Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2006-0225 (GCVE-0-2006-0225)
Vulnerability from cvelistv5
Published
2006-01-25 11:00
Modified
2024-08-07 16:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:25:34.046Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "16369", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/16369" }, { "name": "HPSBUX02178", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112" }, { "name": "25936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25936" }, { "name": "18798", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18798" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688" }, { "name": "23340", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23340" }, { "name": "RHSA-2006:0298", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0298.html" }, { "name": "18970", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18970" }, { "name": "21492", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21492" }, { "name": "TA07-072A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "2006-0004", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2006/0004" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm" }, { "name": "19159", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19159" }, { "name": "18650", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18650" }, { "name": "18736", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18736" }, { "name": "22692", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/22692" }, { "name": "ADV-2007-2120", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2120" }, { "name": "23680", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23680" }, { "name": "APPLE-SA-2007-03-13", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "18579", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18579" }, { "name": "18969", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18969" }, { "name": "20723", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20723" }, { "name": "openssh-scp-command-execution(24305)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24305" }, { "name": "MDKSA-2006:034", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:034" }, { "name": "462", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/462" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-158.htm" }, { "name": "ADV-2006-4869", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4869" }, { "name": "OpenPKG-SA-2006.003", "tags": [ "vendor-advisory", "x_refsource_OPENPKG", "x_transferred" ], "url": "http://www.openpkg.org/security/OpenPKG-SA-2006.003-openssh.html" }, { "name": "FLSA-2006:168935", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/425397/100/0/threaded" }, { "name": "RHSA-2006:0044", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0044.html" }, { "name": "21262", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21262" }, { "name": "25607", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25607" }, { "name": "SSRT061267", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blogs.sun.com/security/entry/sun_alert_102961_security_vulnerability" }, { "name": "SUSE-SA:2006:008", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2006_08_openssh.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=2751" }, { "name": "ADV-2006-2490", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/2490" }, { "name": "ADV-2006-0306", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0306" }, { "name": "SSA:2006-045-06", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.425802" }, { "name": "oval:org.mitre.oval:def:1138", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1138" }, { "name": "21129", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21129" }, { "name": "1015540", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015540" }, { "name": "FEDORA-2006-056", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00062.html" }, { "name": "21724", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21724" }, { "name": "GLSA-200602-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200602-11.xml" }, { "name": "23241", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23241" }, { "name": "20060212 [3.8] 005: SECURITY FIX: February 12, 2006", "tags": [ "vendor-advisory", "x_refsource_OPENBSD", "x_transferred" ], "url": "ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm" }, { "name": "ADV-2007-0930", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026" }, { "name": "102961", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102961-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html" }, { "name": "18850", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18850" }, { "name": "22196", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22196" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-246.htm" }, { "name": "RHSA-2006:0698", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0698.html" }, { "name": "18595", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18595" }, { "name": "18964", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18964" }, { "name": "USN-255-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-255-1" }, { "name": "oval:org.mitre.oval:def:9962", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9962" }, { "name": "20060703-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc" }, { "name": "18910", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18910" }, { "name": "24479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24479" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-01-24T00:00:00", "descriptions": [ { "lang": "en", "value": "scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "16369", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/16369" }, { "name": "HPSBUX02178", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112" }, { "name": "25936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25936" }, { "name": "18798", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18798" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688" }, { "name": "23340", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23340" }, { "name": "RHSA-2006:0298", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0298.html" }, { "name": "18970", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18970" }, { "name": "21492", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21492" }, { "name": "TA07-072A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "2006-0004", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2006/0004" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm" }, { "name": "19159", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19159" }, { "name": "18650", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18650" }, { "name": "18736", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18736" }, { "name": "22692", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/22692" }, { "name": "ADV-2007-2120", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2120" }, { "name": "23680", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23680" }, { "name": "APPLE-SA-2007-03-13", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "18579", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18579" }, { "name": "18969", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18969" }, { "name": "20723", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20723" }, { "name": "openssh-scp-command-execution(24305)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24305" }, { "name": "MDKSA-2006:034", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:034" }, { "name": "462", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/462" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-158.htm" }, { "name": "ADV-2006-4869", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4869" }, { "name": "OpenPKG-SA-2006.003", "tags": [ "vendor-advisory", "x_refsource_OPENPKG" ], "url": "http://www.openpkg.org/security/OpenPKG-SA-2006.003-openssh.html" }, { "name": "FLSA-2006:168935", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.securityfocus.com/archive/1/425397/100/0/threaded" }, { "name": "RHSA-2006:0044", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0044.html" }, { "name": "21262", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21262" }, { "name": "25607", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25607" }, { "name": "SSRT061267", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blogs.sun.com/security/entry/sun_alert_102961_security_vulnerability" }, { "name": "SUSE-SA:2006:008", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2006_08_openssh.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=2751" }, { "name": "ADV-2006-2490", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/2490" }, { "name": "ADV-2006-0306", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0306" }, { "name": "SSA:2006-045-06", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.425802" }, { "name": "oval:org.mitre.oval:def:1138", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1138" }, { "name": "21129", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21129" }, { "name": "1015540", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015540" }, { "name": "FEDORA-2006-056", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00062.html" }, { "name": "21724", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21724" }, { "name": "GLSA-200602-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200602-11.xml" }, { "name": "23241", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23241" }, { "name": "20060212 [3.8] 005: SECURITY FIX: February 12, 2006", "tags": [ "vendor-advisory", "x_refsource_OPENBSD" ], "url": "ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm" }, { "name": "ADV-2007-0930", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026" }, { "name": "102961", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102961-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html" }, { "name": "18850", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18850" }, { "name": "22196", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22196" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-246.htm" }, { "name": "RHSA-2006:0698", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0698.html" }, { "name": "18595", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18595" }, { "name": "18964", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18964" }, { "name": "USN-255-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-255-1" }, { "name": "oval:org.mitre.oval:def:9962", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9962" }, { "name": "20060703-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc" }, { "name": "18910", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18910" }, { "name": "24479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24479" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2006-0225", "datePublished": "2006-01-25T11:00:00", "dateReserved": "2006-01-17T00:00:00", "dateUpdated": "2024-08-07T16:25:34.046Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2006-0225\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2006-01-25T11:03:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.\"},{\"lang\":\"es\",\"value\":\"scp en OpenSSH 4.2p1 permite a atacantes ejecutar \u00f3rdenes de su elecci\u00f3n mediante nombres de ficheros que contienen metacaract\u00e9res o espacios, que son expandidos dos veces.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":true,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"580008AC-2667-4708-8F7E-D70416A460EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E05D8E86-EC01-4589-B372-4DEB7845C81F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"764AD252-CA2F-4A87-BCAA-7747E8C410E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFFAA075-4277-4FD8-8A5A-867EEE1BA2F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"269BB9F7-55E5-4CB3-8429-C37C7132799F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6E6F639-31A0-4026-B6D4-51BA79FB1D20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0211BCE3-0DED-40BA-8A21-1A97B91F71C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4EE9E4B-CABC-4EA2-9075-CC23CEB1B0A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AD7BB30-AC79-4153-852C-1053DCF4DE53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E188C66-C8F1-4C13-AAFF-7C83B2A884B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9039BE91-AF0A-41E7-8F9F-15375890E120\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08BCB2EA-DF9D-4853-805B-29FA6274E2B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F93417F-2498-4576-9F5D-B59F77D39669\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3AB42C-B614-4746-99AD-E94140D91BF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"458167E5-9BC2-40BE-AC8A-9761A4F19494\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FB9B4C7-4235-4388-8E5D-E72ECCC37A7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86ACA0ED-A3D0-48A7-B06F-13709AD23B55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FEB9262-D05E-4610-9C79-3EDE44AC7C0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8176879B-1875-4AC9-B15A-2ABCFCD04F88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAA26A12-F96A-4025-BBCA-72B7A3B1E60C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A02751E9-2D38-4495-9572-8D84D71D4773\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A36BEA2-DAE4-423C-8D85-0F6036351F98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80DC64F6-FE28-44BA-91D1-EC2DB11B2CFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44CCF5CD-B434-4392-A79A-C1945D2AE30A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEB456B8-9D8B-4985-858D-6A43FA5EE2E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BD4E0F6-4EEA-4EC7-83E7-FC6F7D2E7A3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35F4ABE-1B0C-4195-8F99-BF993A17882B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADC7352D-2916-47F7-A256-F897D763DC9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEC3FC36-B246-4DCB-8984-228525D9A356\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC861000-37D8-4B0F-BFA0-57E9BE125B56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EBE75FE-DDE2-43BA-80EF-15A6698EABC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"683B26F0-5EA2-455A-8948-27C100BBA3AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7279E1EC-DEBC-4ACC-925D-06A7697C162F\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch\",\"source\":\"secalert@redhat.com\"},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://blogs.sun.com/security/entry/sun_alert_102961_security_vulnerability\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=305214\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/18579\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/18595\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/18650\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/18736\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/18798\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/18850\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/18910\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/18964\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/18969\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/18970\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/19159\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/20723\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/21129\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/21262\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/21492\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/21724\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22196\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23241\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23340\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23680\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/24479\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/25607\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/25936\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securityreason.com/securityalert/462\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1015540\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.425802\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102961-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2006-158.htm\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2007-246.htm\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200602-11.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:034\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2006_08_openssh.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openpkg.org/security/OpenPKG-SA-2006.003-openssh.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.osvdb.org/22692\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00062.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0044.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0298.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0698.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/425397/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/16369\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.trustix.org/errata/2006/0004\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-255-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA07-072A.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/0306\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/2490\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4869\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0930\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/2120\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=2751\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/24305\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1138\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9962\",\"source\":\"secalert@redhat.com\"},{\"url\":\"ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://blogs.sun.com/security/entry/sun_alert_102961_security_vulnerability\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=305214\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/18579\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/18595\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/18650\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/18736\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/18798\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/18850\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/18910\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/18964\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/18969\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/18970\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/19159\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/20723\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21129\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21262\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21492\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21724\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22196\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/23241\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/23340\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/23680\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/24479\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25607\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25936\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securityreason.com/securityalert/462\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1015540\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.425802\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102961-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2006-158.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2007-246.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200602-11.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:034\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2006_08_openssh.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openpkg.org/security/OpenPKG-SA-2006.003-openssh.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/22692\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00062.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0044.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0298.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0698.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/425397/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/16369\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.trustix.org/errata/2006/0004\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-255-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA07-072A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/0306\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/2490\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4869\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0930\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/2120\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=2751\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/24305\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1138\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9962\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"This issue was addressed in Red Hat Enterprise Linux 2.1, 3 and 4:\\n\\nhttps://rhn.redhat.com/errata/CVE-2006-0225.html\\nhttps://www.redhat.com/security/data/cve/CVE-2006-0225.html\\n\\nIssue was fixed upstream in version 4.3. The openssh packages in Red Hat Enterprise Linux 5 are based on the fixed upstream version and were not affected by this flaw.\",\"lastModified\":\"2009-09-09T00:00:00\"}]}}" } }
RHSA-2006:0698
Vulnerability from csaf_redhat
Published
2006-09-29 00:23
Modified
2025-09-10 13:38
Summary
Red Hat Security Advisory: openssh security update
Notes
Topic
Updated openssh packages that fix several security issues in sshd are now
available for Red Hat Enterprise Linux 2.1.
This update has been rated as having important security impact by the Red Hat
Security Response Team.
Details
OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. This
package includes the core files necessary for both the OpenSSH client and
server.
Mark Dowd discovered a signal handler race condition in the OpenSSH sshd
server. A remote attacker could possibly leverage this flaw to cause a
denial of service (crash). (CVE-2006-5051) The OpenSSH project believes the
likelihood of successful exploitation leading to arbitrary code execution
appears remote. However, the Red Hat Security Response Team have not yet
been able to verify this claim due to lack of upstream vulnerability
information. We are therefore including a fix for this flaw and have rated
it important security severity in the event our continued investigation
finds this issue to be exploitable.
Tavis Ormandy of the Google Security Team discovered a denial of service
bug in the OpenSSH sshd server. A remote attacker can send a specially
crafted SSH-1 request to the server causing sshd to consume a large
quantity of CPU resources. (CVE-2006-4924)
An arbitrary command execution flaw was discovered in the way scp copies
files locally. It is possible for a local attacker to create a file with a
carefully crafted name that could execute arbitrary commands as the user
running scp to copy files locally. (CVE-2006-0225)
The SSH daemon, when restricting host access by numeric IP addresses and
with VerifyReverseMapping disabled, allows remote attackers to bypass
"from=" and "user@host" address restrictions by connecting to a host from a
system whose reverse DNS hostname contains the numeric IP address.
(CVE-2003-0386)
All users of openssh should upgrade to these updated packages, which
