve": "CVE-2022-2928", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In ISC DHCP 4.4.0 -\u003e 4.4.3, ISC DHCP 4.1-ESV-R1 -\u003e 4.1-ESV-R16-P1, when the function option_code_hash_lookup() is called from add_option(), it increases the option\u0027s refcount field. However, there is not a corresponding call to option_dereference() to decrement the refcount field. The function add_option() is only used in server responses to lease query packets. Each lease query response calls this function for several options, so eventually, the reference counters could overflow and cause the server to abort.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "environmentalScore": 6.5, "environmentalSeverity": "MEDIUM", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 6.5, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "An Option Refcount Overflow Exists in DHCPD" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-354", "name": "Improper Validation of Integrity Check Value" }, "notes": [ { "category": "summary", "text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "environmentalScore": 5.9, "environmentalSeverity": "MEDIUM", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 5.9, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH Vulnerable for Bypassing Integrity Checks" }, { "cve": "CVE-2007-2768", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "environmentalScore": 3.7, "environmentalSeverity": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 3.7, "temporalSeverity": "LOW", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH User Enumeration Using OPIE" } ] }
ssa-082556
Vulnerability from csaf_siemens
Published
2025-06-10 00:00
Modified
2025-08-12 00:00
Summary
SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5
Notes
Summary
Multiple vulnerabilities have been identified in the additional GNU/Linux subsystem of the firmware version V3.1.5 for the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP (incl. SIPLUS variant).
Siemens is preparing fix versions and recommends countermeasures for products where fixes are not, or not yet available.
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Multiple vulnerabilities have been identified in the additional GNU/Linux subsystem of the firmware version V3.1.5 for the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP (incl. SIPLUS variant).\n\nSiemens is preparing fix versions and recommends countermeasures for products where fixes are not, or not yet available.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-082556.html" }, { "category": "self", "summary": "SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-082556.json" } ], "title": "SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5", "tracking": { "current_release_date": "2025-08-12T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-082556", "initial_release_date": "2025-06-10T00:00:00Z", "revision_history": [ { "date": "2025-06-10T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2025-08-12T00:00:00Z", "legacy_version": "1.1", "number": "2", "summary": "Added CVE-2025-6395, CVE-2025-32988, CVE-2025-32989, CVE-2025-32990" } ], "status": "interim", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:intdot/\u003e=3.1.5", "product": { "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)", "product_id": "1", "product_identification_helper": { "model_numbers": [ "6ES7518-4AX00-1AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:intdot/\u003e=3.1.5", "product": { "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)", "product_id": "2", "product_identification_helper": { "model_numbers": [ "6ES7518-4AX00-1AC0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:intdot/\u003e=3.1.5", "product": { "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)", "product_id": "3", "product_identification_helper": { "model_numbers": [ "6ES7518-4FX00-1AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:intdot/\u003e=3.1.5", "product": { "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)", "product_id": "4", "product_identification_helper": { "model_numbers": [ "6ES7518-4FX00-1AC0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:intdot/\u003e=3.1.5", "product": { "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)", "product_id": "5", "product_identification_helper": { "model_numbers": [ "6AG1518-4AX00-4AC0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-41617", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-41617" }, { "cve": "CVE-2023-4527", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-4527" }, { "cve": "CVE-2023-4806", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-4806" }, { "cve": "CVE-2023-4911", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A buffer overflow was discovered in the GNU C Library\u0027s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-4911" }, { "cve": "CVE-2023-5363", "cwe": { "id": "CWE-684", "name": "Incorrect Provision of Specified Functionality" }, "notes": [ { "category": "summary", "text": "Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the \"keylen\" parameter or the IV length, via the \"ivlen\" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST\u0027s SP 800-38D section 8.2.1 guidance for constructing a deterministic IV for AES in GCM mode, truncation of the counter portion could lead to IV reuse. Both truncations and overruns of the key and overruns of the IV will produce incorrect results and could, in some cases, trigger a memory exception. However, these issues are not currently assessed as security critical. Changing the key and/or IV lengths is not considered to be a common operation and the vulnerable API was recently introduced. Furthermore it is likely that application developers will have spotted this problem during testing since decryption would fail unless both peers in the communication were similarly vulnerable. For these reasons we expect the probability of an application being vulnerable to this to be quite low. However if an application is vulnerable then this issue is considered very serious. For these reasons we have assessed this issue as Moderate severity overall. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this because the issue lies outside of the FIPS provider boundary. OpenSSL 3.1 and 3.0 are vulnerable to this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-5363" }, { "cve": "CVE-2023-6246", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program name (the basename of argv[0]) is bigger than 1024 bytes, resulting in an application crash or local privilege escalation. This issue affects glibc 2.36 and newer.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-6246" }, { "cve": "CVE-2023-6779", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_MAX bytes, leading to an incorrect calculation of the buffer size to store the message, resulting in an application crash. This issue affects glibc 2.37 and newer.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-6779" }, { "cve": "CVE-2023-6780", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "notes": [ { "category": "summary", "text": "An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect calculation of the buffer size to store the message, resulting in undefined behavior. This issue affects glibc 2.37 and newer.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-6780" }, { "cve": "CVE-2023-28531", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-28531" }, { "cve": "CVE-2023-38545", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake.\r\n\r\nWhen curl is asked to pass along the hostname to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that hostname can be is 255 bytes.\r\n\r\nIf the hostname is detected to be longer than 255 bytes, curl switches to local name resolving and instead passes on the resolved address only to the proxy. Due to a bug, the local variable that means \"let the host resolve the name\" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long hostname to the target buffer instead of copying just the resolved address there.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-38545" }, { "cve": "CVE-2023-38546", "cwe": { "id": "CWE-73", "name": "External Control of File Name or Path" }, "notes": [ { "category": "summary", "text": "This flaw allows an attacker to insert cookies at will into a running program\r\nusing libcurl, if the specific series of conditions are met.\r\n\r\nlibcurl performs transfers. In its API, an application creates \"easy handles\"\r\nthat are the individual handles for single transfers.\r\n\r\nlibcurl provides a function call that duplicates en easy handle called\r\n[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).\r\n\r\nIf a transfer has cookies enabled when the handle is duplicated, the\r\ncookie-enable state is also cloned - but without cloning the actual\r\ncookies. If the source handle did not read any cookies from a specific file on\r\ndisk, the cloned version of the handle would instead store the file name as\r\n`none` (using the four ASCII letters, no quotes).\r\n\r\nSubsequent use of the cloned handle that does not explicitly set a source to\r\nload cookies from would then inadvertently load cookies from a file named\r\n`none` - if such a file exists and is readable in the current directory of the\r\nprogram using libcurl. And if using the correct file format of course.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-38546" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-44487" }, { "cve": "CVE-2023-46218", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "This flaw allows a malicious HTTP server to set \"super cookies\" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl\u0027s function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-46218" }, { "cve": "CVE-2023-46219", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-46219" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "summary", "text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust; and there could be effects on Bitvise SSH through 9.31.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-51384", "cwe": { "id": "CWE-304", "name": "Missing Critical Step in Authentication" }, "notes": [ { "category": "summary", "text": "In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-51384" }, { "cve": "CVE-2023-51385", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-51385" }, { "cve": "CVE-2023-52927", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "netfilter: allow exp not to be removed in nf_ct_find_expectation Currently nf_conntrack_in() calling nf_ct_find_expectation() will remove the exp from the hash table. However, in some scenario, we expect the exp not to be removed when the created ct will not be confirmed, like in OVS and TC conntrack in the following patches. This patch allows exp not to be removed by setting IPS_CONFIRMED in the status of the tmpl.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-52927" }, { "cve": "CVE-2024-2961", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-2961" }, { "cve": "CVE-2024-6119", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal termination of an application can a cause a denial of service. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address when comparing the expected name with an `otherName` subject alternative name of an X.509 certificate. This may result in an exception that terminates the application program. Note that basic certificate chain validation (signatures, dates, ...) is not affected, the denial of service can occur only when the application also specifies an expected DNS name, Email address or IP address. TLS servers rarely solicit client certificates, and even when they do, they generally don\u0027t perform a name check against a reference identifier (expected identity), but rather extract the presented identity after checking the certificate chain. So TLS servers are generally not affected and the severity of the issue is Moderate. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-6119" }, { "cve": "CVE-2024-6387", "cwe": { "id": "CWE-364", "name": "Signal Handler Race Condition" }, "notes": [ { "category": "summary", "text": "A security regression (CVE-2006-5051) was discovered in OpenSSH\u0027s server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-6387" }, { "cve": "CVE-2024-12133", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "notes": [ { "category": "summary", "text": "A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-12133" }, { "cve": "CVE-2024-12243", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "notes": [ { "category": "summary", "text": "A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-12243" }, { "cve": "CVE-2024-24855", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "A race condition was found in the Linux kernel\u0027s scsi device driver in lpfc_unregister_fcf_rescan() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-24855" }, { "cve": "CVE-2024-26596", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: dsa: netdev_priv() dereference before check on non-DSA netdevice events.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-26596" }, { "cve": "CVE-2024-28085", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users\u0027 terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-28085" }, { "cve": "CVE-2024-33599", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "nscd: Stack-based buffer overflow in netgroup cache\r\n\r\nIf the Name Service Cache Daemon\u0027s (nscd) fixed size cache is exhausted\r\nby client requests then a subsequent client request for netgroup data\r\nmay result in a stack-based buffer overflow. This flaw was introduced\r\nin glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-33599" }, { "cve": "CVE-2024-33600", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "nscd: Null pointer crashes after notfound response\r\n\r\nIf the Name Service Cache Daemon\u0027s (nscd) cache fails to add a not-found\r\nnetgroup response to the cache, the client request can result in a null\r\npointer dereference. This flaw was introduced in glibc 2.15 when the\r\ncache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-33600" }, { "cve": "CVE-2024-33601", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "nscd: netgroup cache may terminate daemon on memory allocation failure\r\n\r\nThe Name Service Cache Daemon\u0027s (nscd) netgroup cache uses xmalloc or\r\nxrealloc and these functions may terminate the process due to a memory\r\nallocation failure resulting in a denial of service to the clients. The\r\nflaw was introduced in glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-33601" }, { "cve": "CVE-2024-33602", "cwe": { "id": "CWE-466", "name": "Return of Pointer Value Outside of Expected Range" }, "notes": [ { "category": "summary", "text": "nscd: netgroup cache assumes NSS callback uses in-buffer strings\r\n\r\nThe Name Service Cache Daemon\u0027s (nscd) netgroup cache can corrupt memory\r\nwhen the NSS callback does not store all strings in the provided buffer.\r\nThe flaw was introduced in glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-33602" }, { "cve": "CVE-2024-34397", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-34397" }, { "cve": "CVE-2024-37370", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "summary", "text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-37370" }, { "cve": "CVE-2024-37371", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "summary", "text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-37371" }, { "cve": "CVE-2024-45490", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-45490" }, { "cve": "CVE-2024-45491", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-45491" }, { "cve": "CVE-2024-45492", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-45492" }, { "cve": "CVE-2024-50246", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs/ntfs3: Add rough attr alloc_size check", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-50246" }, { "cve": "CVE-2024-53166", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "block, bfq: bfqq uaf in bfq_limit_depth() Set new allocated bfqq to bic or remove freed bfqq from bic are both protected by bfqd-\u003elock, however bfq_limit_depth() is deferencing bfqq from bic without the lock, this can lead to UAF if the io_context is shared by multiple tasks.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-53166" }, { "cve": "CVE-2024-57977", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "memcg: A soft lockup vulnerability in the product with about 56,000 tasks were in the OOM cgroup, it was traversing them when the soft lockup was triggered.