contain backported patches that resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssh packages that fix several security issues in sshd are now\navailable for Red Hat Enterprise Linux 2.1.\n\nThis update has been rated as having important security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "OpenSSH is OpenBSD\u0027s SSH (Secure SHell) protocol implementation. This\npackage includes the core files necessary for both the OpenSSH client and\nserver.\n\nMark Dowd discovered a signal handler race condition in the OpenSSH sshd\nserver. A remote attacker could possibly leverage this flaw to cause a\ndenial of service (crash). (CVE-2006-5051) The OpenSSH project believes the\nlikelihood of successful exploitation leading to arbitrary code execution\nappears remote. However, the Red Hat Security Response Team have not yet\nbeen able to verify this claim due to lack of upstream vulnerability\ninformation. We are therefore including a fix for this flaw and have rated\nit important security severity in the event our continued investigation\nfinds this issue to be exploitable.\n\nTavis Ormandy of the Google Security Team discovered a denial of service\nbug in the OpenSSH sshd server. A remote attacker can send a specially\ncrafted SSH-1 request to the server causing sshd to consume a large\nquantity of CPU resources. (CVE-2006-4924)\n\nAn arbitrary command execution flaw was discovered in the way scp copies\nfiles locally. It is possible for a local attacker to create a file with a\ncarefully crafted name that could execute arbitrary commands as the user\nrunning scp to copy files locally. (CVE-2006-0225)\n\nThe SSH daemon, when restricting host access by numeric IP addresses and\nwith VerifyReverseMapping disabled, allows remote attackers to bypass\n\"from=\" and \"user@host\" address restrictions by connecting to a host from a\nsystem whose reverse DNS hostname contains the numeric IP address.\n(CVE-2003-0386)\n\nAll users of openssh should upgrade to these updated packages, which\ncontain backported patches that resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0698", "url": "https://access.redhat.com/errata/RHSA-2006:0698" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#important", "url": "http://www.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "174026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=174026" }, { "category": "external", "summary": "208248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=208248" }, { "category": "external", "summary": "208298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=208298" }, { "category": "external", "summary": "208430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=208430" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0698.json" } ], "title": "Red Hat Security Advisory: openssh security update", "tracking": { "current_release_date": "2025-09-10T13:38:56+00:00", "generator": { "date": "2025-09-10T13:38:56+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2006:0698", "initial_release_date": "2006-09-29T00:23:00+00:00", "revision_history": [ { "date": "2006-09-29T00:23:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-09-28T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:38:56+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssh-server-0:3.1p1-21.ia64", "product": { "name": "openssh-server-0:3.1p1-21.ia64", "product_id": "openssh-server-0:3.1p1-21.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.1p1-21?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.1p1-21.ia64", "product": { "name": "openssh-askpass-0:3.1p1-21.ia64", "product_id": "openssh-askpass-0:3.1p1-21.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.1p1-21?arch=ia64" } } }, { "category": "product_version", "name": "openssh-0:3.1p1-21.ia64", "product": { "name": "openssh-0:3.1p1-21.ia64", "product_id": "openssh-0:3.1p1-21.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.1p1-21?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.1p1-21.ia64", "product": { "name": "openssh-askpass-gnome-0:3.1p1-21.ia64", "product_id": "openssh-askpass-gnome-0:3.1p1-21.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.1p1-21?arch=ia64" } } }, { "category": "product_version", "name": "openssh-clients-0:3.1p1-21.ia64", "product": { "name": "openssh-clients-0:3.1p1-21.ia64", "product_id": "openssh-clients-0:3.1p1-21.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.1p1-21?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.1p1-21.src", "product": { "name": "openssh-0:3.1p1-21.src", "product_id": "openssh-0:3.1p1-21.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.1p1-21?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssh-server-0:3.1p1-21.i386", "product": { "name": "openssh-server-0:3.1p1-21.i386", "product_id": "openssh-server-0:3.1p1-21.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.1p1-21?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.1p1-21.i386", "product": { "name": "openssh-askpass-0:3.1p1-21.i386", "product_id": "openssh-askpass-0:3.1p1-21.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.1p1-21?arch=i386" } } }, { "category": "product_version", "name": "openssh-0:3.1p1-21.i386", "product": { "name": "openssh-0:3.1p1-21.i386", "product_id": "openssh-0:3.1p1-21.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.1p1-21?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.1p1-21.i386", "product": { "name": "openssh-askpass-gnome-0:3.1p1-21.i386", "product_id": "openssh-askpass-gnome-0:3.1p1-21.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.1p1-21?arch=i386" } } }, { "category": "product_version", "name": "openssh-clients-0:3.1p1-21.i386", "product": { "name": "openssh-clients-0:3.1p1-21.i386", "product_id": "openssh-clients-0:3.1p1-21.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.1p1-21?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-0:3.1p1-21.i386" }, "product_reference": "openssh-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-0:3.1p1-21.ia64" }, "product_reference": "openssh-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-0:3.1p1-21.src" }, "product_reference": "openssh-0:3.1p1-21.src", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-askpass-0:3.1p1-21.i386" }, "product_reference": "openssh-askpass-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-askpass-0:3.1p1-21.ia64" }, "product_reference": "openssh-askpass-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386" }, "product_reference": "openssh-askpass-gnome-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-clients-0:3.1p1-21.i386" }, "product_reference": "openssh-clients-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-clients-0:3.1p1-21.ia64" }, "product_reference": "openssh-clients-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-server-0:3.1p1-21.i386" }, "product_reference": "openssh-server-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-server-0:3.1p1-21.ia64" }, "product_reference": "openssh-server-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-0:3.1p1-21.i386" }, "product_reference": "openssh-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-0:3.1p1-21.ia64" }, "product_reference": "openssh-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.src as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-0:3.1p1-21.src" }, "product_reference": "openssh-0:3.1p1-21.src", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.1p1-21.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-askpass-0:3.1p1-21.i386" }, "product_reference": "openssh-askpass-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.1p1-21.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-askpass-0:3.1p1-21.ia64" }, "product_reference": "openssh-askpass-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.1p1-21.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386" }, "product_reference": "openssh-askpass-gnome-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.1p1-21.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.1p1-21.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-clients-0:3.1p1-21.i386" }, "product_reference": "openssh-clients-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.1p1-21.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-clients-0:3.1p1-21.ia64" }, "product_reference": "openssh-clients-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.1p1-21.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-server-0:3.1p1-21.i386" }, "product_reference": "openssh-server-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.1p1-21.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-server-0:3.1p1-21.ia64" }, "product_reference": "openssh-server-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-0:3.1p1-21.i386" }, "product_reference": "openssh-0:3.1p1-21.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-0:3.1p1-21.ia64" }, "product_reference": "openssh-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.src as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-0:3.1p1-21.src" }, "product_reference": "openssh-0:3.1p1-21.src", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-askpass-0:3.1p1-21.i386" }, "product_reference": "openssh-askpass-0:3.1p1-21.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-askpass-0:3.1p1-21.ia64" }, "product_reference": "openssh-askpass-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386" }, "product_reference": "openssh-askpass-gnome-0:3.1p1-21.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-clients-0:3.1p1-21.i386" }, "product_reference": "openssh-clients-0:3.1p1-21.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-clients-0:3.1p1-21.ia64" }, "product_reference": "openssh-clients-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-server-0:3.1p1-21.i386" }, "product_reference": "openssh-server-0:3.1p1-21.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-server-0:3.1p1-21.ia64" }, "product_reference": "openssh-server-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-0:3.1p1-21.i386" }, "product_reference": "openssh-0:3.1p1-21.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-0:3.1p1-21.ia64" }, "product_reference": "openssh-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.src as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-0:3.1p1-21.src" }, "product_reference": "openssh-0:3.1p1-21.src", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-askpass-0:3.1p1-21.i386" }, "product_reference": "openssh-askpass-0:3.1p1-21.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-askpass-0:3.1p1-21.ia64" }, "product_reference": "openssh-askpass-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386" }, "product_reference": "openssh-askpass-gnome-0:3.1p1-21.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-clients-0:3.1p1-21.i386" }, "product_reference": "openssh-clients-0:3.1p1-21.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-clients-0:3.1p1-21.ia64" }, "product_reference": "openssh-clients-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-server-0:3.1p1-21.i386" }, "product_reference": "openssh-server-0:3.1p1-21.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-server-0:3.1p1-21.ia64" }, "product_reference": "openssh-server-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2003-0386", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617024" } ], "notes": [ { "category": "description", "text": "OpenSSH 3.6.1 and earlier, when restricting host access by numeric IP addresses and with VerifyReverseMapping disabled, allows remote attackers to bypass \"from=\" and \"user@host\" address restrictions by connecting to a host from a system whose reverse DNS hostname contains the numeric IP address.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "2.1AS:openssh-0:3.1p1-21.i386", "2.1AS:openssh-0:3.1p1-21.ia64", "2.1AS:openssh-0:3.1p1-21.src", "2.1AS:openssh-askpass-0:3.1p1-21.i386", "2.1AS:openssh-askpass-0:3.1p1-21.ia64", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AS:openssh-clients-0:3.1p1-21.i386", "2.1AS:openssh-clients-0:3.1p1-21.ia64", "2.1AS:openssh-server-0:3.1p1-21.i386", "2.1AS:openssh-server-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.i386", "2.1AW:openssh-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.src", "2.1AW:openssh-askpass-0:3.1p1-21.i386", "2.1AW:openssh-askpass-0:3.1p1-21.ia64", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AW:openssh-clients-0:3.1p1-21.i386", "2.1AW:openssh-clients-0:3.1p1-21.ia64", "2.1AW:openssh-server-0:3.1p1-21.i386", "2.1AW:openssh-server-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.i386", "2.1ES:openssh-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.src", "2.1ES:openssh-askpass-0:3.1p1-21.i386", "2.1ES:openssh-askpass-0:3.1p1-21.ia64", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1ES:openssh-clients-0:3.1p1-21.i386", "2.1ES:openssh-clients-0:3.1p1-21.ia64", "2.1ES:openssh-server-0:3.1p1-21.i386", "2.1ES:openssh-server-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.i386", "2.1WS:openssh-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.src", "2.1WS:openssh-askpass-0:3.1p1-21.i386", "2.1WS:openssh-askpass-0:3.1p1-21.ia64", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1WS:openssh-clients-0:3.1p1-21.i386", "2.1WS:openssh-clients-0:3.1p1-21.ia64", "2.1WS:openssh-server-0:3.1p1-21.i386", "2.1WS:openssh-server-0:3.1p1-21.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0386" }, { "category": "external", "summary": "RHBZ#1617024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617024" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0386", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0386" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0386", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0386" } ], "release_date": "2003-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-29T00:23:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:openssh-0:3.1p1-21.i386", "2.1AS:openssh-0:3.1p1-21.ia64", "2.1AS:openssh-0:3.1p1-21.src", "2.1AS:openssh-askpass-0:3.1p1-21.i386", "2.1AS:openssh-askpass-0:3.1p1-21.ia64", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AS:openssh-clients-0:3.1p1-21.i386", "2.1AS:openssh-clients-0:3.1p1-21.ia64", "2.1AS:openssh-server-0:3.1p1-21.i386", "2.1AS:openssh-server-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.i386", "2.1AW:openssh-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.src", "2.1AW:openssh-askpass-0:3.1p1-21.i386", "2.1AW:openssh-askpass-0:3.1p1-21.ia64", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AW:openssh-clients-0:3.1p1-21.i386", "2.1AW:openssh-clients-0:3.1p1-21.ia64", "2.1AW:openssh-server-0:3.1p1-21.i386", "2.1AW:openssh-server-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.i386", "2.1ES:openssh-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.src", "2.1ES:openssh-askpass-0:3.1p1-21.i386", "2.1ES:openssh-askpass-0:3.1p1-21.ia64", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1ES:openssh-clients-0:3.1p1-21.i386", "2.1ES:openssh-clients-0:3.1p1-21.ia64", "2.1ES:openssh-server-0:3.1p1-21.i386", "2.1ES:openssh-server-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.i386", "2.1WS:openssh-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.src", "2.1WS:openssh-askpass-0:3.1p1-21.i386", "2.1WS:openssh-askpass-0:3.1p1-21.ia64", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1WS:openssh-clients-0:3.1p1-21.i386", "2.1WS:openssh-clients-0:3.1p1-21.ia64", "2.1WS:openssh-server-0:3.1p1-21.i386", "2.1WS:openssh-server-0:3.1p1-21.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0698" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-0225", "discovery_date": "2005-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "168167" } ], "notes": [ { "category": "description", "text": "scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.", "title": "Vulnerability description" }, { "category": "summary", "text": "local to local copy uses shell expansion twice", "title": "Vulnerability summary" }, { "category": "other", "text": "Issue was fixed upstream in version 4.3. The openssh packages in Red Hat Enterprise Linux 5 are based on the fixed upstream version and were not affected by this flaw.", "title": "Statement" } ], "product_status": { "fixed": [ "2.1AS:openssh-0:3.1p1-21.i386", "2.1AS:openssh-0:3.1p1-21.ia64", "2.1AS:openssh-0:3.1p1-21.src", "2.1AS:openssh-askpass-0:3.1p1-21.i386", "2.1AS:openssh-askpass-0:3.1p1-21.ia64", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AS:openssh-clients-0:3.1p1-21.i386", "2.1AS:openssh-clients-0:3.1p1-21.ia64", "2.1AS:openssh-server-0:3.1p1-21.i386", "2.1AS:openssh-server-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.i386", "2.1AW:openssh-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.src", "2.1AW:openssh-askpass-0:3.1p1-21.i386", "2.1AW:openssh-askpass-0:3.1p1-21.ia64", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AW:openssh-clients-0:3.1p1-21.i386", "2.1AW:openssh-clients-0:3.1p1-21.ia64", "2.1AW:openssh-server-0:3.1p1-21.i386", "2.1AW:openssh-server-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.i386", "2.1ES:openssh-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.src", "2.1ES:openssh-askpass-0:3.1p1-21.i386", "2.1ES:openssh-askpass-0:3.1p1-21.ia64", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1ES:openssh-clients-0:3.1p1-21.i386", "2.1ES:openssh-clients-0:3.1p1-21.ia64", "2.1ES:openssh-server-0:3.1p1-21.i386", "2.1ES:openssh-server-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.i386", "2.1WS:openssh-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.src", "2.1WS:openssh-askpass-0:3.1p1-21.i386", "2.1WS:openssh-askpass-0:3.1p1-21.ia64", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1WS:openssh-clients-0:3.1p1-21.i386", "2.1WS:openssh-clients-0:3.1p1-21.ia64", "2.1WS:openssh-server-0:3.1p1-21.i386", "2.1WS:openssh-server-0:3.1p1-21.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-0225" }, { "category": "external", "summary": "RHBZ#168167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-0225", "url": "https://www.cve.org/CVERecord?id=CVE-2006-0225" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0225", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0225" } ], "release_date": "2005-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-29T00:23:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:openssh-0:3.1p1-21.i386", "2.1AS:openssh-0:3.1p1-21.ia64", "2.1AS:openssh-0:3.1p1-21.src", "2.1AS:openssh-askpass-0:3.1p1-21.i386", "2.1AS:openssh-askpass-0:3.1p1-21.ia64", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AS:openssh-clients-0:3.1p1-21.i386", "2.1AS:openssh-clients-0:3.1p1-21.ia64", "2.1AS:openssh-server-0:3.1p1-21.i386", "2.1AS:openssh-server-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.i386", "2.1AW:openssh-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.src", "2.1AW:openssh-askpass-0:3.1p1-21.i386", "2.1AW:openssh-askpass-0:3.1p1-21.ia64", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AW:openssh-clients-0:3.1p1-21.i386", "2.1AW:openssh-clients-0:3.1p1-21.ia64", "2.1AW:openssh-server-0:3.1p1-21.i386", "2.1AW:openssh-server-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.i386", "2.1ES:openssh-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.src", "2.1ES:openssh-askpass-0:3.1p1-21.i386", "2.1ES:openssh-askpass-0:3.1p1-21.ia64", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1ES:openssh-clients-0:3.1p1-21.i386", "2.1ES:openssh-clients-0:3.1p1-21.ia64", "2.1ES:openssh-server-0:3.1p1-21.i386", "2.1ES:openssh-server-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.i386", "2.1WS:openssh-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.src", "2.1WS:openssh-askpass-0:3.1p1-21.i386", "2.1WS:openssh-askpass-0:3.1p1-21.ia64", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1WS:openssh-clients-0:3.1p1-21.i386", "2.1WS:openssh-clients-0:3.1p1-21.ia64", "2.1WS:openssh-server-0:3.1p1-21.i386", "2.1WS:openssh-server-0:3.1p1-21.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0698" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "local to local copy uses shell expansion twice" }, { "cve": "CVE-2006-4924", "discovery_date": "2006-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "207957" } ], "notes": [ { "category": "description", "text": "sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssh DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "2.1AS:openssh-0:3.1p1-21.i386", "2.1AS:openssh-0:3.1p1-21.ia64", "2.1AS:openssh-0:3.1p1-21.src", "2.1AS:openssh-askpass-0:3.1p1-21.i386", "2.1AS:openssh-askpass-0:3.1p1-21.ia64", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AS:openssh-clients-0:3.1p1-21.i386", "2.1AS:openssh-clients-0:3.1p1-21.ia64", "2.1AS:openssh-server-0:3.1p1-21.i386", "2.1AS:openssh-server-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.i386", "2.1AW:openssh-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.src", "2.1AW:openssh-askpass-0:3.1p1-21.i386", "2.1AW:openssh-askpass-0:3.1p1-21.ia64", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AW:openssh-clients-0:3.1p1-21.i386", "2.1AW:openssh-clients-0:3.1p1-21.ia64", "2.1AW:openssh-server-0:3.1p1-21.i386", "2.1AW:openssh-server-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.i386", "2.1ES:openssh-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.src", "2.1ES:openssh-askpass-0:3.1p1-21.i386", "2.1ES:openssh-askpass-0:3.1p1-21.ia64", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1ES:openssh-clients-0:3.1p1-21.i386", "2.1ES:openssh-clients-0:3.1p1-21.ia64", "2.1ES:openssh-server-0:3.1p1-21.i386", "2.1ES:openssh-server-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.i386", "2.1WS:openssh-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.src", "2.1WS:openssh-askpass-0:3.1p1-21.i386", "2.1WS:openssh-askpass-0:3.1p1-21.ia64", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1WS:openssh-clients-0:3.1p1-21.i386", "2.1WS:openssh-clients-0:3.1p1-21.ia64", "2.1WS:openssh-server-0:3.1p1-21.i386", "2.1WS:openssh-server-0:3.1p1-21.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4924" }, { "category": "external", "summary": "RHBZ#207957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=207957" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4924", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4924" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4924", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4924" } ], "release_date": "2006-09-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-29T00:23:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:openssh-0:3.1p1-21.i386", "2.1AS:openssh-0:3.1p1-21.ia64", "2.1AS:openssh-0:3.1p1-21.src", "2.1AS:openssh-askpass-0:3.1p1-21.i386", "2.1AS:openssh-askpass-0:3.1p1-21.ia64", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AS:openssh-clients-0:3.1p1-21.i386", "2.1AS:openssh-clients-0:3.1p1-21.ia64", "2.1AS:openssh-server-0:3.1p1-21.i386", "2.1AS:openssh-server-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.i386", "2.1AW:openssh-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.src", "2.1AW:openssh-askpass-0:3.1p1-21.i386", "2.1AW:openssh-askpass-0:3.1p1-21.ia64", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AW:openssh-clients-0:3.1p1-21.i386", "2.1AW:openssh-clients-0:3.1p1-21.ia64", "2.1AW:openssh-server-0:3.1p1-21.i386", "2.1AW:openssh-server-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.i386", "2.1ES:openssh-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.src", "2.1ES:openssh-askpass-0:3.1p1-21.i386", "2.1ES:openssh-askpass-0:3.1p1-21.ia64", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1ES:openssh-clients-0:3.1p1-21.i386", "2.1ES:openssh-clients-0:3.1p1-21.ia64", "2.1ES:openssh-server-0:3.1p1-21.i386", "2.1ES:openssh-server-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.i386", "2.1WS:openssh-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.src", "2.1WS:openssh-askpass-0:3.1p1-21.i386", "2.1WS:openssh-askpass-0:3.1p1-21.ia64", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1WS:openssh-clients-0:3.1p1-21.i386", "2.1WS:openssh-clients-0:3.1p1-21.ia64", "2.1WS:openssh-server-0:3.1p1-21.i386", "2.1WS:openssh-server-0:3.1p1-21.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0698" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssh DoS" }, { "cve": "CVE-2006-5051", "discovery_date": "2006-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "208347" } ], "notes": [ { "category": "description", "text": "Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.", "title": "Vulnerability description" }, { "category": "summary", "text": "unsafe GSSAPI signal handler", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "2.1AS:openssh-0:3.1p1-21.i386", "2.1AS:openssh-0:3.1p1-21.ia64", "2.1AS:openssh-0:3.1p1-21.src", "2.1AS:openssh-askpass-0:3.1p1-21.i386", "2.1AS:openssh-askpass-0:3.1p1-21.ia64", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AS:openssh-clients-0:3.1p1-21.i386", "2.1AS:openssh-clients-0:3.1p1-21.ia64", "2.1AS:openssh-server-0:3.1p1-21.i386", "2.1AS:openssh-server-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.i386", "2.1AW:openssh-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.src", "2.1AW:openssh-askpass-0:3.1p1-21.i386", "2.1AW:openssh-askpass-0:3.1p1-21.ia64", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AW:openssh-clients-0:3.1p1-21.i386", "2.1AW:openssh-clients-0:3.1p1-21.ia64", "2.1AW:openssh-server-0:3.1p1-21.i386", "2.1AW:openssh-server-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.i386", "2.1ES:openssh-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.src", "2.1ES:openssh-askpass-0:3.1p1-21.i386", "2.1ES:openssh-askpass-0:3.1p1-21.ia64", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1ES:openssh-clients-0:3.1p1-21.i386", "2.1ES:openssh-clients-0:3.1p1-21.ia64", "2.1ES:openssh-server-0:3.1p1-21.i386", "2.1ES:openssh-server-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.i386", "2.1WS:openssh-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.src", "2.1WS:openssh-askpass-0:3.1p1-21.i386", "2.1WS:openssh-askpass-0:3.1p1-21.ia64", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1WS:openssh-clients-0:3.1p1-21.i386", "2.1WS:openssh-clients-0:3.1p1-21.ia64", "2.1WS:openssh-server-0:3.1p1-21.i386", "2.1WS:openssh-server-0:3.1p1-21.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5051" }, { "category": "external", "summary": "RHBZ#208347", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=208347" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5051", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5051" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5051", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5051" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-29T00:23:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:openssh-0:3.1p1-21.i386", "2.1AS:openssh-0:3.1p1-21.ia64", "2.1AS:openssh-0:3.1p1-21.src", "2.1AS:openssh-askpass-0:3.1p1-21.i386", "2.1AS:openssh-askpass-0:3.1p1-21.ia64", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AS:openssh-clients-0:3.1p1-21.i386", "2.1AS:openssh-clients-0:3.1p1-21.ia64", "2.1AS:openssh-server-0:3.1p1-21.i386", "2.1AS:openssh-server-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.i386", "2.1AW:openssh-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.src", "2.1AW:openssh-askpass-0:3.1p1-21.i386", "2.1AW:openssh-askpass-0:3.1p1-21.ia64", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AW:openssh-clients-0:3.1p1-21.i386", "2.1AW:openssh-clients-0:3.1p1-21.ia64", "2.1AW:openssh-server-0:3.1p1-21.i386", "2.1AW:openssh-server-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.i386", "2.1ES:openssh-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.src", "2.1ES:openssh-askpass-0:3.1p1-21.i386", "2.1ES:openssh-askpass-0:3.1p1-21.ia64", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1ES:openssh-clients-0:3.1p1-21.i386", "2.1ES:openssh-clients-0:3.1p1-21.ia64", "2.1ES:openssh-server-0:3.1p1-21.i386", "2.1ES:openssh-server-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.i386", "2.1WS:openssh-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.src", "2.1WS:openssh-askpass-0:3.1p1-21.i386", "2.1WS:openssh-askpass-0:3.1p1-21.ia64", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1WS:openssh-clients-0:3.1p1-21.i386", "2.1WS:openssh-clients-0:3.1p1-21.ia64", "2.1WS:openssh-server-0:3.1p1-21.i386", "2.1WS:openssh-server-0:3.1p1-21.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0698" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "unsafe GSSAPI signal handler" } ] }
rhsa-2006:0698
Vulnerability from csaf_redhat
Published
2006-09-29 00:23
Modified
2025-09-10 13:38
Summary
Red Hat Security Advisory: openssh security update
Notes
Topic
Updated openssh packages that fix several security issues in sshd are now
available for Red Hat Enterprise Linux 2.1.
This update has been rated as having important security impact by the Red Hat
Security Response Team.
Details
OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. This
package includes the core files necessary for both the OpenSSH client and
server.
Mark Dowd discovered a signal handler race condition in the OpenSSH sshd
server. A remote attacker could possibly leverage this flaw to cause a
denial of service (crash). (CVE-2006-5051) The OpenSSH project believes the
likelihood of successful exploitation leading to arbitrary code execution
appears remote. However, the Red Hat Security Response Team have not yet
been able to verify this claim due to lack of upstream vulnerability
information. We are therefore including a fix for this flaw and have rated
it important security severity in the event our continued investigation
finds this issue to be exploitable.
Tavis Ormandy of the Google Security Team discovered a denial of service
bug in the OpenSSH sshd server. A remote attacker can send a specially
crafted SSH-1 request to the server causing sshd to consume a large
quantity of CPU resources. (CVE-2006-4924)
An arbitrary command execution flaw was discovered in the way scp copies
files locally. It is possible for a local attacker to create a file with a
carefully crafted name that could execute arbitrary commands as the user
running scp to copy files locally. (CVE-2006-0225)
The SSH daemon, when restricting host access by numeric IP addresses and
with VerifyReverseMapping disabled, allows remote attackers to bypass
"from=" and "user@host" address restrictions by connecting to a host from a
system whose reverse DNS hostname contains the numeric IP address.