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-57977" }, { "cve": "CVE-2024-57996", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "notes": [ { "category": "summary", "text": "net_sched: sch_sfq: vulnerability caused by incorrectly handling a packet limit of 1, leading to an array-index-out-of-bounds error and subsequent crash when the queue length is decremented for an empty slot.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-57996" }, { "cve": "CVE-2024-58005", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tpm: Change to kvalloc() in eventlog/acpi.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-58005" }, { "cve": "CVE-2025-4373", "cwe": { "id": "CWE-124", "name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)" }, "notes": [ { "category": "summary", "text": "GLib is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-4373" }, { "cve": "CVE-2025-4598", "cwe": { "id": "CWE-364", "name": "Signal Handler Race Condition" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original\u0027s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\r\n\r\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner\u0027s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original\u0027s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-4598" }, { "cve": "CVE-2025-6395", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-6395" }, { "cve": "CVE-2025-21701", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "net: vulnerability arises because unregister_netdevice_many_notify might run before the rtnl lock section of ethnl operations, leading to potential use of destroyed locks, which is fixed by denying operations on devices being unregistered.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-21701" }, { "cve": "CVE-2025-21702", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "pfifo_tail_enqueue: Drop new packet when sch-\u003elimit == 0.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-21702" }, { "cve": "CVE-2025-21712", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "md/md-bitmap: vulnerability caused by bitmap_get_stats() can be called even if the bitmap is destroyed or not fully initialized, leading to a kernel crash, which is fixed by synchronizing bitmap_get_stats() with bitmap_info.mutex.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-21712" }, { "cve": "CVE-2025-21724", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index(). Resolve a UBSAN shift-out-of-bounds issue in iova_bitmap_offset_to_index() where shifting the constant \"1\" (of type int) by bitmap-\u003emapped.pgshift (an unsigned long value) could result in undefined behavior. The constant \"1\" defaults to a 32-bit \"int\", and when \"pgshift\" exceeds 31 (e.g., pgshift = 63) the shift operation overflows, as the result cannot be represented in a 32-bit type.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-21724" }, { "cve": "CVE-2025-21728", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "bpf: Send signals asynchronously if !preemptible BPF programs can execute in all kinds of contexts and when a program running in a non-preemptible context uses the bpf_send_signal() kfunc, it will cause issues because this kfunc can sleep.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-21728" }, { "cve": "CVE-2025-21745", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nblk-cgroup: Fix class @block_class\u0027s subsystem refcount leakage\r\n\r\nblkcg_fill_root_iostats() iterates over @block_class\u0027s devices by\r\nclass_dev_iter_(init|next)(), but does not end iterating with\r\nclass_dev_iter_exit(), so causes the class\u0027s subsystem refcount leakage.\r\n\r\nFix by ending the iterating with class_dev_iter_exit().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-21745" }, { "cve": "CVE-2025-21756", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "vsock: Keep the binding until socket destruction Preserve sockets bindings; this includes both resulting from an explicit bind() and those implicitly bound through autobind during connect().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-21756" }, { "cve": "CVE-2025-21758", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ipv6: mcast: add RCU protection to mld_newpack() mld_newpack() can be called without RTNL or RCU being held.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-21758" }, { "cve": "CVE-2025-21765", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ipv6: use RCU protection in ip6_default_advmss() ip6_default_advmss() needs rcu protection to make sure the net structure it reads does not disappear.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-21765" }, { "cve": "CVE-2025-21766", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ipv4: use RCU protection in __ip_rt_update_pmtu(). __ip_rt_update_pmtu() must use RCU protection to make sure the net structure it reads does not disappear.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-21766" }, { "cve": "CVE-2025-21767", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context The following bug report happened with a PREEMPT_RT kernel: BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 2012, name: kwatchdog preempt_count: 1, expected: 0 RCU nest depth: 0, expected: 0 get_random_u32+0x4f/0x110 clocksource_verify_choose_cpus+0xab/0x1a0 clocksource_verify_percpu.part.0+0x6b/0x330 clocksource_watchdog_kthread+0x193/0x1a0 It is due to the fact that clocksource_verify_choose_cpus() is invoked with preemption disabled. This function invokes get_random_u32() to obtain random numbers for choosing CPUs. The batched_entropy_32 local lock and/or the base_crng.lock spinlock in driver/char/random.c will be acquired during the call. In PREEMPT_RT kernel, they are both sleeping locks and so cannot be acquired in atomic context. Fix this problem by using migrate_disable() to allow smp_processor_id() to be reliably used without introducing atomic context. preempt_disable() is then called after clocksource_verify_choose_cpus() but before the clocksource measurement is being run to avoid introducing unexpected latency.