(CVE-2003-0386)
All users of openssh should upgrade to these updated packages, which
contain backported patches that resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssh packages that fix several security issues in sshd are now\navailable for Red Hat Enterprise Linux 2.1.\n\nThis update has been rated as having important security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "OpenSSH is OpenBSD\u0027s SSH (Secure SHell) protocol implementation. This\npackage includes the core files necessary for both the OpenSSH client and\nserver.\n\nMark Dowd discovered a signal handler race condition in the OpenSSH sshd\nserver. A remote attacker could possibly leverage this flaw to cause a\ndenial of service (crash). (CVE-2006-5051) The OpenSSH project believes the\nlikelihood of successful exploitation leading to arbitrary code execution\nappears remote. However, the Red Hat Security Response Team have not yet\nbeen able to verify this claim due to lack of upstream vulnerability\ninformation. We are therefore including a fix for this flaw and have rated\nit important security severity in the event our continued investigation\nfinds this issue to be exploitable.\n\nTavis Ormandy of the Google Security Team discovered a denial of service\nbug in the OpenSSH sshd server. A remote attacker can send a specially\ncrafted SSH-1 request to the server causing sshd to consume a large\nquantity of CPU resources. (CVE-2006-4924)\n\nAn arbitrary command execution flaw was discovered in the way scp copies\nfiles locally. It is possible for a local attacker to create a file with a\ncarefully crafted name that could execute arbitrary commands as the user\nrunning scp to copy files locally. (CVE-2006-0225)\n\nThe SSH daemon, when restricting host access by numeric IP addresses and\nwith VerifyReverseMapping disabled, allows remote attackers to bypass\n\"from=\" and \"user@host\" address restrictions by connecting to a host from a\nsystem whose reverse DNS hostname contains the numeric IP address.\n(CVE-2003-0386)\n\nAll users of openssh should upgrade to these updated packages, which\ncontain backported patches that resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0698", "url": "https://access.redhat.com/errata/RHSA-2006:0698" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#important", "url": "http://www.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "174026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=174026" }, { "category": "external", "summary": "208248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=208248" }, { "category": "external", "summary": "208298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=208298" }, { "category": "external", "summary": "208430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=208430" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0698.json" } ], "title": "Red Hat Security Advisory: openssh security update", "tracking": { "current_release_date": "2025-09-10T13:38:56+00:00", "generator": { "date": "2025-09-10T13:38:56+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2006:0698", "initial_release_date": "2006-09-29T00:23:00+00:00", "revision_history": [ { "date": "2006-09-29T00:23:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-09-28T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:38:56+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssh-server-0:3.1p1-21.ia64", "product": { "name": "openssh-server-0:3.1p1-21.ia64", "product_id": "openssh-server-0:3.1p1-21.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.1p1-21?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.1p1-21.ia64", "product": { "name": "openssh-askpass-0:3.1p1-21.ia64", "product_id": "openssh-askpass-0:3.1p1-21.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.1p1-21?arch=ia64" } } }, { "category": "product_version", "name": "openssh-0:3.1p1-21.ia64", "product": { "name": "openssh-0:3.1p1-21.ia64", "product_id": "openssh-0:3.1p1-21.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.1p1-21?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.1p1-21.ia64", "product": { "name": "openssh-askpass-gnome-0:3.1p1-21.ia64", "product_id": "openssh-askpass-gnome-0:3.1p1-21.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.1p1-21?arch=ia64" } } }, { "category": "product_version", "name": "openssh-clients-0:3.1p1-21.ia64", "product": { "name": "openssh-clients-0:3.1p1-21.ia64", "product_id": "openssh-clients-0:3.1p1-21.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.1p1-21?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.1p1-21.src", "product": { "name": "openssh-0:3.1p1-21.src", "product_id": "openssh-0:3.1p1-21.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.1p1-21?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssh-server-0:3.1p1-21.i386", "product": { "name": "openssh-server-0:3.1p1-21.i386", "product_id": "openssh-server-0:3.1p1-21.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.1p1-21?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.1p1-21.i386", "product": { "name": "openssh-askpass-0:3.1p1-21.i386", "product_id": "openssh-askpass-0:3.1p1-21.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.1p1-21?arch=i386" } } }, { "category": "product_version", "name": "openssh-0:3.1p1-21.i386", "product": { "name": "openssh-0:3.1p1-21.i386", "product_id": "openssh-0:3.1p1-21.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.1p1-21?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.1p1-21.i386", "product": { "name": "openssh-askpass-gnome-0:3.1p1-21.i386", "product_id": "openssh-askpass-gnome-0:3.1p1-21.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.1p1-21?arch=i386" } } }, { "category": "product_version", "name": "openssh-clients-0:3.1p1-21.i386", "product": { "name": "openssh-clients-0:3.1p1-21.i386", "product_id": "openssh-clients-0:3.1p1-21.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.1p1-21?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-0:3.1p1-21.i386" }, "product_reference": "openssh-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-0:3.1p1-21.ia64" }, "product_reference": "openssh-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-0:3.1p1-21.src" }, "product_reference": "openssh-0:3.1p1-21.src", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-askpass-0:3.1p1-21.i386" }, "product_reference": "openssh-askpass-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-askpass-0:3.1p1-21.ia64" }, "product_reference": "openssh-askpass-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386" }, "product_reference": "openssh-askpass-gnome-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-clients-0:3.1p1-21.i386" }, "product_reference": "openssh-clients-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-clients-0:3.1p1-21.ia64" }, "product_reference": "openssh-clients-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-server-0:3.1p1-21.i386" }, "product_reference": "openssh-server-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-server-0:3.1p1-21.ia64" }, "product_reference": "openssh-server-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-0:3.1p1-21.i386" }, "product_reference": "openssh-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-0:3.1p1-21.ia64" }, "product_reference": "openssh-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.src as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-0:3.1p1-21.src" }, "product_reference": "openssh-0:3.1p1-21.src", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.1p1-21.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-askpass-0:3.1p1-21.i386" }, "product_reference": "openssh-askpass-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.1p1-21.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-askpass-0:3.1p1-21.ia64" }, "product_reference": "openssh-askpass-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.1p1-21.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386" }, "product_reference": "openssh-askpass-gnome-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.1p1-21.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.1p1-21.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-clients-0:3.1p1-21.i386" }, "product_reference": "openssh-clients-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.1p1-21.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-clients-0:3.1p1-21.ia64" }, "product_reference": "openssh-clients-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.1p1-21.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-server-0:3.1p1-21.i386" }, "product_reference": "openssh-server-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.1p1-21.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-server-0:3.1p1-21.ia64" }, "product_reference": "openssh-server-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-0:3.1p1-21.i386" }, "product_reference": "openssh-0:3.1p1-21.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-0:3.1p1-21.ia64" }, "product_reference": "openssh-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.src as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-0:3.1p1-21.src" }, "product_reference": "openssh-0:3.1p1-21.src", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-askpass-0:3.1p1-21.i386" }, "product_reference": "openssh-askpass-0:3.1p1-21.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-askpass-0:3.1p1-21.ia64" }, "product_reference": "openssh-askpass-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386" }, "product_reference": "openssh-askpass-gnome-0:3.1p1-21.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-clients-0:3.1p1-21.i386" }, "product_reference": "openssh-clients-0:3.1p1-21.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-clients-0:3.1p1-21.ia64" }, "product_reference": "openssh-clients-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-server-0:3.1p1-21.i386" }, "product_reference": "openssh-server-0:3.1p1-21.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-server-0:3.1p1-21.ia64" }, "product_reference": "openssh-server-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-0:3.1p1-21.i386" }, "product_reference": "openssh-0:3.1p1-21.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-0:3.1p1-21.ia64" }, "product_reference": "openssh-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.src as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-0:3.1p1-21.src" }, "product_reference": "openssh-0:3.1p1-21.src", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-askpass-0:3.1p1-21.i386" }, "product_reference": "openssh-askpass-0:3.1p1-21.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-askpass-0:3.1p1-21.ia64" }, "product_reference": "openssh-askpass-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386" }, "product_reference": "openssh-askpass-gnome-0:3.1p1-21.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-clients-0:3.1p1-21.i386" }, "product_reference": "openssh-clients-0:3.1p1-21.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-clients-0:3.1p1-21.ia64" }, "product_reference": "openssh-clients-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-server-0:3.1p1-21.i386" }, "product_reference": "openssh-server-0:3.1p1-21.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-server-0:3.1p1-21.ia64" }, "product_reference": "openssh-server-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2003-0386", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617024" } ], "notes": [ { "category": "description", "text": "OpenSSH 3.6.1 and earlier, when restricting host access by numeric IP addresses and with VerifyReverseMapping disabled, allows remote attackers to bypass \"from=\" and \"user@host\" address restrictions by connecting to a host from a system whose reverse DNS hostname contains the numeric IP address.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "2.1AS:openssh-0:3.1p1-21.i386", "2.1AS:openssh-0:3.1p1-21.ia64", "2.1AS:openssh-0:3.1p1-21.src", "2.1AS:openssh-askpass-0:3.1p1-21.i386", "2.1AS:openssh-askpass-0:3.1p1-21.ia64", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AS:openssh-clients-0:3.1p1-21.i386", "2.1AS:openssh-clients-0:3.1p1-21.ia64", "2.1AS:openssh-server-0:3.1p1-21.i386", "2.1AS:openssh-server-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.i386", "2.1AW:openssh-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.src", "2.1AW:openssh-askpass-0:3.1p1-21.i386", "2.1AW:openssh-askpass-0:3.1p1-21.ia64", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AW:openssh-clients-0:3.1p1-21.i386", "2.1AW:openssh-clients-0:3.1p1-21.ia64", "2.1AW:openssh-server-0:3.1p1-21.i386", "2.1AW:openssh-server-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.i386", "2.1ES:openssh-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.src", "2.1ES:openssh-askpass-0:3.1p1-21.i386", "2.1ES:openssh-askpass-0:3.1p1-21.ia64", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1ES:openssh-clients-0:3.1p1-21.i386", "2.1ES:openssh-clients-0:3.1p1-21.ia64", "2.1ES:openssh-server-0:3.1p1-21.i386", "2.1ES:openssh-server-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.i386", "2.1WS:openssh-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.src", "2.1WS:openssh-askpass-0:3.1p1-21.i386", "2.1WS:openssh-askpass-0:3.1p1-21.ia64", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1WS:openssh-clients-0:3.1p1-21.i386", "2.1WS:openssh-clients-0:3.1p1-21.ia64", "2.1WS:openssh-server-0:3.1p1-21.i386", "2.1WS:openssh-server-0:3.1p1-21.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0386" }, { "category": "external", "summary": "RHBZ#1617024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617024" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0386", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0386" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0386", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0386" } ], "release_date": "2003-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-29T00:23:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:openssh-0:3.1p1-21.i386", "2.1AS:openssh-0:3.1p1-21.ia64", "2.1AS:openssh-0:3.1p1-21.src", "2.1AS:openssh-askpass-0:3.1p1-21.i386", "2.1AS:openssh-askpass-0:3.1p1-21.ia64", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AS:openssh-clients-0:3.1p1-21.i386", "2.1AS:openssh-clients-0:3.1p1-21.ia64", "2.1AS:openssh-server-0:3.1p1-21.i386", "2.1AS:openssh-server-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.i386", "2.1AW:openssh-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.src", "2.1AW:openssh-askpass-0:3.1p1-21.i386", "2.1AW:openssh-askpass-0:3.1p1-21.ia64", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AW:openssh-clients-0:3.1p1-21.i386", "2.1AW:openssh-clients-0:3.1p1-21.ia64", "2.1AW:openssh-server-0:3.1p1-21.i386", "2.1AW:openssh-server-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.i386", "2.1ES:openssh-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.src", "2.1ES:openssh-askpass-0:3.1p1-21.i386", "2.1ES:openssh-askpass-0:3.1p1-21.ia64", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1ES:openssh-clients-0:3.1p1-21.i386", "2.1ES:openssh-clients-0:3.1p1-21.ia64", "2.1ES:openssh-server-0:3.1p1-21.i386", "2.1ES:openssh-server-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.i386", "2.1WS:openssh-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.src", "2.1WS:openssh-askpass-0:3.1p1-21.i386", "2.1WS:openssh-askpass-0:3.1p1-21.ia64", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1WS:openssh-clients-0:3.1p1-21.i386", "2.1WS:openssh-clients-0:3.1p1-21.ia64", "2.1WS:openssh-server-0:3.1p1-21.i386", "2.1WS:openssh-server-0:3.1p1-21.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0698" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-0225", "discovery_date": "2005-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "168167" } ], "notes": [ { "category": "description", "text": "scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.", "title": "Vulnerability description" }, { "category": "summary", "text": "local to local copy uses shell expansion twice", "title": "Vulnerability summary" }, { "category": "other", "text": "Issue was fixed upstream in version 4.3. The openssh packages in Red Hat Enterprise Linux 5 are based on the fixed upstream version and were not affected by this flaw.", "title": "Statement" } ], "product_status": { "fixed": [ "2.1AS:openssh-0:3.1p1-21.i386", "2.1AS:openssh-0:3.1p1-21.ia64", "2.1AS:openssh-0:3.1p1-21.src", "2.1AS:openssh-askpass-0:3.1p1-21.i386", "2.1AS:openssh-askpass-0:3.1p1-21.ia64", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AS:openssh-clients-0:3.1p1-21.i386", "2.1AS:openssh-clients-0:3.1p1-21.ia64", "2.1AS:openssh-server-0:3.1p1-21.i386", "2.1AS:openssh-server-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.i386", "2.1AW:openssh-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.src", "2.1AW:openssh-askpass-0:3.1p1-21.i386", "2.1AW:openssh-askpass-0:3.1p1-21.ia64", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AW:openssh-clients-0:3.1p1-21.i386", "2.1AW:openssh-clients-0:3.1p1-21.ia64", "2.1AW:openssh-server-0:3.1p1-21.i386", "2.1AW:openssh-server-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.i386", "2.1ES:openssh-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.src", "2.1ES:openssh-askpass-0:3.1p1-21.i386", "2.1ES:openssh-askpass-0:3.1p1-21.ia64", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1ES:openssh-clients-0:3.1p1-21.i386", "2.1ES:openssh-clients-0:3.1p1-21.ia64", "2.1ES:openssh-server-0:3.1p1-21.i386", "2.1ES:openssh-server-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.i386", "2.1WS:openssh-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.src", "2.1WS:openssh-askpass-0:3.1p1-21.i386", "2.1WS:openssh-askpass-0:3.1p1-21.ia64", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1WS:openssh-clients-0:3.1p1-21.i386", "2.1WS:openssh-clients-0:3.1p1-21.ia64", "2.1WS:openssh-server-0:3.1p1-21.i386", "2.1WS:openssh-server-0:3.1p1-21.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-0225" }, { "category": "external", "summary": "RHBZ#168167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-0225", "url": "https://www.cve.org/CVERecord?id=CVE-2006-0225" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0225", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0225" } ], "release_date": "2005-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-29T00:23:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:openssh-0:3.1p1-21.i386", "2.1AS:openssh-0:3.1p1-21.ia64", "2.1AS:openssh-0:3.1p1-21.src", "2.1AS:openssh-askpass-0:3.1p1-21.i386", "2.1AS:openssh-askpass-0:3.1p1-21.ia64", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AS:openssh-clients-0:3.1p1-21.i386", "2.1AS:openssh-clients-0:3.1p1-21.ia64", "2.1AS:openssh-server-0:3.1p1-21.i386", "2.1AS:openssh-server-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.i386", "2.1AW:openssh-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.src", "2.1AW:openssh-askpass-0:3.1p1-21.i386", "2.1AW:openssh-askpass-0:3.1p1-21.ia64", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AW:openssh-clients-0:3.1p1-21.i386", "2.1AW:openssh-clients-0:3.1p1-21.ia64", "2.1AW:openssh-server-0:3.1p1-21.i386", "2.1AW:openssh-server-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.i386", "2.1ES:openssh-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.src", "2.1ES:openssh-askpass-0:3.1p1-21.i386", "2.1ES:openssh-askpass-0:3.1p1-21.ia64", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1ES:openssh-clients-0:3.1p1-21.i386", "2.1ES:openssh-clients-0:3.1p1-21.ia64", "2.1ES:openssh-server-0:3.1p1-21.i386", "2.1ES:openssh-server-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.i386", "2.1WS:openssh-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.src", "2.1WS:openssh-askpass-0:3.1p1-21.i386", "2.1WS:openssh-askpass-0:3.1p1-21.ia64", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1WS:openssh-clients-0:3.1p1-21.i386", "2.1WS:openssh-clients-0:3.1p1-21.ia64", "2.1WS:openssh-server-0:3.1p1-21.i386", "2.1WS:openssh-server-0:3.1p1-21.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0698" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "local to local copy uses shell expansion twice" }, { "cve": "CVE-2006-4924", "discovery_date": "2006-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "207957" } ], "notes": [ { "category": "description", "text": "sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssh DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "2.1AS:openssh-0:3.1p1-21.i386", "2.1AS:openssh-0:3.1p1-21.ia64", "2.1AS:openssh-0:3.1p1-21.src", "2.1AS:openssh-askpass-0:3.1p1-21.i386", "2.1AS:openssh-askpass-0:3.1p1-21.ia64", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AS:openssh-clients-0:3.1p1-21.i386", "2.1AS:openssh-clients-0:3.1p1-21.ia64", "2.1AS:openssh-server-0:3.1p1-21.i386", "2.1AS:openssh-server-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.i386", "2.1AW:openssh-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.src", "2.1AW:openssh-askpass-0:3.1p1-21.i386", "2.1AW:openssh-askpass-0:3.1p1-21.ia64", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AW:openssh-clients-0:3.1p1-21.i386", "2.1AW:openssh-clients-0:3.1p1-21.ia64", "2.1AW:openssh-server-0:3.1p1-21.i386", "2.1AW:openssh-server-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.i386", "2.1ES:openssh-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.src", "2.1ES:openssh-askpass-0:3.1p1-21.i386", "2.1ES:openssh-askpass-0:3.1p1-21.ia64", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1ES:openssh-clients-0:3.1p1-21.i386", "2.1ES:openssh-clients-0:3.1p1-21.ia64", "2.1ES:openssh-server-0:3.1p1-21.i386", "2.1ES:openssh-server-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.i386", "2.1WS:openssh-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.src", "2.1WS:openssh-askpass-0:3.1p1-21.i386", "2.1WS:openssh-askpass-0:3.1p1-21.ia64", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1WS:openssh-clients-0:3.1p1-21.i386", "2.1WS:openssh-clients-0:3.1p1-21.ia64", "2.1WS:openssh-server-0:3.1p1-21.i386", "2.1WS:openssh-server-0:3.1p1-21.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4924" }, { "category": "external", "summary": "RHBZ#207957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=207957" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4924", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4924" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4924", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4924" } ], "release_date": "2006-09-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-29T00:23:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:openssh-0:3.1p1-21.i386", "2.1AS:openssh-0:3.1p1-21.ia64", "2.1AS:openssh-0:3.1p1-21.src", "2.1AS:openssh-askpass-0:3.1p1-21.i386", "2.1AS:openssh-askpass-0:3.1p1-21.ia64", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AS:openssh-clients-0:3.1p1-21.i386", "2.1AS:openssh-clients-0:3.1p1-21.ia64", "2.1AS:openssh-server-0:3.1p1-21.i386", "2.1AS:openssh-server-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.i386", "2.1AW:openssh-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.src", "2.1AW:openssh-askpass-0:3.1p1-21.i386", "2.1AW:openssh-askpass-0:3.1p1-21.ia64", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AW:openssh-clients-0:3.1p1-21.i386", "2.1AW:openssh-clients-0:3.1p1-21.ia64", "2.1AW:openssh-server-0:3.1p1-21.i386", "2.1AW:openssh-server-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.i386", "2.1ES:openssh-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.src", "2.1ES:openssh-askpass-0:3.1p1-21.i386", "2.1ES:openssh-askpass-0:3.1p1-21.ia64", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1ES:openssh-clients-0:3.1p1-21.i386", "2.1ES:openssh-clients-0:3.1p1-21.ia64", "2.1ES:openssh-server-0:3.1p1-21.i386", "2.1ES:openssh-server-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.i386", "2.1WS:openssh-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.src", "2.1WS:openssh-askpass-0:3.1p1-21.i386", "2.1WS:openssh-askpass-0:3.1p1-21.ia64", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1WS:openssh-clients-0:3.1p1-21.i386", "2.1WS:openssh-clients-0:3.1p1-21.ia64", "2.1WS:openssh-server-0:3.1p1-21.i386", "2.1WS:openssh-server-0:3.1p1-21.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0698" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssh DoS" }, { "cve": "CVE-2006-5051", "discovery_date": "2006-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "208347" } ], "notes": [ { "category": "description", "text": "Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.", "title": "Vulnerability description" }, { "category": "summary", "text": "unsafe GSSAPI signal handler", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "2.1AS:openssh-0:3.1p1-21.i386", "2.1AS:openssh-0:3.1p1-21.ia64", "2.1AS:openssh-0:3.1p1-21.src", "2.1AS:openssh-askpass-0:3.1p1-21.i386", "2.1AS:openssh-askpass-0:3.1p1-21.ia64", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AS:openssh-clients-0:3.1p1-21.i386", "2.1AS:openssh-clients-0:3.1p1-21.ia64", "2.1AS:openssh-server-0:3.1p1-21.i386", "2.1AS:openssh-server-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.i386", "2.1AW:openssh-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.src", "2.1AW:openssh-askpass-0:3.1p1-21.i386", "2.1AW:openssh-askpass-0:3.1p1-21.ia64", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AW:openssh-clients-0:3.1p1-21.i386", "2.1AW:openssh-clients-0:3.1p1-21.ia64", "2.1AW:openssh-server-0:3.1p1-21.i386", "2.1AW:openssh-server-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.i386", "2.1ES:openssh-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.src", "2.1ES:openssh-askpass-0:3.1p1-21.i386", "2.1ES:openssh-askpass-0:3.1p1-21.ia64", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1ES:openssh-clients-0:3.1p1-21.i386", "2.1ES:openssh-clients-0:3.1p1-21.ia64", "2.1ES:openssh-server-0:3.1p1-21.i386", "2.1ES:openssh-server-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.i386", "2.1WS:openssh-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.src", "2.1WS:openssh-askpass-0:3.1p1-21.i386", "2.1WS:openssh-askpass-0:3.1p1-21.ia64", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1WS:openssh-clients-0:3.1p1-21.i386", "2.1WS:openssh-clients-0:3.1p1-21.ia64", "2.1WS:openssh-server-0:3.1p1-21.i386", "2.1WS:openssh-server-0:3.1p1-21.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5051" }, { "category": "external", "summary": "RHBZ#208347", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=208347" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5051", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5051" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5051", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5051" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-29T00:23:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:openssh-0:3.1p1-21.i386", "2.1AS:openssh-0:3.1p1-21.ia64", "2.1AS:openssh-0:3.1p1-21.src", "2.1AS:openssh-askpass-0:3.1p1-21.i386", "2.1AS:openssh-askpass-0:3.1p1-21.ia64", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AS:openssh-clients-0:3.1p1-21.i386", "2.1AS:openssh-clients-0:3.1p1-21.ia64", "2.1AS:openssh-server-0:3.1p1-21.i386", "2.1AS:openssh-server-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.i386", "2.1AW:openssh-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.src", "2.1AW:openssh-askpass-0:3.1p1-21.i386", "2.1AW:openssh-askpass-0:3.1p1-21.ia64", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AW:openssh-clients-0:3.1p1-21.i386", "2.1AW:openssh-clients-0:3.1p1-21.ia64", "2.1AW:openssh-server-0:3.1p1-21.i386", "2.1AW:openssh-server-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.i386", "2.1ES:openssh-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.src", "2.1ES:openssh-askpass-0:3.1p1-21.i386", "2.1ES:openssh-askpass-0:3.1p1-21.ia64", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1ES:openssh-clients-0:3.1p1-21.i386", "2.1ES:openssh-clients-0:3.1p1-21.ia64", "2.1ES:openssh-server-0:3.1p1-21.i386", "2.1ES:openssh-server-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.i386", "2.1WS:openssh-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.src", "2.1WS:openssh-askpass-0:3.1p1-21.i386", "2.1WS:openssh-askpass-0:3.1p1-21.ia64", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1WS:openssh-clients-0:3.1p1-21.i386", "2.1WS:openssh-clients-0:3.1p1-21.ia64", "2.1WS:openssh-server-0:3.1p1-21.i386", "2.1WS:openssh-server-0:3.1p1-21.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0698" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "unsafe GSSAPI signal handler" } ] }
rhsa-2006_0298
Vulnerability from csaf_redhat
Published
2006-07-20 13:01
Modified
2024-11-22 00:33
Summary
Red Hat Security Advisory: openssh security update
Notes
Topic
Updated openssh packages that fix bugs in sshd are now available for Red
Hat Enterprise Linux 3.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Details
OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. This
package includes the core files necessary for both the OpenSSH client and
server.
An arbitrary command execution flaw was discovered in the way scp copies
files locally. It is possible for a local attacker to create a file with a
carefully crafted name that could execute arbitrary commands as the user
running scp to copy files locally. (CVE-2006-0225)
The SSH daemon, when restricting host access by numeric IP addresses and
with VerifyReverseMapping disabled, allows remote attackers to bypass
"from=" and "user@host" address restrictions by connecting to a host from a
system whose reverse DNS hostname contains the numeric IP address.
(CVE-2003-0386)
The following issues have also been fixed in this update:
* If the sshd service was stopped using the sshd init script while the
main sshd daemon was not running, the init script would kill other sshd
processes, such as the running sessions. For example, this could happen
when the 'service sshd stop' command was issued twice.
* When privilege separation was enabled, the last login message was printed
only for the root user.
* The sshd daemon was sending messages to the system log from a signal
handler when debug logging was enabled. This could cause a deadlock of
the user's connection.
All users of openssh should upgrade to these updated packages, which
resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssh packages that fix bugs in sshd are now available for Red\nHat Enterprise Linux 3.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "OpenSSH is OpenBSD\u0027s SSH (Secure SHell) protocol implementation. This\npackage includes the core files necessary for both the OpenSSH client and\nserver.\n\nAn arbitrary command execution flaw was discovered in the way scp copies\nfiles locally. It is possible for a local attacker to create a file with a\ncarefully crafted name that could execute arbitrary commands as the user\nrunning scp to copy files locally. (CVE-2006-0225)\n\nThe SSH daemon, when restricting host access by numeric IP addresses and\nwith VerifyReverseMapping disabled, allows remote attackers to bypass\n\"from=\" and \"user@host\" address restrictions by connecting to a host from a\nsystem whose reverse DNS hostname contains the numeric IP address.\n(CVE-2003-0386)\n\nThe following issues have also been fixed in this update:\n\n* If the sshd service was stopped using the sshd init script while the\n main sshd daemon was not running, the init script would kill other sshd\n processes, such as the running sessions. For example, this could happen\n when the \u0027service sshd stop\u0027 command was issued twice.\n\n* When privilege separation was enabled, the last login message was printed\n only for the root user.\n\n* The sshd daemon was sending messages to the system log from a signal\n handler when debug logging was enabled. This could cause a deadlock of\n the user\u0027s connection.\n\nAll users of openssh should upgrade to these updated packages, which\nresolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0298", "url": "https://access.redhat.com/errata/RHSA-2006:0298" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#low", "url": "http://www.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "164661", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164661" }, { "category": "external", "summary": "167886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167886" }, { "category": "external", "summary": "170463", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170463" }, { "category": "external", "summary": "172564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=172564" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0298.json" } ], "title": "Red Hat Security Advisory: openssh security update", "tracking": { "current_release_date": "2024-11-22T00:33:55+00:00", "generator": { "date": "2024-11-22T00:33:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2006:0298", "initial_release_date": "2006-07-20T13:01:00+00:00", "revision_history": [ { "date": "2006-07-20T13:01:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-07-20T08:53:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:33:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:3.6.1p2-33.30.9.ia64", "product": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ia64", "product_id": "openssh-askpass-0:3.6.1p2-33.30.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.9?arch=ia64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "product": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "product_id": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.9?arch=ia64" } } }, { "category": "product_version", "name": "openssh-clients-0:3.6.1p2-33.30.9.ia64", "product": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ia64", "product_id": "openssh-clients-0:3.6.1p2-33.30.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.9?arch=ia64" } } }, { "category": "product_version", "name": "openssh-0:3.6.1p2-33.30.9.ia64", "product": { "name": "openssh-0:3.6.1p2-33.30.9.ia64", "product_id": "openssh-0:3.6.1p2-33.30.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.9?arch=ia64" } } }, { "category": "product_version", "name": "openssh-server-0:3.6.1p2-33.30.9.ia64", "product": { "name": "openssh-server-0:3.6.1p2-33.30.9.ia64", "product_id": "openssh-server-0:3.6.1p2-33.30.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.9?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "product": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.9?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "product": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "product_id": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "product": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "product_id": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-clients-0:3.6.1p2-33.30.9.x86_64", "product": { "name": "openssh-clients-0:3.6.1p2-33.30.9.x86_64", "product_id": "openssh-clients-0:3.6.1p2-33.30.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-0:3.6.1p2-33.30.9.x86_64", "product": { "name": "openssh-0:3.6.1p2-33.30.9.x86_64", "product_id": "openssh-0:3.6.1p2-33.30.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-server-0:3.6.1p2-33.30.9.x86_64", "product": { "name": "openssh-server-0:3.6.1p2-33.30.9.x86_64", "product_id": "openssh-server-0:3.6.1p2-33.30.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "product": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:3.6.1p2-33.30.9.i386", "product": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.i386", "product_id": "openssh-askpass-0:3.6.1p2-33.30.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.9?arch=i386" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "product": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "product_id": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.9?arch=i386" } } }, { "category": "product_version", "name": "openssh-clients-0:3.6.1p2-33.30.9.i386", "product": { "name": "openssh-clients-0:3.6.1p2-33.30.9.i386", "product_id": "openssh-clients-0:3.6.1p2-33.30.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.9?arch=i386" } } }, { "category": "product_version", "name": "openssh-0:3.6.1p2-33.30.9.i386", "product": { "name": "openssh-0:3.6.1p2-33.30.9.i386", "product_id": "openssh-0:3.6.1p2-33.30.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.9?arch=i386" } } }, { "category": "product_version", "name": "openssh-server-0:3.6.1p2-33.30.9.i386", "product": { "name": "openssh-server-0:3.6.1p2-33.30.9.i386", "product_id": "openssh-server-0:3.6.1p2-33.30.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.9?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "product": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.9?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.6.1p2-33.30.9.src", "product": { "name": "openssh-0:3.6.1p2-33.30.9.src", "product_id": "openssh-0:3.6.1p2-33.30.9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:3.6.1p2-33.30.9.ppc", "product": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ppc", "product_id": "openssh-askpass-0:3.6.1p2-33.30.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.9?arch=ppc" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "product": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "product_id": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.9?arch=ppc" } } }, { "category": "product_version", "name": "openssh-clients-0:3.6.1p2-33.30.9.ppc", "product": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ppc", "product_id": "openssh-clients-0:3.6.1p2-33.30.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.9?arch=ppc" } } }, { "category": "product_version", "name": "openssh-0:3.6.1p2-33.30.9.ppc", "product": { "name": "openssh-0:3.6.1p2-33.30.9.ppc", "product_id": "openssh-0:3.6.1p2-33.30.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.9?arch=ppc" } } }, { "category": "product_version", "name": "openssh-server-0:3.6.1p2-33.30.9.ppc", "product": { "name": "openssh-server-0:3.6.1p2-33.30.9.ppc", "product_id": "openssh-server-0:3.6.1p2-33.30.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.9?arch=ppc" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "product": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.9?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390x", "product": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390x", "product_id": "openssh-askpass-0:3.6.1p2-33.30.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "product": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "product_id": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-clients-0:3.6.1p2-33.30.9.s390x", "product": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390x", "product_id": "openssh-clients-0:3.6.1p2-33.30.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-0:3.6.1p2-33.30.9.s390x", "product": { "name": "openssh-0:3.6.1p2-33.30.9.s390x", "product_id": "openssh-0:3.6.1p2-33.30.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-server-0:3.6.1p2-33.30.9.s390x", "product": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390x", "product_id": "openssh-server-0:3.6.1p2-33.30.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "product": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390", "product": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390", "product_id": "openssh-askpass-0:3.6.1p2-33.30.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.9?arch=s390" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "product": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "product_id": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.9?arch=s390" } } }, { "category": "product_version", "name": "openssh-clients-0:3.6.1p2-33.30.9.s390", "product": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390", "product_id": "openssh-clients-0:3.6.1p2-33.30.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.9?arch=s390" } } }, { "category": "product_version", "name": "openssh-0:3.6.1p2-33.30.9.s390", "product": { "name": "openssh-0:3.6.1p2-33.30.9.s390", "product_id": "openssh-0:3.6.1p2-33.30.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.9?arch=s390" } } }, { "category": "product_version", "name": "openssh-server-0:3.6.1p2-33.30.9.s390", "product": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390", "product_id": "openssh-server-0:3.6.1p2-33.30.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.9?arch=s390" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "product": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.9?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-0:3.6.1p2-33.30.9.src" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-server-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-server-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-server-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-server-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-server-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-server-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-0:3.6.1p2-33.30.9.src" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-0:3.6.1p2-33.30.9.src" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-server-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-server-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-server-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-server-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-server-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-server-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-0:3.6.1p2-33.30.9.src" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-server-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-server-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-server-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-server-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-server-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-server-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2003-0386", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617024" } ], "notes": [ { "category": "description", "text": "OpenSSH 3.6.1 and earlier, when restricting host access by numeric IP addresses and with VerifyReverseMapping disabled, allows remote attackers to bypass \"from=\" and \"user@host\" address restrictions by connecting to a host from a system whose reverse DNS hostname contains the numeric IP address.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:openssh-0:3.6.1p2-33.30.9.i386", "3AS:openssh-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-0:3.6.1p2-33.30.9.s390", "3AS:openssh-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-0:3.6.1p2-33.30.9.src", "3AS:openssh-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-clients-0:3.6.1p2-33.30.9.i386", "3AS:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390", "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-server-0:3.6.1p2-33.30.9.i386", "3AS:openssh-server-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-server-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-server-0:3.6.1p2-33.30.9.s390", "3AS:openssh-server-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-0:3.6.1p2-33.30.9.src", "3Desktop:openssh-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-0:3.6.1p2-33.30.9.i386", "3ES:openssh-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-0:3.6.1p2-33.30.9.s390", "3ES:openssh-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-0:3.6.1p2-33.30.9.src", "3ES:openssh-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-clients-0:3.6.1p2-33.30.9.i386", "3ES:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390", "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-server-0:3.6.1p2-33.30.9.i386", "3ES:openssh-server-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-server-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-server-0:3.6.1p2-33.30.9.s390", "3ES:openssh-server-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-0:3.6.1p2-33.30.9.i386", "3WS:openssh-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-0:3.6.1p2-33.30.9.s390", "3WS:openssh-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-0:3.6.1p2-33.30.9.src", "3WS:openssh-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-clients-0:3.6.1p2-33.30.9.i386", "3WS:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390", "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-server-0:3.6.1p2-33.30.9.i386", "3WS:openssh-server-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-server-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-server-0:3.6.1p2-33.30.9.s390", "3WS:openssh-server-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-server-0:3.6.1p2-33.30.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0386" }, { "category": "external", "summary": "RHBZ#1617024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617024" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0386", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0386" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0386", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0386" } ], "release_date": "2003-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-20T13:01:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:openssh-0:3.6.1p2-33.30.9.i386", "3AS:openssh-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-0:3.6.1p2-33.30.9.s390", "3AS:openssh-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-0:3.6.1p2-33.30.9.src", "3AS:openssh-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-clients-0:3.6.1p2-33.30.9.i386", "3AS:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390", "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-server-0:3.6.1p2-33.30.9.i386", "3AS:openssh-server-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-server-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-server-0:3.6.1p2-33.30.9.s390", "3AS:openssh-server-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-0:3.6.1p2-33.30.9.src", "3Desktop:openssh-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-0:3.6.1p2-33.30.9.i386", "3ES:openssh-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-0:3.6.1p2-33.30.9.s390", "3ES:openssh-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-0:3.6.1p2-33.30.9.src", "3ES:openssh-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-clients-0:3.6.1p2-33.30.9.i386", "3ES:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390", "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-server-0:3.6.1p2-33.30.9.i386", "3ES:openssh-server-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-server-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-server-0:3.6.1p2-33.30.9.s390", "3ES:openssh-server-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-0:3.6.1p2-33.30.9.i386", "3WS:openssh-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-0:3.6.1p2-33.30.9.s390", "3WS:openssh-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-0:3.6.1p2-33.30.9.src", "3WS:openssh-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-clients-0:3.6.1p2-33.30.9.i386", "3WS:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390", "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-server-0:3.6.1p2-33.30.9.i386", "3WS:openssh-server-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-server-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-server-0:3.6.1p2-33.30.9.s390", "3WS:openssh-server-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-server-0:3.6.1p2-33.30.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0298" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-0225", "discovery_date": "2005-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "168167" } ], "notes": [ { "category": "description", "text": "scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.", "title": "Vulnerability description" }, { "category": "summary", "text": "local to local copy uses shell expansion twice", "title": "Vulnerability summary" }, { "category": "other", "text": "Issue was fixed upstream in version 4.3. The openssh packages in Red Hat Enterprise Linux 5 are based on the fixed upstream version and were not affected by this flaw.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:openssh-0:3.6.1p2-33.30.9.i386", "3AS:openssh-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-0:3.6.1p2-33.30.9.s390", "3AS:openssh-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-0:3.6.1p2-33.30.9.src", "3AS:openssh-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-clients-0:3.6.1p2-33.30.9.i386", "3AS:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390", "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-server-0:3.6.1p2-33.30.9.i386", "3AS:openssh-server-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-server-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-server-0:3.6.1p2-33.30.9.s390", "3AS:openssh-server-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-0:3.6.1p2-33.30.9.src", "3Desktop:openssh-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-0:3.6.1p2-33.30.9.i386", "3ES:openssh-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-0:3.6.1p2-33.30.9.s390", "3ES:openssh-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-0:3.6.1p2-33.30.9.src", "3ES:openssh-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-clients-0:3.6.1p2-33.30.9.i386", "3ES:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390", "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-server-0:3.6.1p2-33.30.9.i386", "3ES:openssh-server-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-server-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-server-0:3.6.1p2-33.30.9.s390", "3ES:openssh-server-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-0:3.6.1p2-33.30.9.i386", "3WS:openssh-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-0:3.6.1p2-33.30.9.s390", "3WS:openssh-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-0:3.6.1p2-33.30.9.src", "3WS:openssh-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-clients-0:3.6.1p2-33.30.9.i386", "3WS:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390", "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-server-0:3.6.1p2-33.30.9.i386", "3WS:openssh-server-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-server-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-server-0:3.6.1p2-33.30.9.s390", "3WS:openssh-server-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-server-0:3.6.1p2-33.30.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-0225" }, { "category": "external", "summary": "RHBZ#168167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-0225", "url": "https://www.cve.org/CVERecord?id=CVE-2006-0225" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0225", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0225" } ], "release_date": "2005-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-20T13:01:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:openssh-0:3.6.1p2-33.30.9.i386", "3AS:openssh-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-0:3.6.1p2-33.30.9.s390", "3AS:openssh-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-0:3.6.1p2-33.30.9.src", "3AS:openssh-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-clients-0:3.6.1p2-33.30.9.i386", "3AS:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390", "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-server-0:3.6.1p2-33.30.9.i386", "3AS:openssh-server-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-server-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-server-0:3.6.1p2-33.30.9.s390", "3AS:openssh-server-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-0:3.6.1p2-33.30.9.src", "3Desktop:openssh-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-0:3.6.1p2-33.30.9.i386", "3ES:openssh-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-0:3.6.1p2-33.30.9.s390", "3ES:openssh-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-0:3.6.1p2-33.30.9.src", "3ES:openssh-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-clients-0:3.6.1p2-33.30.9.i386", "3ES:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390", "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-server-0:3.6.1p2-33.30.9.i386", "3ES:openssh-server-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-server-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-server-0:3.6.1p2-33.30.9.s390", "3ES:openssh-server-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-0:3.6.1p2-33.30.9.i386", "3WS:openssh-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-0:3.6.1p2-33.30.9.s390", "3WS:openssh-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-0:3.6.1p2-33.30.9.src", "3WS:openssh-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-clients-0:3.6.1p2-33.30.9.i386", "3WS:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390", "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-server-0:3.6.1p2-33.30.9.i386", "3WS:openssh-server-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-server-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-server-0:3.6.1p2-33.30.9.s390", "3WS:openssh-server-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-server-0:3.6.1p2-33.30.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0298" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "local to local copy uses shell expansion twice" } ] }
RHSA-2006:0298
Vulnerability from csaf_redhat
Published
2006-07-20 13:01
Modified
2025-09-10 13:38
Summary
Red Hat Security Advisory: openssh security update
Notes
Topic
Updated openssh packages that fix bugs in sshd are now available for Red
Hat Enterprise Linux 3.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Details
OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. This
package includes the core files necessary for both the OpenSSH client and
server.
An arbitrary command execution flaw was discovered in the way scp copies
files locally. It is possible for a local attacker to create a file with a
carefully crafted name that could execute arbitrary commands as the user
running scp to copy files locally. (CVE-2006-0225)
The SSH daemon, when restricting host access by numeric IP addresses and
with VerifyReverseMapping disabled, allows remote attackers to bypass
"from=" and "user@host" address restrictions by connecting to a host from a
system whose reverse DNS hostname contains the numeric IP address.
(CVE-2003-0386)
The following issues have also been fixed in this update:
* If the sshd service was stopped using the sshd init script while the
main sshd daemon was not running, the init script would kill other sshd
processes, such as the running sessions. For example, this could happen
when the 'service sshd stop' command was issued twice.
* When privilege separation was enabled, the last login message was printed
only for the root user.
* The sshd daemon was sending messages to the system log from a signal
handler when debug logging was enabled. This could cause a deadlock of
the user's connection.