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-21767" }, { "cve": "CVE-2025-21795", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "NFSD: hang in nfsd4_shutdown_callback. If nfs4_client is in courtesy state then there is no point to send the callback. This causes nfsd4_shutdown_callback to hang since cl_cb_inflight is not 0. This hang lasts about 15 minutes until TCP notifies NFSD that the connection was dropped.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-21795" }, { "cve": "CVE-2025-21796", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nfsd: clear acl_access/acl_default after releasing them If getting acl_default fails, acl_access and acl_default will be released simultaneously.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-21796" }, { "cve": "CVE-2025-21848", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfp: bpf: Add check for nfp_app_ctrl_msg_alloc()\r\n\r\nAdd check for the return value of nfp_app_ctrl_msg_alloc() in\r\nnfp_bpf_cmsg_alloc() to prevent null pointer dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-21848" }, { "cve": "CVE-2025-21862", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "drop_monitor: incorrect initialization order. If drop_monitor is built as a kernel module, syzkaller may have time to send a netlink NET_DM_CMD_START message during the module loading. This will call the net_dm_monitor_start() function that uses a spinlock that has not yet been initialized.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-21862" }, { "cve": "CVE-2025-21864", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntcp: drop secpath at the same time as we currently drop dst\r\n\r\nXiumei reported hitting the WARN in xfrm6_tunnel_net_exit while\r\nrunning tests that boil down to:\r\n - create a pair of netns\r\n - run a basic TCP test over ipcomp6\r\n - delete the pair of netns\r\n\r\nThe xfrm_state found on spi_byaddr was not deleted at the time we\r\ndelete the netns, because we still have a reference on it. This\r\nlingering reference comes from a secpath (which holds a ref on the\r\nxfrm_state), which is still attached to an skb. This skb is not\r\nleaked, it ends up on sk_receive_queue and then gets defer-free\u0027d by\r\nskb_attempt_defer_free.\r\n\r\nThe problem happens when we defer freeing an skb (push it on one CPU\u0027s\r\ndefer_list), and don\u0027t flush that list before the netns is deleted. In\r\nthat case, we still have a reference on the xfrm_state that we don\u0027t\r\nexpect at this point.\r\n\r\nWe already drop the skb\u0027s dst in the TCP receive path when it\u0027s no\r\nlonger needed, so let\u0027s also drop the secpath. At this point,\r\ntcp_filter has already called into the LSM hooks that may require the\r\nsecpath, so it should not be needed anymore. However, in some of those\r\nplaces, the MPTCP extension has just been attached to the skb, so we\r\ncannot simply drop all extensions.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-21864" }, { "cve": "CVE-2025-21865", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl(). Commit eb28fd76c0a0 (\"gtp: Destroy device along with udp socket\u0027s netns dismantle.\") added the for_each_netdev() loop in gtp_net_exit_batch_rtnl() to destroy devices in each netns as done in geneve and ip tunnels. However, this could trigger -\u003edellink() twice for the same device during -\u003eexit_batch_rtnl().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-21865" }, { "cve": "CVE-2025-26465", "cwe": { "id": "CWE-390", "name": "Detection of Error Condition Without Action" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client\u0027s memory resource first, turning the attack complexity high.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-26465" }, { "cve": "CVE-2025-31115", "cwe": { "id": "CWE-826", "name": "Premature Release of Resource During Expected Lifetime" }, "notes": [ { "category": "summary", "text": "The threaded .xz decoder in liblzma has a vulnerability that can at least result in a crash (denial of service). The effects include heap use after free and writing to an address based on the null pointer plus an offset.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-31115" }, { "cve": "CVE-2025-32988", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure. This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-32988" }, { "cve": "CVE-2025-32989", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-32989" }, { "cve": "CVE-2025-46836", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net-tools is a collection of programs that form the base set of the NET-3 networking distribution for the Linux operating system. Inn versions up to and including 2.10, the Linux network utilities (like ifconfig) from the net-tools package do not properly validate the structure of /proc files when showing interfaces. `get_name()` in `interface.c` copies interface labels from `/proc/net/dev` into a fixed 16-byte stack buffer without bounds checking, leading to possible arbitrary code execution or crash. The known attack path does not require privilege but also does not provide privilege escalation in this scenario. A patch is available and expected to be part of version 2.20.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2025-46836" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…