All users of openssh should upgrade to these updated packages, which
resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssh packages that fix bugs in sshd are now available for Red\nHat Enterprise Linux 3.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "OpenSSH is OpenBSD\u0027s SSH (Secure SHell) protocol implementation. This\npackage includes the core files necessary for both the OpenSSH client and\nserver.\n\nAn arbitrary command execution flaw was discovered in the way scp copies\nfiles locally. It is possible for a local attacker to create a file with a\ncarefully crafted name that could execute arbitrary commands as the user\nrunning scp to copy files locally. (CVE-2006-0225)\n\nThe SSH daemon, when restricting host access by numeric IP addresses and\nwith VerifyReverseMapping disabled, allows remote attackers to bypass\n\"from=\" and \"user@host\" address restrictions by connecting to a host from a\nsystem whose reverse DNS hostname contains the numeric IP address.\n(CVE-2003-0386)\n\nThe following issues have also been fixed in this update:\n\n* If the sshd service was stopped using the sshd init script while the\n main sshd daemon was not running, the init script would kill other sshd\n processes, such as the running sessions. For example, this could happen\n when the \u0027service sshd stop\u0027 command was issued twice.\n\n* When privilege separation was enabled, the last login message was printed\n only for the root user.\n\n* The sshd daemon was sending messages to the system log from a signal\n handler when debug logging was enabled. This could cause a deadlock of\n the user\u0027s connection.\n\nAll users of openssh should upgrade to these updated packages, which\nresolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0298", "url": "https://access.redhat.com/errata/RHSA-2006:0298" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#low", "url": "http://www.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "164661", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164661" }, { "category": "external", "summary": "167886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167886" }, { "category": "external", "summary": "170463", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170463" }, { "category": "external", "summary": "172564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=172564" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0298.json" } ], "title": "Red Hat Security Advisory: openssh security update", "tracking": { "current_release_date": "2025-09-10T13:38:23+00:00", "generator": { "date": "2025-09-10T13:38:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2006:0298", "initial_release_date": "2006-07-20T13:01:00+00:00", "revision_history": [ { "date": "2006-07-20T13:01:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-07-20T08:53:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:38:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:3.6.1p2-33.30.9.ia64", "product": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ia64", "product_id": "openssh-askpass-0:3.6.1p2-33.30.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.9?arch=ia64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "product": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "product_id": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.9?arch=ia64" } } }, { "category": "product_version", "name": "openssh-clients-0:3.6.1p2-33.30.9.ia64", "product": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ia64", "product_id": "openssh-clients-0:3.6.1p2-33.30.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.9?arch=ia64" } } }, { "category": "product_version", "name": "openssh-0:3.6.1p2-33.30.9.ia64", "product": { "name": "openssh-0:3.6.1p2-33.30.9.ia64", "product_id": "openssh-0:3.6.1p2-33.30.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.9?arch=ia64" } } }, { "category": "product_version", "name": "openssh-server-0:3.6.1p2-33.30.9.ia64", "product": { "name": "openssh-server-0:3.6.1p2-33.30.9.ia64", "product_id": "openssh-server-0:3.6.1p2-33.30.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.9?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "product": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.9?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "product": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "product_id": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "product": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "product_id": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-clients-0:3.6.1p2-33.30.9.x86_64", "product": { "name": "openssh-clients-0:3.6.1p2-33.30.9.x86_64", "product_id": "openssh-clients-0:3.6.1p2-33.30.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-0:3.6.1p2-33.30.9.x86_64", "product": { "name": "openssh-0:3.6.1p2-33.30.9.x86_64", "product_id": "openssh-0:3.6.1p2-33.30.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-server-0:3.6.1p2-33.30.9.x86_64", "product": { "name": "openssh-server-0:3.6.1p2-33.30.9.x86_64", "product_id": "openssh-server-0:3.6.1p2-33.30.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "product": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:3.6.1p2-33.30.9.i386", "product": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.i386", "product_id": "openssh-askpass-0:3.6.1p2-33.30.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.9?arch=i386" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "product": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "product_id": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.9?arch=i386" } } }, { "category": "product_version", "name": "openssh-clients-0:3.6.1p2-33.30.9.i386", "product": { "name": "openssh-clients-0:3.6.1p2-33.30.9.i386", "product_id": "openssh-clients-0:3.6.1p2-33.30.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.9?arch=i386" } } }, { "category": "product_version", "name": "openssh-0:3.6.1p2-33.30.9.i386", "product": { "name": "openssh-0:3.6.1p2-33.30.9.i386", "product_id": "openssh-0:3.6.1p2-33.30.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.9?arch=i386" } } }, { "category": "product_version", "name": "openssh-server-0:3.6.1p2-33.30.9.i386", "product": { "name": "openssh-server-0:3.6.1p2-33.30.9.i386", "product_id": "openssh-server-0:3.6.1p2-33.30.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.9?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "product": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.9?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.6.1p2-33.30.9.src", "product": { "name": "openssh-0:3.6.1p2-33.30.9.src", "product_id": "openssh-0:3.6.1p2-33.30.9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:3.6.1p2-33.30.9.ppc", "product": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ppc", "product_id": "openssh-askpass-0:3.6.1p2-33.30.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.9?arch=ppc" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "product": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "product_id": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.9?arch=ppc" } } }, { "category": "product_version", "name": "openssh-clients-0:3.6.1p2-33.30.9.ppc", "product": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ppc", "product_id": "openssh-clients-0:3.6.1p2-33.30.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.9?arch=ppc" } } }, { "category": "product_version", "name": "openssh-0:3.6.1p2-33.30.9.ppc", "product": { "name": "openssh-0:3.6.1p2-33.30.9.ppc", "product_id": "openssh-0:3.6.1p2-33.30.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.9?arch=ppc" } } }, { "category": "product_version", "name": "openssh-server-0:3.6.1p2-33.30.9.ppc", "product": { "name": "openssh-server-0:3.6.1p2-33.30.9.ppc", "product_id": "openssh-server-0:3.6.1p2-33.30.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.9?arch=ppc" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "product": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.9?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390x", "product": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390x", "product_id": "openssh-askpass-0:3.6.1p2-33.30.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "product": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "product_id": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-clients-0:3.6.1p2-33.30.9.s390x", "product": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390x", "product_id": "openssh-clients-0:3.6.1p2-33.30.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-0:3.6.1p2-33.30.9.s390x", "product": { "name": "openssh-0:3.6.1p2-33.30.9.s390x", "product_id": "openssh-0:3.6.1p2-33.30.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-server-0:3.6.1p2-33.30.9.s390x", "product": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390x", "product_id": "openssh-server-0:3.6.1p2-33.30.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "product": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390", "product": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390", "product_id": "openssh-askpass-0:3.6.1p2-33.30.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.9?arch=s390" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "product": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "product_id": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.9?arch=s390" } } }, { "category": "product_version", "name": "openssh-clients-0:3.6.1p2-33.30.9.s390", "product": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390", "product_id": "openssh-clients-0:3.6.1p2-33.30.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.9?arch=s390" } } }, { "category": "product_version", "name": "openssh-0:3.6.1p2-33.30.9.s390", "product": { "name": "openssh-0:3.6.1p2-33.30.9.s390", "product_id": "openssh-0:3.6.1p2-33.30.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.9?arch=s390" } } }, { "category": "product_version", "name": "openssh-server-0:3.6.1p2-33.30.9.s390", "product": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390", "product_id": "openssh-server-0:3.6.1p2-33.30.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.9?arch=s390" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "product": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.9?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-0:3.6.1p2-33.30.9.src" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-server-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-server-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-server-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-server-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-server-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-server-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-0:3.6.1p2-33.30.9.src" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-0:3.6.1p2-33.30.9.src" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-server-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-server-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-server-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-server-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-server-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-server-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-0:3.6.1p2-33.30.9.src" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-server-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-server-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-server-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-server-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-server-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-server-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2003-0386", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617024" } ], "notes": [ { "category": "description", "text": "OpenSSH 3.6.1 and earlier, when restricting host access by numeric IP addresses and with VerifyReverseMapping disabled, allows remote attackers to bypass \"from=\" and \"user@host\" address restrictions by connecting to a host from a system whose reverse DNS hostname contains the numeric IP address.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:openssh-0:3.6.1p2-33.30.9.i386", "3AS:openssh-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-0:3.6.1p2-33.30.9.s390", "3AS:openssh-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-0:3.6.1p2-33.30.9.src", "3AS:openssh-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-clients-0:3.6.1p2-33.30.9.i386", "3AS:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390", "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-server-0:3.6.1p2-33.30.9.i386", "3AS:openssh-server-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-server-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-server-0:3.6.1p2-33.30.9.s390", "3AS:openssh-server-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-0:3.6.1p2-33.30.9.src", "3Desktop:openssh-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-0:3.6.1p2-33.30.9.i386", "3ES:openssh-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-0:3.6.1p2-33.30.9.s390", "3ES:openssh-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-0:3.6.1p2-33.30.9.src", "3ES:openssh-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-clients-0:3.6.1p2-33.30.9.i386", "3ES:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390", "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-server-0:3.6.1p2-33.30.9.i386", "3ES:openssh-server-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-server-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-server-0:3.6.1p2-33.30.9.s390", "3ES:openssh-server-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-0:3.6.1p2-33.30.9.i386", "3WS:openssh-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-0:3.6.1p2-33.30.9.s390", "3WS:openssh-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-0:3.6.1p2-33.30.9.src", "3WS:openssh-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-clients-0:3.6.1p2-33.30.9.i386", "3WS:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390", "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-server-0:3.6.1p2-33.30.9.i386", "3WS:openssh-server-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-server-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-server-0:3.6.1p2-33.30.9.s390", "3WS:openssh-server-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-server-0:3.6.1p2-33.30.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0386" }, { "category": "external", "summary": "RHBZ#1617024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617024" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0386", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0386" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0386", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0386" } ], "release_date": "2003-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-20T13:01:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:openssh-0:3.6.1p2-33.30.9.i386", "3AS:openssh-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-0:3.6.1p2-33.30.9.s390", "3AS:openssh-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-0:3.6.1p2-33.30.9.src", "3AS:openssh-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-clients-0:3.6.1p2-33.30.9.i386", "3AS:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390", "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-server-0:3.6.1p2-33.30.9.i386", "3AS:openssh-server-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-server-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-server-0:3.6.1p2-33.30.9.s390", "3AS:openssh-server-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-0:3.6.1p2-33.30.9.src", "3Desktop:openssh-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-0:3.6.1p2-33.30.9.i386", "3ES:openssh-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-0:3.6.1p2-33.30.9.s390", "3ES:openssh-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-0:3.6.1p2-33.30.9.src", "3ES:openssh-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-clients-0:3.6.1p2-33.30.9.i386", "3ES:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390", "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-server-0:3.6.1p2-33.30.9.i386", "3ES:openssh-server-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-server-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-server-0:3.6.1p2-33.30.9.s390", "3ES:openssh-server-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-0:3.6.1p2-33.30.9.i386", "3WS:openssh-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-0:3.6.1p2-33.30.9.s390", "3WS:openssh-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-0:3.6.1p2-33.30.9.src", "3WS:openssh-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-clients-0:3.6.1p2-33.30.9.i386", "3WS:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390", "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-server-0:3.6.1p2-33.30.9.i386", "3WS:openssh-server-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-server-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-server-0:3.6.1p2-33.30.9.s390", "3WS:openssh-server-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-server-0:3.6.1p2-33.30.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0298" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-0225", "discovery_date": "2005-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "168167" } ], "notes": [ { "category": "description", "text": "scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.", "title": "Vulnerability description" }, { "category": "summary", "text": "local to local copy uses shell expansion twice", "title": "Vulnerability summary" }, { "category": "other", "text": "Issue was fixed upstream in version 4.3. The openssh packages in Red Hat Enterprise Linux 5 are based on the fixed upstream version and were not affected by this flaw.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:openssh-0:3.6.1p2-33.30.9.i386", "3AS:openssh-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-0:3.6.1p2-33.30.9.s390", "3AS:openssh-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-0:3.6.1p2-33.30.9.src", "3AS:openssh-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-clients-0:3.6.1p2-33.30.9.i386", "3AS:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390", "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-server-0:3.6.1p2-33.30.9.i386", "3AS:openssh-server-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-server-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-server-0:3.6.1p2-33.30.9.s390", "3AS:openssh-server-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-0:3.6.1p2-33.30.9.src", "3Desktop:openssh-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-0:3.6.1p2-33.30.9.i386", "3ES:openssh-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-0:3.6.1p2-33.30.9.s390", "3ES:openssh-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-0:3.6.1p2-33.30.9.src", "3ES:openssh-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-clients-0:3.6.1p2-33.30.9.i386", "3ES:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390", "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-server-0:3.6.1p2-33.30.9.i386", "3ES:openssh-server-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-server-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-server-0:3.6.1p2-33.30.9.s390", "3ES:openssh-server-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-0:3.6.1p2-33.30.9.i386", "3WS:openssh-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-0:3.6.1p2-33.30.9.s390", "3WS:openssh-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-0:3.6.1p2-33.30.9.src", "3WS:openssh-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-clients-0:3.6.1p2-33.30.9.i386", "3WS:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390", "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-server-0:3.6.1p2-33.30.9.i386", "3WS:openssh-server-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-server-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-server-0:3.6.1p2-33.30.9.s390", "3WS:openssh-server-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-server-0:3.6.1p2-33.30.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-0225" }, { "category": "external", "summary": "RHBZ#168167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-0225", "url": "https://www.cve.org/CVERecord?id=CVE-2006-0225" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0225", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0225" } ], "release_date": "2005-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-20T13:01:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:openssh-0:3.6.1p2-33.30.9.i386", "3AS:openssh-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-0:3.6.1p2-33.30.9.s390", "3AS:openssh-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-0:3.6.1p2-33.30.9.src", "3AS:openssh-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-clients-0:3.6.1p2-33.30.9.i386", "3AS:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390", "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-server-0:3.6.1p2-33.30.9.i386", "3AS:openssh-server-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-server-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-server-0:3.6.1p2-33.30.9.s390", "3AS:openssh-server-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-0:3.6.1p2-33.30.9.src", "3Desktop:openssh-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-0:3.6.1p2-33.30.9.i386", "3ES:openssh-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-0:3.6.1p2-33.30.9.s390", "3ES:openssh-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-0:3.6.1p2-33.30.9.src", "3ES:openssh-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-clients-0:3.6.1p2-33.30.9.i386", "3ES:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390", "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-server-0:3.6.1p2-33.30.9.i386", "3ES:openssh-server-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-server-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-server-0:3.6.1p2-33.30.9.s390", "3ES:openssh-server-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-0:3.6.1p2-33.30.9.i386", "3WS:openssh-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-0:3.6.1p2-33.30.9.s390", "3WS:openssh-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-0:3.6.1p2-33.30.9.src", "3WS:openssh-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-clients-0:3.6.1p2-33.30.9.i386", "3WS:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390", "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-server-0:3.6.1p2-33.30.9.i386", "3WS:openssh-server-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-server-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-server-0:3.6.1p2-33.30.9.s390", "3WS:openssh-server-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-server-0:3.6.1p2-33.30.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0298" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "local to local copy uses shell expansion twice" } ] }
rhsa-2006_0044
Vulnerability from csaf_redhat
Published
2006-03-07 15:15
Modified
2024-11-22 00:33
Summary
Red Hat Security Advisory: openssh security update
Notes
Topic
Updated openssh packages that fix bugs in sshd and add auditing of user
logins are now available for Red Hat Enterprise Linux 4.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Details
OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. This
package includes the core files necessary for both the OpenSSH client and
server.
An arbitrary command execution flaw was discovered in the way scp copies
files locally. It is possible for a local attacker to create a file with a
carefully crafted name that could execute arbitrary commands as the user
running scp to copy files locally. The Common Vulnerabilities and Exposures
project (cve.mitre.org) assigned the name CVE-2006-0225 to this issue.
The following issue has also been fixed in this update:
* If the sshd service was stopped using the sshd init script while the
main sshd daemon was not running, the init script would kill other sshd
processes, such as the running sessions. For example, this could happen
when the 'service sshd stop' command was issued twice.
Additionally, this update implements auditing of user logins through the
system audit service.
All users of openssh should upgrade to these updated packages, which
resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssh packages that fix bugs in sshd and add auditing of user\nlogins are now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "OpenSSH is OpenBSD\u0027s SSH (Secure SHell) protocol implementation. This\npackage includes the core files necessary for both the OpenSSH client and\nserver.\n\nAn arbitrary command execution flaw was discovered in the way scp copies\nfiles locally. It is possible for a local attacker to create a file with a\ncarefully crafted name that could execute arbitrary commands as the user\nrunning scp to copy files locally. The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) assigned the name CVE-2006-0225 to this issue. \n\nThe following issue has also been fixed in this update:\n\n* If the sshd service was stopped using the sshd init script while the\n main sshd daemon was not running, the init script would kill other sshd\n processes, such as the running sessions. For example, this could happen\n when the \u0027service sshd stop\u0027 command was issued twice.\n\nAdditionally, this update implements auditing of user logins through the\nsystem audit service.\n\nAll users of openssh should upgrade to these updated packages, which\nresolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0044", "url": "https://access.redhat.com/errata/RHSA-2006:0044" }, { "category": "external", "summary": "170466", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170466" }, { "category": "external", "summary": "170468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170468" }, { "category": "external", "summary": "170568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170568" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0044.json" } ], "title": "Red Hat Security Advisory: openssh security update", "tracking": { "current_release_date": "2024-11-22T00:33:50+00:00", "generator": { "date": "2024-11-22T00:33:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2006:0044", "initial_release_date": "2006-03-07T15:15:00+00:00", "revision_history": [ { "date": "2006-03-07T15:15:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-03-07T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:33:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.9p1-8.RHEL4.12.ia64", "product": { "name": "openssh-0:3.9p1-8.RHEL4.12.ia64", "product_id": "openssh-0:3.9p1-8.RHEL4.12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-8.RHEL4.12?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "product": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "product_id": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-8.RHEL4.12?arch=ia64" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-8.RHEL4.12.ia64", "product": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ia64", "product_id": "openssh-server-0:3.9p1-8.RHEL4.12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-8.RHEL4.12?arch=ia64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "product": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "product_id": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-8.RHEL4.12?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "product": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "product_id": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-8.RHEL4.12?arch=ia64" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "product": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "product_id": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-8.RHEL4.12?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.9p1-8.RHEL4.12.src", "product": { "name": "openssh-0:3.9p1-8.RHEL4.12.src", "product_id": "openssh-0:3.9p1-8.RHEL4.12.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-8.RHEL4.12?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.9p1-8.RHEL4.12.x86_64", "product": { "name": "openssh-0:3.9p1-8.RHEL4.12.x86_64", "product_id": "openssh-0:3.9p1-8.RHEL4.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-8.RHEL4.12?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "product": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "product_id": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-8.RHEL4.12?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "product": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "product_id": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-8.RHEL4.12?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "product": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "product_id": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-8.RHEL4.12?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "product": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "product_id": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-8.RHEL4.12?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "product": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "product_id": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-8.RHEL4.12?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.9p1-8.RHEL4.12.i386", "product": { "name": "openssh-0:3.9p1-8.RHEL4.12.i386", "product_id": "openssh-0:3.9p1-8.RHEL4.12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-8.RHEL4.12?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "product": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "product_id": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-8.RHEL4.12?arch=i386" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-8.RHEL4.12.i386", "product": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.i386", "product_id": "openssh-server-0:3.9p1-8.RHEL4.12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-8.RHEL4.12?arch=i386" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "product": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "product_id": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-8.RHEL4.12?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "product": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "product_id": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-8.RHEL4.12?arch=i386" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-8.RHEL4.12.i386", "product": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.i386", "product_id": "openssh-clients-0:3.9p1-8.RHEL4.12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-8.RHEL4.12?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.9p1-8.RHEL4.12.ppc", "product": { "name": "openssh-0:3.9p1-8.RHEL4.12.ppc", "product_id": "openssh-0:3.9p1-8.RHEL4.12.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-8.RHEL4.12?arch=ppc" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "product": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "product_id": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-8.RHEL4.12?arch=ppc" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-8.RHEL4.12.ppc", "product": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ppc", "product_id": "openssh-server-0:3.9p1-8.RHEL4.12.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-8.RHEL4.12?arch=ppc" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "product": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "product_id": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-8.RHEL4.12?arch=ppc" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "product": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "product_id": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-8.RHEL4.12?arch=ppc" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "product": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "product_id": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-8.RHEL4.12?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.9p1-8.RHEL4.12.s390x", "product": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390x", "product_id": "openssh-0:3.9p1-8.RHEL4.12.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-8.RHEL4.12?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "product": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "product_id": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-8.RHEL4.12?arch=s390x" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390x", "product": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390x", "product_id": "openssh-server-0:3.9p1-8.RHEL4.12.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-8.RHEL4.12?arch=s390x" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "product": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "product_id": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-8.RHEL4.12?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "product": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "product_id": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-8.RHEL4.12?arch=s390x" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "product": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "product_id": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-8.RHEL4.12?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.9p1-8.RHEL4.12.s390", "product": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390", "product_id": "openssh-0:3.9p1-8.RHEL4.12.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-8.RHEL4.12?arch=s390" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "product": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "product_id": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-8.RHEL4.12?arch=s390" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390", "product": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390", "product_id": "openssh-server-0:3.9p1-8.RHEL4.12.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-8.RHEL4.12?arch=s390" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "product": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "product_id": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-8.RHEL4.12?arch=s390" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "product": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "product_id": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-8.RHEL4.12?arch=s390" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390", "product": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390", "product_id": "openssh-clients-0:3.9p1-8.RHEL4.12.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-8.RHEL4.12?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-8.RHEL4.12.src" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-8.RHEL4.12.src" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-8.RHEL4.12.src" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-8.RHEL4.12.src" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-0225", "discovery_date": "2005-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "168167" } ], "notes": [ { "category": "description", "text": "scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.", "title": "Vulnerability description" }, { "category": "summary", "text": "local to local copy uses shell expansion twice", "title": "Vulnerability summary" }, { "category": "other", "text": "Issue was fixed upstream in version 4.3. The openssh packages in Red Hat Enterprise Linux 5 are based on the fixed upstream version and were not affected by this flaw.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS:openssh-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-0:3.9p1-8.RHEL4.12.src", "4AS:openssh-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.src", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-0:3.9p1-8.RHEL4.12.src", "4ES:openssh-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-0:3.9p1-8.RHEL4.12.src", "4WS:openssh-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-0225" }, { "category": "external", "summary": "RHBZ#168167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-0225", "url": "https://www.cve.org/CVERecord?id=CVE-2006-0225" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0225", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0225" } ], "release_date": "2005-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-03-07T15:15:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:openssh-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-0:3.9p1-8.RHEL4.12.src", "4AS:openssh-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.src", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-0:3.9p1-8.RHEL4.12.src", "4ES:openssh-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-0:3.9p1-8.RHEL4.12.src", "4WS:openssh-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0044" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "local to local copy uses shell expansion twice" } ] }
rhsa-2006_0698
Vulnerability from csaf_redhat
Published
2006-09-29 00:23
Modified
2024-11-22 00:34
Summary
Red Hat Security Advisory: openssh security update
Notes
Topic
Updated openssh packages that fix several security issues in sshd are now
available for Red Hat Enterprise Linux 2.1.
This update has been rated as having important security impact by the Red Hat
Security Response Team.
Details
OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. This
package includes the core files necessary for both the OpenSSH client and
server.
Mark Dowd discovered a signal handler race condition in the OpenSSH sshd
server. A remote attacker could possibly leverage this flaw to cause a
denial of service (crash). (CVE-2006-5051) The OpenSSH project believes the
likelihood of successful exploitation leading to arbitrary code execution
appears remote. However, the Red Hat Security Response Team have not yet
been able to verify this claim due to lack of upstream vulnerability
information. We are therefore including a fix for this flaw and have rated
it important security severity in the event our continued investigation
finds this issue to be exploitable.
Tavis Ormandy of the Google Security Team discovered a denial of service
bug in the OpenSSH sshd server. A remote attacker can send a specially
crafted SSH-1 request to the server causing sshd to consume a large
quantity of CPU resources. (CVE-2006-4924)
An arbitrary command execution flaw was discovered in the way scp copies
files locally. It is possible for a local attacker to create a file with a
carefully crafted name that could execute arbitrary commands as the user
running scp to copy files locally. (CVE-2006-0225)
The SSH daemon, when restricting host access by numeric IP addresses and
with VerifyReverseMapping disabled, allows remote attackers to bypass
"from=" and "user@host" address restrictions by connecting to a host from a
system whose reverse DNS hostname contains the numeric IP address.
(CVE-2003-0386)
All users of openssh should upgrade to these updated packages, which
contain backported patches that resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssh packages that fix several security issues in sshd are now\navailable for Red Hat Enterprise Linux 2.1.\n\nThis update has been rated as having important security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "OpenSSH is OpenBSD\u0027s SSH (Secure SHell) protocol implementation. This\npackage includes the core files necessary for both the OpenSSH client and\nserver.\n\nMark Dowd discovered a signal handler race condition in the OpenSSH sshd\nserver. A remote attacker could possibly leverage this flaw to cause a\ndenial of service (crash). (CVE-2006-5051) The OpenSSH project believes the\nlikelihood of successful exploitation leading to arbitrary code execution\nappears remote. However, the Red Hat Security Response Team have not yet\nbeen able to verify this claim due to lack of upstream vulnerability\ninformation. We are therefore including a fix for this flaw and have rated\nit important security severity in the event our continued investigation\nfinds this issue to be exploitable.\n\nTavis Ormandy of the Google Security Team discovered a denial of service\nbug in the OpenSSH sshd server. A remote attacker can send a specially\ncrafted SSH-1 request to the server causing sshd to consume a large\nquantity of CPU resources. (CVE-2006-4924)\n\nAn arbitrary command execution flaw was discovered in the way scp copies\nfiles locally. It is possible for a local attacker to create a file with a\ncarefully crafted name that could execute arbitrary commands as the user\nrunning scp to copy files locally. (CVE-2006-0225)\n\nThe SSH daemon, when restricting host access by numeric IP addresses and\nwith VerifyReverseMapping disabled, allows remote attackers to bypass\n\"from=\" and \"user@host\" address restrictions by connecting to a host from a\nsystem whose reverse DNS hostname contains the numeric IP address.\n(CVE-2003-0386)\n\nAll users of openssh should upgrade to these updated packages, which\ncontain backported patches that resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0698", "url": "https://access.redhat.com/errata/RHSA-2006:0698" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#important", "url": "http://www.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "174026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=174026" }, { "category": "external", "summary": "208248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=208248" }, { "category": "external", "summary": "208298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=208298" }, { "category": "external", "summary": "208430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=208430" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0698.json" } ], "title": "Red Hat Security Advisory: openssh security update", "tracking": { "current_release_date": "2024-11-22T00:34:06+00:00", "generator": { "date": "2024-11-22T00:34:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2006:0698", "initial_release_date": "2006-09-29T00:23:00+00:00", "revision_history": [ { "date": "2006-09-29T00:23:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-09-28T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:34:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssh-server-0:3.1p1-21.ia64", "product": { "name": "openssh-server-0:3.1p1-21.ia64", "product_id": "openssh-server-0:3.1p1-21.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.1p1-21?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.1p1-21.ia64", "product": { "name": "openssh-askpass-0:3.1p1-21.ia64", "product_id": "openssh-askpass-0:3.1p1-21.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.1p1-21?arch=ia64" } } }, { "category": "product_version", "name": "openssh-0:3.1p1-21.ia64", "product": { "name": "openssh-0:3.1p1-21.ia64", "product_id": "openssh-0:3.1p1-21.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.1p1-21?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.1p1-21.ia64", "product": { "name": "openssh-askpass-gnome-0:3.1p1-21.ia64", "product_id": "openssh-askpass-gnome-0:3.1p1-21.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.1p1-21?arch=ia64" } } }, { "category": "product_version", "name": "openssh-clients-0:3.1p1-21.ia64", "product": { "name": "openssh-clients-0:3.1p1-21.ia64", "product_id": "openssh-clients-0:3.1p1-21.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.1p1-21?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.1p1-21.src", "product": { "name": "openssh-0:3.1p1-21.src", "product_id": "openssh-0:3.1p1-21.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.1p1-21?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssh-server-0:3.1p1-21.i386", "product": { "name": "openssh-server-0:3.1p1-21.i386", "product_id": "openssh-server-0:3.1p1-21.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.1p1-21?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.1p1-21.i386", "product": { "name": "openssh-askpass-0:3.1p1-21.i386", "product_id": "openssh-askpass-0:3.1p1-21.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.1p1-21?arch=i386" } } }, { "category": "product_version", "name": "openssh-0:3.1p1-21.i386", "product": { "name": "openssh-0:3.1p1-21.i386", "product_id": "openssh-0:3.1p1-21.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.1p1-21?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.1p1-21.i386", "product": { "name": "openssh-askpass-gnome-0:3.1p1-21.i386", "product_id": "openssh-askpass-gnome-0:3.1p1-21.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.1p1-21?arch=i386" } } }, { "category": "product_version", "name": "openssh-clients-0:3.1p1-21.i386", "product": { "name": "openssh-clients-0:3.1p1-21.i386", "product_id": "openssh-clients-0:3.1p1-21.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.1p1-21?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-0:3.1p1-21.i386" }, "product_reference": "openssh-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-0:3.1p1-21.ia64" }, "product_reference": "openssh-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-0:3.1p1-21.src" }, "product_reference": "openssh-0:3.1p1-21.src", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-askpass-0:3.1p1-21.i386" }, "product_reference": "openssh-askpass-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-askpass-0:3.1p1-21.ia64" }, "product_reference": "openssh-askpass-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386" }, "product_reference": "openssh-askpass-gnome-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-clients-0:3.1p1-21.i386" }, "product_reference": "openssh-clients-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-clients-0:3.1p1-21.ia64" }, "product_reference": "openssh-clients-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-server-0:3.1p1-21.i386" }, "product_reference": "openssh-server-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:openssh-server-0:3.1p1-21.ia64" }, "product_reference": "openssh-server-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-0:3.1p1-21.i386" }, "product_reference": "openssh-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-0:3.1p1-21.ia64" }, "product_reference": "openssh-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.src as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-0:3.1p1-21.src" }, "product_reference": "openssh-0:3.1p1-21.src", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.1p1-21.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-askpass-0:3.1p1-21.i386" }, "product_reference": "openssh-askpass-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.1p1-21.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-askpass-0:3.1p1-21.ia64" }, "product_reference": "openssh-askpass-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.1p1-21.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386" }, "product_reference": "openssh-askpass-gnome-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.1p1-21.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.1p1-21.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-clients-0:3.1p1-21.i386" }, "product_reference": "openssh-clients-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.1p1-21.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-clients-0:3.1p1-21.ia64" }, "product_reference": "openssh-clients-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.1p1-21.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-server-0:3.1p1-21.i386" }, "product_reference": "openssh-server-0:3.1p1-21.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.1p1-21.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:openssh-server-0:3.1p1-21.ia64" }, "product_reference": "openssh-server-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-0:3.1p1-21.i386" }, "product_reference": "openssh-0:3.1p1-21.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-0:3.1p1-21.ia64" }, "product_reference": "openssh-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.src as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-0:3.1p1-21.src" }, "product_reference": "openssh-0:3.1p1-21.src", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-askpass-0:3.1p1-21.i386" }, "product_reference": "openssh-askpass-0:3.1p1-21.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-askpass-0:3.1p1-21.ia64" }, "product_reference": "openssh-askpass-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386" }, "product_reference": "openssh-askpass-gnome-0:3.1p1-21.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-clients-0:3.1p1-21.i386" }, "product_reference": "openssh-clients-0:3.1p1-21.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-clients-0:3.1p1-21.ia64" }, "product_reference": "openssh-clients-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-server-0:3.1p1-21.i386" }, "product_reference": "openssh-server-0:3.1p1-21.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:openssh-server-0:3.1p1-21.ia64" }, "product_reference": "openssh-server-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-0:3.1p1-21.i386" }, "product_reference": "openssh-0:3.1p1-21.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-0:3.1p1-21.ia64" }, "product_reference": "openssh-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.1p1-21.src as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-0:3.1p1-21.src" }, "product_reference": "openssh-0:3.1p1-21.src", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-askpass-0:3.1p1-21.i386" }, "product_reference": "openssh-askpass-0:3.1p1-21.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-askpass-0:3.1p1-21.ia64" }, "product_reference": "openssh-askpass-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386" }, "product_reference": "openssh-askpass-gnome-0:3.1p1-21.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-clients-0:3.1p1-21.i386" }, "product_reference": "openssh-clients-0:3.1p1-21.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-clients-0:3.1p1-21.ia64" }, "product_reference": "openssh-clients-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.1p1-21.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-server-0:3.1p1-21.i386" }, "product_reference": "openssh-server-0:3.1p1-21.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.1p1-21.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:openssh-server-0:3.1p1-21.ia64" }, "product_reference": "openssh-server-0:3.1p1-21.ia64", "relates_to_product_reference": "2.1WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2003-0386", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617024" } ], "notes": [ { "category": "description", "text": "OpenSSH 3.6.1 and earlier, when restricting host access by numeric IP addresses and with VerifyReverseMapping disabled, allows remote attackers to bypass \"from=\" and \"user@host\" address restrictions by connecting to a host from a system whose reverse DNS hostname contains the numeric IP address.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "2.1AS:openssh-0:3.1p1-21.i386", "2.1AS:openssh-0:3.1p1-21.ia64", "2.1AS:openssh-0:3.1p1-21.src", "2.1AS:openssh-askpass-0:3.1p1-21.i386", "2.1AS:openssh-askpass-0:3.1p1-21.ia64", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AS:openssh-clients-0:3.1p1-21.i386", "2.1AS:openssh-clients-0:3.1p1-21.ia64", "2.1AS:openssh-server-0:3.1p1-21.i386", "2.1AS:openssh-server-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.i386", "2.1AW:openssh-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.src", "2.1AW:openssh-askpass-0:3.1p1-21.i386", "2.1AW:openssh-askpass-0:3.1p1-21.ia64", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AW:openssh-clients-0:3.1p1-21.i386", "2.1AW:openssh-clients-0:3.1p1-21.ia64", "2.1AW:openssh-server-0:3.1p1-21.i386", "2.1AW:openssh-server-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.i386", "2.1ES:openssh-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.src", "2.1ES:openssh-askpass-0:3.1p1-21.i386", "2.1ES:openssh-askpass-0:3.1p1-21.ia64", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1ES:openssh-clients-0:3.1p1-21.i386", "2.1ES:openssh-clients-0:3.1p1-21.ia64", "2.1ES:openssh-server-0:3.1p1-21.i386", "2.1ES:openssh-server-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.i386", "2.1WS:openssh-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.src", "2.1WS:openssh-askpass-0:3.1p1-21.i386", "2.1WS:openssh-askpass-0:3.1p1-21.ia64", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1WS:openssh-clients-0:3.1p1-21.i386", "2.1WS:openssh-clients-0:3.1p1-21.ia64", "2.1WS:openssh-server-0:3.1p1-21.i386", "2.1WS:openssh-server-0:3.1p1-21.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0386" }, { "category": "external", "summary": "RHBZ#1617024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617024" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0386", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0386" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0386", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0386" } ], "release_date": "2003-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-29T00:23:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:openssh-0:3.1p1-21.i386", "2.1AS:openssh-0:3.1p1-21.ia64", "2.1AS:openssh-0:3.1p1-21.src", "2.1AS:openssh-askpass-0:3.1p1-21.i386", "2.1AS:openssh-askpass-0:3.1p1-21.ia64", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AS:openssh-clients-0:3.1p1-21.i386", "2.1AS:openssh-clients-0:3.1p1-21.ia64", "2.1AS:openssh-server-0:3.1p1-21.i386", "2.1AS:openssh-server-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.i386", "2.1AW:openssh-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.src", "2.1AW:openssh-askpass-0:3.1p1-21.i386", "2.1AW:openssh-askpass-0:3.1p1-21.ia64", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AW:openssh-clients-0:3.1p1-21.i386", "2.1AW:openssh-clients-0:3.1p1-21.ia64", "2.1AW:openssh-server-0:3.1p1-21.i386", "2.1AW:openssh-server-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.i386", "2.1ES:openssh-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.src", "2.1ES:openssh-askpass-0:3.1p1-21.i386", "2.1ES:openssh-askpass-0:3.1p1-21.ia64", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1ES:openssh-clients-0:3.1p1-21.i386", "2.1ES:openssh-clients-0:3.1p1-21.ia64", "2.1ES:openssh-server-0:3.1p1-21.i386", "2.1ES:openssh-server-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.i386", "2.1WS:openssh-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.src", "2.1WS:openssh-askpass-0:3.1p1-21.i386", "2.1WS:openssh-askpass-0:3.1p1-21.ia64", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1WS:openssh-clients-0:3.1p1-21.i386", "2.1WS:openssh-clients-0:3.1p1-21.ia64", "2.1WS:openssh-server-0:3.1p1-21.i386", "2.1WS:openssh-server-0:3.1p1-21.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0698" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-0225", "discovery_date": "2005-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "168167" } ], "notes": [ { "category": "description", "text": "scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.", "title": "Vulnerability description" }, { "category": "summary", "text": "local to local copy uses shell expansion twice", "title": "Vulnerability summary" }, { "category": "other", "text": "Issue was fixed upstream in version 4.3. The openssh packages in Red Hat Enterprise Linux 5 are based on the fixed upstream version and were not affected by this flaw.", "title": "Statement" } ], "product_status": { "fixed": [ "2.1AS:openssh-0:3.1p1-21.i386", "2.1AS:openssh-0:3.1p1-21.ia64", "2.1AS:openssh-0:3.1p1-21.src", "2.1AS:openssh-askpass-0:3.1p1-21.i386", "2.1AS:openssh-askpass-0:3.1p1-21.ia64", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AS:openssh-clients-0:3.1p1-21.i386", "2.1AS:openssh-clients-0:3.1p1-21.ia64", "2.1AS:openssh-server-0:3.1p1-21.i386", "2.1AS:openssh-server-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.i386", "2.1AW:openssh-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.src", "2.1AW:openssh-askpass-0:3.1p1-21.i386", "2.1AW:openssh-askpass-0:3.1p1-21.ia64", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AW:openssh-clients-0:3.1p1-21.i386", "2.1AW:openssh-clients-0:3.1p1-21.ia64", "2.1AW:openssh-server-0:3.1p1-21.i386", "2.1AW:openssh-server-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.i386", "2.1ES:openssh-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.src", "2.1ES:openssh-askpass-0:3.1p1-21.i386", "2.1ES:openssh-askpass-0:3.1p1-21.ia64", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1ES:openssh-clients-0:3.1p1-21.i386", "2.1ES:openssh-clients-0:3.1p1-21.ia64", "2.1ES:openssh-server-0:3.1p1-21.i386", "2.1ES:openssh-server-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.i386", "2.1WS:openssh-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.src", "2.1WS:openssh-askpass-0:3.1p1-21.i386", "2.1WS:openssh-askpass-0:3.1p1-21.ia64", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1WS:openssh-clients-0:3.1p1-21.i386", "2.1WS:openssh-clients-0:3.1p1-21.ia64", "2.1WS:openssh-server-0:3.1p1-21.i386", "2.1WS:openssh-server-0:3.1p1-21.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-0225" }, { "category": "external", "summary": "RHBZ#168167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-0225", "url": "https://www.cve.org/CVERecord?id=CVE-2006-0225" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0225", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0225" } ], "release_date": "2005-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-29T00:23:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:openssh-0:3.1p1-21.i386", "2.1AS:openssh-0:3.1p1-21.ia64", "2.1AS:openssh-0:3.1p1-21.src", "2.1AS:openssh-askpass-0:3.1p1-21.i386", "2.1AS:openssh-askpass-0:3.1p1-21.ia64", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AS:openssh-clients-0:3.1p1-21.i386", "2.1AS:openssh-clients-0:3.1p1-21.ia64", "2.1AS:openssh-server-0:3.1p1-21.i386", "2.1AS:openssh-server-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.i386", "2.1AW:openssh-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.src", "2.1AW:openssh-askpass-0:3.1p1-21.i386", "2.1AW:openssh-askpass-0:3.1p1-21.ia64", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AW:openssh-clients-0:3.1p1-21.i386", "2.1AW:openssh-clients-0:3.1p1-21.ia64", "2.1AW:openssh-server-0:3.1p1-21.i386", "2.1AW:openssh-server-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.i386", "2.1ES:openssh-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.src", "2.1ES:openssh-askpass-0:3.1p1-21.i386", "2.1ES:openssh-askpass-0:3.1p1-21.ia64", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1ES:openssh-clients-0:3.1p1-21.i386", "2.1ES:openssh-clients-0:3.1p1-21.ia64", "2.1ES:openssh-server-0:3.1p1-21.i386", "2.1ES:openssh-server-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.i386", "2.1WS:openssh-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.src", "2.1WS:openssh-askpass-0:3.1p1-21.i386", "2.1WS:openssh-askpass-0:3.1p1-21.ia64", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1WS:openssh-clients-0:3.1p1-21.i386", "2.1WS:openssh-clients-0:3.1p1-21.ia64", "2.1WS:openssh-server-0:3.1p1-21.i386", "2.1WS:openssh-server-0:3.1p1-21.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0698" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "local to local copy uses shell expansion twice" }, { "cve": "CVE-2006-4924", "discovery_date": "2006-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "207957" } ], "notes": [ { "category": "description", "text": "sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssh DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "2.1AS:openssh-0:3.1p1-21.i386", "2.1AS:openssh-0:3.1p1-21.ia64", "2.1AS:openssh-0:3.1p1-21.src", "2.1AS:openssh-askpass-0:3.1p1-21.i386", "2.1AS:openssh-askpass-0:3.1p1-21.ia64", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AS:openssh-clients-0:3.1p1-21.i386", "2.1AS:openssh-clients-0:3.1p1-21.ia64", "2.1AS:openssh-server-0:3.1p1-21.i386", "2.1AS:openssh-server-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.i386", "2.1AW:openssh-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.src", "2.1AW:openssh-askpass-0:3.1p1-21.i386", "2.1AW:openssh-askpass-0:3.1p1-21.ia64", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AW:openssh-clients-0:3.1p1-21.i386", "2.1AW:openssh-clients-0:3.1p1-21.ia64", "2.1AW:openssh-server-0:3.1p1-21.i386", "2.1AW:openssh-server-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.i386", "2.1ES:openssh-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.src", "2.1ES:openssh-askpass-0:3.1p1-21.i386", "2.1ES:openssh-askpass-0:3.1p1-21.ia64", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1ES:openssh-clients-0:3.1p1-21.i386", "2.1ES:openssh-clients-0:3.1p1-21.ia64", "2.1ES:openssh-server-0:3.1p1-21.i386", "2.1ES:openssh-server-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.i386", "2.1WS:openssh-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.src", "2.1WS:openssh-askpass-0:3.1p1-21.i386", "2.1WS:openssh-askpass-0:3.1p1-21.ia64", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1WS:openssh-clients-0:3.1p1-21.i386", "2.1WS:openssh-clients-0:3.1p1-21.ia64", "2.1WS:openssh-server-0:3.1p1-21.i386", "2.1WS:openssh-server-0:3.1p1-21.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4924" }, { "category": "external", "summary": "RHBZ#207957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=207957" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4924", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4924" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4924", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4924" } ], "release_date": "2006-09-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-29T00:23:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:openssh-0:3.1p1-21.i386", "2.1AS:openssh-0:3.1p1-21.ia64", "2.1AS:openssh-0:3.1p1-21.src", "2.1AS:openssh-askpass-0:3.1p1-21.i386", "2.1AS:openssh-askpass-0:3.1p1-21.ia64", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AS:openssh-clients-0:3.1p1-21.i386", "2.1AS:openssh-clients-0:3.1p1-21.ia64", "2.1AS:openssh-server-0:3.1p1-21.i386", "2.1AS:openssh-server-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.i386", "2.1AW:openssh-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.src", "2.1AW:openssh-askpass-0:3.1p1-21.i386", "2.1AW:openssh-askpass-0:3.1p1-21.ia64", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AW:openssh-clients-0:3.1p1-21.i386", "2.1AW:openssh-clients-0:3.1p1-21.ia64", "2.1AW:openssh-server-0:3.1p1-21.i386", "2.1AW:openssh-server-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.i386", "2.1ES:openssh-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.src", "2.1ES:openssh-askpass-0:3.1p1-21.i386", "2.1ES:openssh-askpass-0:3.1p1-21.ia64", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1ES:openssh-clients-0:3.1p1-21.i386", "2.1ES:openssh-clients-0:3.1p1-21.ia64", "2.1ES:openssh-server-0:3.1p1-21.i386", "2.1ES:openssh-server-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.i386", "2.1WS:openssh-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.src", "2.1WS:openssh-askpass-0:3.1p1-21.i386", "2.1WS:openssh-askpass-0:3.1p1-21.ia64", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1WS:openssh-clients-0:3.1p1-21.i386", "2.1WS:openssh-clients-0:3.1p1-21.ia64", "2.1WS:openssh-server-0:3.1p1-21.i386", "2.1WS:openssh-server-0:3.1p1-21.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0698" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssh DoS" }, { "cve": "CVE-2006-5051", "discovery_date": "2006-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "208347" } ], "notes": [ { "category": "description", "text": "Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.", "title": "Vulnerability description" }, { "category": "summary", "text": "unsafe GSSAPI signal handler", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "2.1AS:openssh-0:3.1p1-21.i386", "2.1AS:openssh-0:3.1p1-21.ia64", "2.1AS:openssh-0:3.1p1-21.src", "2.1AS:openssh-askpass-0:3.1p1-21.i386", "2.1AS:openssh-askpass-0:3.1p1-21.ia64", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AS:openssh-clients-0:3.1p1-21.i386", "2.1AS:openssh-clients-0:3.1p1-21.ia64", "2.1AS:openssh-server-0:3.1p1-21.i386", "2.1AS:openssh-server-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.i386", "2.1AW:openssh-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.src", "2.1AW:openssh-askpass-0:3.1p1-21.i386", "2.1AW:openssh-askpass-0:3.1p1-21.ia64", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AW:openssh-clients-0:3.1p1-21.i386", "2.1AW:openssh-clients-0:3.1p1-21.ia64", "2.1AW:openssh-server-0:3.1p1-21.i386", "2.1AW:openssh-server-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.i386", "2.1ES:openssh-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.src", "2.1ES:openssh-askpass-0:3.1p1-21.i386", "2.1ES:openssh-askpass-0:3.1p1-21.ia64", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1ES:openssh-clients-0:3.1p1-21.i386", "2.1ES:openssh-clients-0:3.1p1-21.ia64", "2.1ES:openssh-server-0:3.1p1-21.i386", "2.1ES:openssh-server-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.i386", "2.1WS:openssh-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.src", "2.1WS:openssh-askpass-0:3.1p1-21.i386", "2.1WS:openssh-askpass-0:3.1p1-21.ia64", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1WS:openssh-clients-0:3.1p1-21.i386", "2.1WS:openssh-clients-0:3.1p1-21.ia64", "2.1WS:openssh-server-0:3.1p1-21.i386", "2.1WS:openssh-server-0:3.1p1-21.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5051" }, { "category": "external", "summary": "RHBZ#208347", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=208347" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5051", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5051" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5051", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5051" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-29T00:23:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:openssh-0:3.1p1-21.i386", "2.1AS:openssh-0:3.1p1-21.ia64", "2.1AS:openssh-0:3.1p1-21.src", "2.1AS:openssh-askpass-0:3.1p1-21.i386", "2.1AS:openssh-askpass-0:3.1p1-21.ia64", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AS:openssh-clients-0:3.1p1-21.i386", "2.1AS:openssh-clients-0:3.1p1-21.ia64", "2.1AS:openssh-server-0:3.1p1-21.i386", "2.1AS:openssh-server-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.i386", "2.1AW:openssh-0:3.1p1-21.ia64", "2.1AW:openssh-0:3.1p1-21.src", "2.1AW:openssh-askpass-0:3.1p1-21.i386", "2.1AW:openssh-askpass-0:3.1p1-21.ia64", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1AW:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1AW:openssh-clients-0:3.1p1-21.i386", "2.1AW:openssh-clients-0:3.1p1-21.ia64", "2.1AW:openssh-server-0:3.1p1-21.i386", "2.1AW:openssh-server-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.i386", "2.1ES:openssh-0:3.1p1-21.ia64", "2.1ES:openssh-0:3.1p1-21.src", "2.1ES:openssh-askpass-0:3.1p1-21.i386", "2.1ES:openssh-askpass-0:3.1p1-21.ia64", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1ES:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1ES:openssh-clients-0:3.1p1-21.i386", "2.1ES:openssh-clients-0:3.1p1-21.ia64", "2.1ES:openssh-server-0:3.1p1-21.i386", "2.1ES:openssh-server-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.i386", "2.1WS:openssh-0:3.1p1-21.ia64", "2.1WS:openssh-0:3.1p1-21.src", "2.1WS:openssh-askpass-0:3.1p1-21.i386", "2.1WS:openssh-askpass-0:3.1p1-21.ia64", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.i386", "2.1WS:openssh-askpass-gnome-0:3.1p1-21.ia64", "2.1WS:openssh-clients-0:3.1p1-21.i386", "2.1WS:openssh-clients-0:3.1p1-21.ia64", "2.1WS:openssh-server-0:3.1p1-21.i386", "2.1WS:openssh-server-0:3.1p1-21.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0698" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "unsafe GSSAPI signal handler" } ] }
rhsa-2006:0044
Vulnerability from csaf_redhat
Published
2006-03-07 15:15
Modified
2025-09-10 13:38
Summary
Red Hat Security Advisory: openssh security update
Notes
Topic
Updated openssh packages that fix bugs in sshd and add auditing of user
logins are now available for Red Hat Enterprise Linux 4.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Details
OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. This
package includes the core files necessary for both the OpenSSH client and
server.
An arbitrary command execution flaw was discovered in the way scp copies
files locally. It is possible for a local attacker to create a file with a
carefully crafted name that could execute arbitrary commands as the user
running scp to copy files locally. The Common Vulnerabilities and Exposures
project (cve.mitre.org) assigned the name CVE-2006-0225 to this issue.
The following issue has also been fixed in this update:
* If the sshd service was stopped using the sshd init script while the
main sshd daemon was not running, the init script would kill other sshd
processes, such as the running sessions. For example, this could happen
when the 'service sshd stop' command was issued twice.
Additionally, this update implements auditing of user logins through the
system audit service.
All users of openssh should upgrade to these updated packages, which
resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssh packages that fix bugs in sshd and add auditing of user\nlogins are now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "OpenSSH is OpenBSD\u0027s SSH (Secure SHell) protocol implementation. This\npackage includes the core files necessary for both the OpenSSH client and\nserver.\n\nAn arbitrary command execution flaw was discovered in the way scp copies\nfiles locally. It is possible for a local attacker to create a file with a\ncarefully crafted name that could execute arbitrary commands as the user\nrunning scp to copy files locally. The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) assigned the name CVE-2006-0225 to this issue. \n\nThe following issue has also been fixed in this update:\n\n* If the sshd service was stopped using the sshd init script while the\n main sshd daemon was not running, the init script would kill other sshd\n processes, such as the running sessions. For example, this could happen\n when the \u0027service sshd stop\u0027 command was issued twice.\n\nAdditionally, this update implements auditing of user logins through the\nsystem audit service.\n\nAll users of openssh should upgrade to these updated packages, which\nresolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0044", "url": "https://access.redhat.com/errata/RHSA-2006:0044" }, { "category": "external", "summary": "170466", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170466" }, { "category": "external", "summary": "170468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170468" }, { "category": "external", "summary": "170568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170568" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0044.json" } ], "title": "Red Hat Security Advisory: openssh security update", "tracking": { "current_release_date": "2025-09-10T13:38:11+00:00", "generator": { "date": "2025-09-10T13:38:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2006:0044", "initial_release_date": "2006-03-07T15:15:00+00:00", "revision_history": [ { "date": "2006-03-07T15:15:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-03-07T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:38:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.9p1-8.RHEL4.12.ia64", "product": { "name": "openssh-0:3.9p1-8.RHEL4.12.ia64", "product_id": "openssh-0:3.9p1-8.RHEL4.12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-8.RHEL4.12?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "product": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "product_id": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-8.RHEL4.12?arch=ia64" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-8.RHEL4.12.ia64", "product": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ia64", "product_id": "openssh-server-0:3.9p1-8.RHEL4.12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-8.RHEL4.12?arch=ia64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "product": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "product_id": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-8.RHEL4.12?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "product": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "product_id": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-8.RHEL4.12?arch=ia64" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "product": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "product_id": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-8.RHEL4.12?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.9p1-8.RHEL4.12.src", "product": { "name": "openssh-0:3.9p1-8.RHEL4.12.src", "product_id": "openssh-0:3.9p1-8.RHEL4.12.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-8.RHEL4.12?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.9p1-8.RHEL4.12.x86_64", "product": { "name": "openssh-0:3.9p1-8.RHEL4.12.x86_64", "product_id": "openssh-0:3.9p1-8.RHEL4.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-8.RHEL4.12?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "product": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "product_id": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-8.RHEL4.12?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "product": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "product_id": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-8.RHEL4.12?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "product": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "product_id": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-8.RHEL4.12?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "product": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "product_id": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-8.RHEL4.12?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "product": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "product_id": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-8.RHEL4.12?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.9p1-8.RHEL4.12.i386", "product": { "name": "openssh-0:3.9p1-8.RHEL4.12.i386", "product_id": "openssh-0:3.9p1-8.RHEL4.12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-8.RHEL4.12?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "product": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "product_id": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-8.RHEL4.12?arch=i386" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-8.RHEL4.12.i386", "product": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.i386", "product_id": "openssh-server-0:3.9p1-8.RHEL4.12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-8.RHEL4.12?arch=i386" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "product": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "product_id": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-8.RHEL4.12?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "product": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "product_id": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-8.RHEL4.12?arch=i386" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-8.RHEL4.12.i386", "product": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.i386", "product_id": "openssh-clients-0:3.9p1-8.RHEL4.12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-8.RHEL4.12?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.9p1-8.RHEL4.12.ppc", "product": { "name": "openssh-0:3.9p1-8.RHEL4.12.ppc", "product_id": "openssh-0:3.9p1-8.RHEL4.12.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-8.RHEL4.12?arch=ppc" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "product": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "product_id": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-8.RHEL4.12?arch=ppc" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-8.RHEL4.12.ppc", "product": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ppc", "product_id": "openssh-server-0:3.9p1-8.RHEL4.12.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-8.RHEL4.12?arch=ppc" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "product": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "product_id": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-8.RHEL4.12?arch=ppc" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "product": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "product_id": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-8.RHEL4.12?arch=ppc" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "product": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "product_id": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-8.RHEL4.12?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.9p1-8.RHEL4.12.s390x", "product": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390x", "product_id": "openssh-0:3.9p1-8.RHEL4.12.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-8.RHEL4.12?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "product": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "product_id": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-8.RHEL4.12?arch=s390x" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390x", "product": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390x", "product_id": "openssh-server-0:3.9p1-8.RHEL4.12.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-8.RHEL4.12?arch=s390x" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "product": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "product_id": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-8.RHEL4.12?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "product": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "product_id": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-8.RHEL4.12?arch=s390x" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "product": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "product_id": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-8.RHEL4.12?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.9p1-8.RHEL4.12.s390", "product": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390", "product_id": "openssh-0:3.9p1-8.RHEL4.12.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-8.RHEL4.12?arch=s390" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "product": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "product_id": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-8.RHEL4.12?arch=s390" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390", "product": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390", "product_id": "openssh-server-0:3.9p1-8.RHEL4.12.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-8.RHEL4.12?arch=s390" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "product": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "product_id": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-8.RHEL4.12?arch=s390" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "product": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "product_id": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-8.RHEL4.12?arch=s390" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390", "product": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390", "product_id": "openssh-clients-0:3.9p1-8.RHEL4.12.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-8.RHEL4.12?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-8.RHEL4.12.src" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-8.RHEL4.12.src" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-8.RHEL4.12.src" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-8.RHEL4.12.src" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-0225", "discovery_date": "2005-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "168167" } ], "notes": [ { "category": "description", "text": "scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.", "title": "Vulnerability description" }, { "category": "summary", "text": "local to local copy uses shell expansion twice", "title": "Vulnerability summary" }, { "category": "other", "text": "Issue was fixed upstream in version 4.3. The openssh packages in Red Hat Enterprise Linux 5 are based on the fixed upstream version and were not affected by this flaw.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS:openssh-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-0:3.9p1-8.RHEL4.12.src", "4AS:openssh-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.src", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-0:3.9p1-8.RHEL4.12.src", "4ES:openssh-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-0:3.9p1-8.RHEL4.12.src", "4WS:openssh-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-0225" }, { "category": "external", "summary": "RHBZ#168167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-0225", "url": "https://www.cve.org/CVERecord?id=CVE-2006-0225" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0225", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0225" } ], "release_date": "2005-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-03-07T15:15:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:openssh-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-0:3.9p1-8.RHEL4.12.src", "4AS:openssh-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.src", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-0:3.9p1-8.RHEL4.12.src", "4ES:openssh-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-0:3.9p1-8.RHEL4.12.src", "4WS:openssh-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0044" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "local to local copy uses shell expansion twice" } ] }
RHSA-2006:0044
Vulnerability from csaf_redhat
Published
2006-03-07 15:15
Modified
2025-09-10 13:38
Summary
Red Hat Security Advisory: openssh security update
Notes
Topic
Updated openssh packages that fix bugs in sshd and add auditing of user
logins are now available for Red Hat Enterprise Linux 4.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Details
OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. This
package includes the core files necessary for both the OpenSSH client and
server.
An arbitrary command execution flaw was discovered in the way scp copies
files locally. It is possible for a local attacker to create a file with a
carefully crafted name that could execute arbitrary commands as the user
running scp to copy files locally. The Common Vulnerabilities and Exposures
project (cve.mitre.org) assigned the name CVE-2006-0225 to this issue.
The following issue has also been fixed in this update:
* If the sshd service was stopped using the sshd init script while the
main sshd daemon was not running, the init script would kill other sshd
processes, such as the running sessions. For example, this could happen
when the 'service sshd stop' command was issued twice.
Additionally, this update implements auditing of user logins through the
system audit service.
All users of openssh should upgrade to these updated packages, which
resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssh packages that fix bugs in sshd and add auditing of user\nlogins are now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "OpenSSH is OpenBSD\u0027s SSH (Secure SHell) protocol implementation. This\npackage includes the core files necessary for both the OpenSSH client and\nserver.\n\nAn arbitrary command execution flaw was discovered in the way scp copies\nfiles locally. It is possible for a local attacker to create a file with a\ncarefully crafted name that could execute arbitrary commands as the user\nrunning scp to copy files locally. The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) assigned the name CVE-2006-0225 to this issue. \n\nThe following issue has also been fixed in this update:\n\n* If the sshd service was stopped using the sshd init script while the\n main sshd daemon was not running, the init script would kill other sshd\n processes, such as the running sessions. For example, this could happen\n when the \u0027service sshd stop\u0027 command was issued twice.\n\nAdditionally, this update implements auditing of user logins through the\nsystem audit service.\n\nAll users of openssh should upgrade to these updated packages, which\nresolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0044", "url": "https://access.redhat.com/errata/RHSA-2006:0044" }, { "category": "external", "summary": "170466", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170466" }, { "category": "external", "summary": "170468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170468" }, { "category": "external", "summary": "170568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170568" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0044.json" } ], "title": "Red Hat Security Advisory: openssh security update", "tracking": { "current_release_date": "2025-09-10T13:38:11+00:00", "generator": { "date": "2025-09-10T13:38:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2006:0044", "initial_release_date": "2006-03-07T15:15:00+00:00", "revision_history": [ { "date": "2006-03-07T15:15:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-03-07T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:38:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.9p1-8.RHEL4.12.ia64", "product": { "name": "openssh-0:3.9p1-8.RHEL4.12.ia64", "product_id": "openssh-0:3.9p1-8.RHEL4.12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-8.RHEL4.12?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "product": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "product_id": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-8.RHEL4.12?arch=ia64" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-8.RHEL4.12.ia64", "product": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ia64", "product_id": "openssh-server-0:3.9p1-8.RHEL4.12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-8.RHEL4.12?arch=ia64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "product": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "product_id": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-8.RHEL4.12?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "product": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "product_id": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-8.RHEL4.12?arch=ia64" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "product": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "product_id": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-8.RHEL4.12?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.9p1-8.RHEL4.12.src", "product": { "name": "openssh-0:3.9p1-8.RHEL4.12.src", "product_id": "openssh-0:3.9p1-8.RHEL4.12.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-8.RHEL4.12?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.9p1-8.RHEL4.12.x86_64", "product": { "name": "openssh-0:3.9p1-8.RHEL4.12.x86_64", "product_id": "openssh-0:3.9p1-8.RHEL4.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-8.RHEL4.12?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "product": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "product_id": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-8.RHEL4.12?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "product": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "product_id": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-8.RHEL4.12?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "product": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "product_id": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-8.RHEL4.12?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "product": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "product_id": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-8.RHEL4.12?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "product": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "product_id": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-8.RHEL4.12?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.9p1-8.RHEL4.12.i386", "product": { "name": "openssh-0:3.9p1-8.RHEL4.12.i386", "product_id": "openssh-0:3.9p1-8.RHEL4.12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-8.RHEL4.12?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "product": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "product_id": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-8.RHEL4.12?arch=i386" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-8.RHEL4.12.i386", "product": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.i386", "product_id": "openssh-server-0:3.9p1-8.RHEL4.12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-8.RHEL4.12?arch=i386" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "product": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "product_id": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-8.RHEL4.12?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "product": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "product_id": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-8.RHEL4.12?arch=i386" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-8.RHEL4.12.i386", "product": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.i386", "product_id": "openssh-clients-0:3.9p1-8.RHEL4.12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-8.RHEL4.12?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.9p1-8.RHEL4.12.ppc", "product": { "name": "openssh-0:3.9p1-8.RHEL4.12.ppc", "product_id": "openssh-0:3.9p1-8.RHEL4.12.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-8.RHEL4.12?arch=ppc" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "product": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "product_id": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-8.RHEL4.12?arch=ppc" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-8.RHEL4.12.ppc", "product": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ppc", "product_id": "openssh-server-0:3.9p1-8.RHEL4.12.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-8.RHEL4.12?arch=ppc" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "product": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "product_id": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-8.RHEL4.12?arch=ppc" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "product": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "product_id": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-8.RHEL4.12?arch=ppc" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "product": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "product_id": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-8.RHEL4.12?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.9p1-8.RHEL4.12.s390x", "product": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390x", "product_id": "openssh-0:3.9p1-8.RHEL4.12.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-8.RHEL4.12?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "product": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "product_id": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-8.RHEL4.12?arch=s390x" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390x", "product": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390x", "product_id": "openssh-server-0:3.9p1-8.RHEL4.12.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-8.RHEL4.12?arch=s390x" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "product": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "product_id": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-8.RHEL4.12?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "product": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "product_id": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-8.RHEL4.12?arch=s390x" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "product": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "product_id": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-8.RHEL4.12?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.9p1-8.RHEL4.12.s390", "product": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390", "product_id": "openssh-0:3.9p1-8.RHEL4.12.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-8.RHEL4.12?arch=s390" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "product": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "product_id": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-8.RHEL4.12?arch=s390" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390", "product": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390", "product_id": "openssh-server-0:3.9p1-8.RHEL4.12.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-8.RHEL4.12?arch=s390" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "product": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "product_id": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-8.RHEL4.12?arch=s390" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "product": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "product_id": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-8.RHEL4.12?arch=s390" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390", "product": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390", "product_id": "openssh-clients-0:3.9p1-8.RHEL4.12.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-8.RHEL4.12?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-8.RHEL4.12.src" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-8.RHEL4.12.src" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-8.RHEL4.12.src" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-8.RHEL4.12.src" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-8.RHEL4.12.i386" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-8.RHEL4.12.ia64" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-8.RHEL4.12.ppc" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-8.RHEL4.12.s390" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-8.RHEL4.12.s390x" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-8.RHEL4.12.x86_64" }, "product_reference": "openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-0225", "discovery_date": "2005-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "168167" } ], "notes": [ { "category": "description", "text": "scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.", "title": "Vulnerability description" }, { "category": "summary", "text": "local to local copy uses shell expansion twice", "title": "Vulnerability summary" }, { "category": "other", "text": "Issue was fixed upstream in version 4.3. The openssh packages in Red Hat Enterprise Linux 5 are based on the fixed upstream version and were not affected by this flaw.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS:openssh-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-0:3.9p1-8.RHEL4.12.src", "4AS:openssh-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.src", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-0:3.9p1-8.RHEL4.12.src", "4ES:openssh-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-0:3.9p1-8.RHEL4.12.src", "4WS:openssh-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-0225" }, { "category": "external", "summary": "RHBZ#168167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-0225", "url": "https://www.cve.org/CVERecord?id=CVE-2006-0225" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0225", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0225" } ], "release_date": "2005-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-03-07T15:15:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:openssh-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-0:3.9p1-8.RHEL4.12.src", "4AS:openssh-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.i386", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.ia64", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.ppc", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.s390", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.s390x", "4AS:openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.src", "4Desktop:openssh-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.i386", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.ia64", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.ppc", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.s390", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.s390x", "4Desktop:openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-0:3.9p1-8.RHEL4.12.src", "4ES:openssh-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.i386", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.ia64", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.ppc", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.s390", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.s390x", "4ES:openssh-server-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-0:3.9p1-8.RHEL4.12.src", "4WS:openssh-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-askpass-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-askpass-gnome-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-clients-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-debuginfo-0:3.9p1-8.RHEL4.12.x86_64", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.i386", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.ia64", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.ppc", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.s390", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.s390x", "4WS:openssh-server-0:3.9p1-8.RHEL4.12.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0044" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "local to local copy uses shell expansion twice" } ] }
rhsa-2006:0298
Vulnerability from csaf_redhat
Published
2006-07-20 13:01
Modified
2025-09-10 13:38
Summary
Red Hat Security Advisory: openssh security update
Notes
Topic
Updated openssh packages that fix bugs in sshd are now available for Red
Hat Enterprise Linux 3.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Details
OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. This
package includes the core files necessary for both the OpenSSH client and
server.
An arbitrary command execution flaw was discovered in the way scp copies
files locally. It is possible for a local attacker to create a file with a
carefully crafted name that could execute arbitrary commands as the user
running scp to copy files locally. (CVE-2006-0225)
The SSH daemon, when restricting host access by numeric IP addresses and
with VerifyReverseMapping disabled, allows remote attackers to bypass
"from=" and "user@host" address restrictions by connecting to a host from a
system whose reverse DNS hostname contains the numeric IP address.
(CVE-2003-0386)
The following issues have also been fixed in this update:
* If the sshd service was stopped using the sshd init script while the
main sshd daemon was not running, the init script would kill other sshd
processes, such as the running sessions. For example, this could happen
when the 'service sshd stop' command was issued twice.
* When privilege separation was enabled, the last login message was printed
only for the root user.
* The sshd daemon was sending messages to the system log from a signal
handler when debug logging was enabled. This could cause a deadlock of
the user's connection.
All users of openssh should upgrade to these updated packages, which
resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssh packages that fix bugs in sshd are now available for Red\nHat Enterprise Linux 3.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "OpenSSH is OpenBSD\u0027s SSH (Secure SHell) protocol implementation. This\npackage includes the core files necessary for both the OpenSSH client and\nserver.\n\nAn arbitrary command execution flaw was discovered in the way scp copies\nfiles locally. It is possible for a local attacker to create a file with a\ncarefully crafted name that could execute arbitrary commands as the user\nrunning scp to copy files locally. (CVE-2006-0225)\n\nThe SSH daemon, when restricting host access by numeric IP addresses and\nwith VerifyReverseMapping disabled, allows remote attackers to bypass\n\"from=\" and \"user@host\" address restrictions by connecting to a host from a\nsystem whose reverse DNS hostname contains the numeric IP address.\n(CVE-2003-0386)\n\nThe following issues have also been fixed in this update:\n\n* If the sshd service was stopped using the sshd init script while the\n main sshd daemon was not running, the init script would kill other sshd\n processes, such as the running sessions. For example, this could happen\n when the \u0027service sshd stop\u0027 command was issued twice.\n\n* When privilege separation was enabled, the last login message was printed\n only for the root user.\n\n* The sshd daemon was sending messages to the system log from a signal\n handler when debug logging was enabled. This could cause a deadlock of\n the user\u0027s connection.\n\nAll users of openssh should upgrade to these updated packages, which\nresolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0298", "url": "https://access.redhat.com/errata/RHSA-2006:0298" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#low", "url": "http://www.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "164661", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164661" }, { "category": "external", "summary": "167886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167886" }, { "category": "external", "summary": "170463", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170463" }, { "category": "external", "summary": "172564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=172564" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0298.json" } ], "title": "Red Hat Security Advisory: openssh security update", "tracking": { "current_release_date": "2025-09-10T13:38:23+00:00", "generator": { "date": "2025-09-10T13:38:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2006:0298", "initial_release_date": "2006-07-20T13:01:00+00:00", "revision_history": [ { "date": "2006-07-20T13:01:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-07-20T08:53:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:38:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:3.6.1p2-33.30.9.ia64", "product": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ia64", "product_id": "openssh-askpass-0:3.6.1p2-33.30.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.9?arch=ia64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "product": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "product_id": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.9?arch=ia64" } } }, { "category": "product_version", "name": "openssh-clients-0:3.6.1p2-33.30.9.ia64", "product": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ia64", "product_id": "openssh-clients-0:3.6.1p2-33.30.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.9?arch=ia64" } } }, { "category": "product_version", "name": "openssh-0:3.6.1p2-33.30.9.ia64", "product": { "name": "openssh-0:3.6.1p2-33.30.9.ia64", "product_id": "openssh-0:3.6.1p2-33.30.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.9?arch=ia64" } } }, { "category": "product_version", "name": "openssh-server-0:3.6.1p2-33.30.9.ia64", "product": { "name": "openssh-server-0:3.6.1p2-33.30.9.ia64", "product_id": "openssh-server-0:3.6.1p2-33.30.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.9?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "product": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.9?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "product": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "product_id": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "product": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "product_id": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-clients-0:3.6.1p2-33.30.9.x86_64", "product": { "name": "openssh-clients-0:3.6.1p2-33.30.9.x86_64", "product_id": "openssh-clients-0:3.6.1p2-33.30.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-0:3.6.1p2-33.30.9.x86_64", "product": { "name": "openssh-0:3.6.1p2-33.30.9.x86_64", "product_id": "openssh-0:3.6.1p2-33.30.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-server-0:3.6.1p2-33.30.9.x86_64", "product": { "name": "openssh-server-0:3.6.1p2-33.30.9.x86_64", "product_id": "openssh-server-0:3.6.1p2-33.30.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.9?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "product": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:3.6.1p2-33.30.9.i386", "product": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.i386", "product_id": "openssh-askpass-0:3.6.1p2-33.30.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.9?arch=i386" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "product": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "product_id": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.9?arch=i386" } } }, { "category": "product_version", "name": "openssh-clients-0:3.6.1p2-33.30.9.i386", "product": { "name": "openssh-clients-0:3.6.1p2-33.30.9.i386", "product_id": "openssh-clients-0:3.6.1p2-33.30.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.9?arch=i386" } } }, { "category": "product_version", "name": "openssh-0:3.6.1p2-33.30.9.i386", "product": { "name": "openssh-0:3.6.1p2-33.30.9.i386", "product_id": "openssh-0:3.6.1p2-33.30.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.9?arch=i386" } } }, { "category": "product_version", "name": "openssh-server-0:3.6.1p2-33.30.9.i386", "product": { "name": "openssh-server-0:3.6.1p2-33.30.9.i386", "product_id": "openssh-server-0:3.6.1p2-33.30.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.9?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "product": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.9?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "openssh-0:3.6.1p2-33.30.9.src", "product": { "name": "openssh-0:3.6.1p2-33.30.9.src", "product_id": "openssh-0:3.6.1p2-33.30.9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:3.6.1p2-33.30.9.ppc", "product": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ppc", "product_id": "openssh-askpass-0:3.6.1p2-33.30.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.9?arch=ppc" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "product": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "product_id": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.9?arch=ppc" } } }, { "category": "product_version", "name": "openssh-clients-0:3.6.1p2-33.30.9.ppc", "product": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ppc", "product_id": "openssh-clients-0:3.6.1p2-33.30.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.9?arch=ppc" } } }, { "category": "product_version", "name": "openssh-0:3.6.1p2-33.30.9.ppc", "product": { "name": "openssh-0:3.6.1p2-33.30.9.ppc", "product_id": "openssh-0:3.6.1p2-33.30.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.9?arch=ppc" } } }, { "category": "product_version", "name": "openssh-server-0:3.6.1p2-33.30.9.ppc", "product": { "name": "openssh-server-0:3.6.1p2-33.30.9.ppc", "product_id": "openssh-server-0:3.6.1p2-33.30.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.9?arch=ppc" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "product": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.9?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390x", "product": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390x", "product_id": "openssh-askpass-0:3.6.1p2-33.30.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "product": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "product_id": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-clients-0:3.6.1p2-33.30.9.s390x", "product": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390x", "product_id": "openssh-clients-0:3.6.1p2-33.30.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-0:3.6.1p2-33.30.9.s390x", "product": { "name": "openssh-0:3.6.1p2-33.30.9.s390x", "product_id": "openssh-0:3.6.1p2-33.30.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-server-0:3.6.1p2-33.30.9.s390x", "product": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390x", "product_id": "openssh-server-0:3.6.1p2-33.30.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.9?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "product": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390", "product": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390", "product_id": "openssh-askpass-0:3.6.1p2-33.30.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.9?arch=s390" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "product": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "product_id": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.9?arch=s390" } } }, { "category": "product_version", "name": "openssh-clients-0:3.6.1p2-33.30.9.s390", "product": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390", "product_id": "openssh-clients-0:3.6.1p2-33.30.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.9?arch=s390" } } }, { "category": "product_version", "name": "openssh-0:3.6.1p2-33.30.9.s390", "product": { "name": "openssh-0:3.6.1p2-33.30.9.s390", "product_id": "openssh-0:3.6.1p2-33.30.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.9?arch=s390" } } }, { "category": "product_version", "name": "openssh-server-0:3.6.1p2-33.30.9.s390", "product": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390", "product_id": "openssh-server-0:3.6.1p2-33.30.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.9?arch=s390" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "product": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.9?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-0:3.6.1p2-33.30.9.src" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-server-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-server-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-server-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-server-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-server-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssh-server-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-0:3.6.1p2-33.30.9.src" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-0:3.6.1p2-33.30.9.src" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-server-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-server-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-server-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-server-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-server-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssh-server-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-0:3.6.1p2-33.30.9.src" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-clients-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-server-0:3.6.1p2-33.30.9.i386" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-server-0:3.6.1p2-33.30.9.ia64" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-server-0:3.6.1p2-33.30.9.ppc" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-server-0:3.6.1p2-33.30.9.s390" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-server-0:3.6.1p2-33.30.9.s390x" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.6.1p2-33.30.9.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssh-server-0:3.6.1p2-33.30.9.x86_64" }, "product_reference": "openssh-server-0:3.6.1p2-33.30.9.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2003-0386", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617024" } ], "notes": [ { "category": "description", "text": "OpenSSH 3.6.1 and earlier, when restricting host access by numeric IP addresses and with VerifyReverseMapping disabled, allows remote attackers to bypass \"from=\" and \"user@host\" address restrictions by connecting to a host from a system whose reverse DNS hostname contains the numeric IP address.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:openssh-0:3.6.1p2-33.30.9.i386", "3AS:openssh-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-0:3.6.1p2-33.30.9.s390", "3AS:openssh-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-0:3.6.1p2-33.30.9.src", "3AS:openssh-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-clients-0:3.6.1p2-33.30.9.i386", "3AS:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390", "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-server-0:3.6.1p2-33.30.9.i386", "3AS:openssh-server-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-server-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-server-0:3.6.1p2-33.30.9.s390", "3AS:openssh-server-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-0:3.6.1p2-33.30.9.src", "3Desktop:openssh-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-0:3.6.1p2-33.30.9.i386", "3ES:openssh-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-0:3.6.1p2-33.30.9.s390", "3ES:openssh-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-0:3.6.1p2-33.30.9.src", "3ES:openssh-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-clients-0:3.6.1p2-33.30.9.i386", "3ES:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390", "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-server-0:3.6.1p2-33.30.9.i386", "3ES:openssh-server-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-server-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-server-0:3.6.1p2-33.30.9.s390", "3ES:openssh-server-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-0:3.6.1p2-33.30.9.i386", "3WS:openssh-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-0:3.6.1p2-33.30.9.s390", "3WS:openssh-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-0:3.6.1p2-33.30.9.src", "3WS:openssh-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-clients-0:3.6.1p2-33.30.9.i386", "3WS:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390", "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-server-0:3.6.1p2-33.30.9.i386", "3WS:openssh-server-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-server-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-server-0:3.6.1p2-33.30.9.s390", "3WS:openssh-server-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-server-0:3.6.1p2-33.30.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0386" }, { "category": "external", "summary": "RHBZ#1617024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617024" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0386", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0386" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0386", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0386" } ], "release_date": "2003-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-20T13:01:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:openssh-0:3.6.1p2-33.30.9.i386", "3AS:openssh-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-0:3.6.1p2-33.30.9.s390", "3AS:openssh-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-0:3.6.1p2-33.30.9.src", "3AS:openssh-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-clients-0:3.6.1p2-33.30.9.i386", "3AS:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390", "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-server-0:3.6.1p2-33.30.9.i386", "3AS:openssh-server-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-server-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-server-0:3.6.1p2-33.30.9.s390", "3AS:openssh-server-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-0:3.6.1p2-33.30.9.src", "3Desktop:openssh-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-0:3.6.1p2-33.30.9.i386", "3ES:openssh-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-0:3.6.1p2-33.30.9.s390", "3ES:openssh-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-0:3.6.1p2-33.30.9.src", "3ES:openssh-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-clients-0:3.6.1p2-33.30.9.i386", "3ES:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390", "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-server-0:3.6.1p2-33.30.9.i386", "3ES:openssh-server-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-server-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-server-0:3.6.1p2-33.30.9.s390", "3ES:openssh-server-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-0:3.6.1p2-33.30.9.i386", "3WS:openssh-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-0:3.6.1p2-33.30.9.s390", "3WS:openssh-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-0:3.6.1p2-33.30.9.src", "3WS:openssh-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-clients-0:3.6.1p2-33.30.9.i386", "3WS:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390", "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-server-0:3.6.1p2-33.30.9.i386", "3WS:openssh-server-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-server-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-server-0:3.6.1p2-33.30.9.s390", "3WS:openssh-server-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-server-0:3.6.1p2-33.30.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0298" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-0225", "discovery_date": "2005-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "168167" } ], "notes": [ { "category": "description", "text": "scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.", "title": "Vulnerability description" }, { "category": "summary", "text": "local to local copy uses shell expansion twice", "title": "Vulnerability summary" }, { "category": "other", "text": "Issue was fixed upstream in version 4.3. The openssh packages in Red Hat Enterprise Linux 5 are based on the fixed upstream version and were not affected by this flaw.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:openssh-0:3.6.1p2-33.30.9.i386", "3AS:openssh-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-0:3.6.1p2-33.30.9.s390", "3AS:openssh-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-0:3.6.1p2-33.30.9.src", "3AS:openssh-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-clients-0:3.6.1p2-33.30.9.i386", "3AS:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390", "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-server-0:3.6.1p2-33.30.9.i386", "3AS:openssh-server-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-server-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-server-0:3.6.1p2-33.30.9.s390", "3AS:openssh-server-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-0:3.6.1p2-33.30.9.src", "3Desktop:openssh-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-0:3.6.1p2-33.30.9.i386", "3ES:openssh-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-0:3.6.1p2-33.30.9.s390", "3ES:openssh-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-0:3.6.1p2-33.30.9.src", "3ES:openssh-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-clients-0:3.6.1p2-33.30.9.i386", "3ES:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390", "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-server-0:3.6.1p2-33.30.9.i386", "3ES:openssh-server-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-server-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-server-0:3.6.1p2-33.30.9.s390", "3ES:openssh-server-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-0:3.6.1p2-33.30.9.i386", "3WS:openssh-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-0:3.6.1p2-33.30.9.s390", "3WS:openssh-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-0:3.6.1p2-33.30.9.src", "3WS:openssh-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-clients-0:3.6.1p2-33.30.9.i386", "3WS:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390", "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-server-0:3.6.1p2-33.30.9.i386", "3WS:openssh-server-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-server-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-server-0:3.6.1p2-33.30.9.s390", "3WS:openssh-server-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-server-0:3.6.1p2-33.30.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-0225" }, { "category": "external", "summary": "RHBZ#168167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-0225", "url": "https://www.cve.org/CVERecord?id=CVE-2006-0225" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0225", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0225" } ], "release_date": "2005-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-20T13:01:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:openssh-0:3.6.1p2-33.30.9.i386", "3AS:openssh-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-0:3.6.1p2-33.30.9.s390", "3AS:openssh-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-0:3.6.1p2-33.30.9.src", "3AS:openssh-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-clients-0:3.6.1p2-33.30.9.i386", "3AS:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390", "3AS:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3AS:openssh-server-0:3.6.1p2-33.30.9.i386", "3AS:openssh-server-0:3.6.1p2-33.30.9.ia64", "3AS:openssh-server-0:3.6.1p2-33.30.9.ppc", "3AS:openssh-server-0:3.6.1p2-33.30.9.s390", "3AS:openssh-server-0:3.6.1p2-33.30.9.s390x", "3AS:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-0:3.6.1p2-33.30.9.src", "3Desktop:openssh-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.i386", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ia64", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.ppc", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.s390x", "3Desktop:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-0:3.6.1p2-33.30.9.i386", "3ES:openssh-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-0:3.6.1p2-33.30.9.s390", "3ES:openssh-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-0:3.6.1p2-33.30.9.src", "3ES:openssh-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-clients-0:3.6.1p2-33.30.9.i386", "3ES:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390", "3ES:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3ES:openssh-server-0:3.6.1p2-33.30.9.i386", "3ES:openssh-server-0:3.6.1p2-33.30.9.ia64", "3ES:openssh-server-0:3.6.1p2-33.30.9.ppc", "3ES:openssh-server-0:3.6.1p2-33.30.9.s390", "3ES:openssh-server-0:3.6.1p2-33.30.9.s390x", "3ES:openssh-server-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-0:3.6.1p2-33.30.9.i386", "3WS:openssh-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-0:3.6.1p2-33.30.9.s390", "3WS:openssh-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-0:3.6.1p2-33.30.9.src", "3WS:openssh-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.i386", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-askpass-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.i386", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-clients-0:3.6.1p2-33.30.9.i386", "3WS:openssh-clients-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-clients-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390", "3WS:openssh-clients-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-clients-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.i386", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-debuginfo-0:3.6.1p2-33.30.9.x86_64", "3WS:openssh-server-0:3.6.1p2-33.30.9.i386", "3WS:openssh-server-0:3.6.1p2-33.30.9.ia64", "3WS:openssh-server-0:3.6.1p2-33.30.9.ppc", "3WS:openssh-server-0:3.6.1p2-33.30.9.s390", "3WS:openssh-server-0:3.6.1p2-33.30.9.s390x", "3WS:openssh-server-0:3.6.1p2-33.30.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0298" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "local to local copy uses shell expansion twice" } ] }
gsd-2006-0225
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2006-0225", "description": "scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.", "id": "GSD-2006-0225", "references": [ "https://www.suse.com/security/cve/CVE-2006-0225.html", "https://access.redhat.com/errata/RHSA-2006:0698", "https://access.redhat.com/errata/RHSA-2006:0298", "https://access.redhat.com/errata/RHSA-2006:0044" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2006-0225" ], "details": "scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.", "id": "GSD-2006-0225", "modified": "2023-12-13T01:19:50.716644Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2006-0225", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc", "refsource": "MISC", "url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc" }, { "name": "http://secunia.com/advisories/21262", "refsource": "MISC", "url": "http://secunia.com/advisories/21262" }, { "name": "http://secunia.com/advisories/23340", "refsource": "MISC", "url": "http://secunia.com/advisories/23340" }, { "name": "http://secunia.com/advisories/23680", "refsource": "MISC", "url": "http://secunia.com/advisories/23680" }, { "name": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html", "refsource": "MISC", "url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html" }, { "name": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html", "refsource": "MISC", "url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html" }, { "name": "http://www.securityfocus.com/archive/1/425397/100/0/threaded", "refsource": "MISC", "url": "http://www.securityfocus.com/archive/1/425397/100/0/threaded" }, { "name": "http://docs.info.apple.com/article.html?artnum=305214", "refsource": "MISC", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html", "refsource": "MISC", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "http://secunia.com/advisories/24479", "refsource": "MISC", "url": "http://secunia.com/advisories/24479" }, { "name": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html", "refsource": "MISC", "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "http://www.vupen.com/english/advisories/2007/0930", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch", "refsource": "MISC", "url": "ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch" }, { "name": "http://blogs.sun.com/security/entry/sun_alert_102961_security_vulnerability", "refsource": "MISC", "url": "http://blogs.sun.com/security/entry/sun_alert_102961_security_vulnerability" }, { "name": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112", "refsource": "MISC", "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112" }, { "name": "http://secunia.com/advisories/18579", "refsource": "MISC", "url": "http://secunia.com/advisories/18579" }, { "name": "http://secunia.com/advisories/18595", "refsource": "MISC", "url": "http://secunia.com/advisories/18595" }, { "name": "http://secunia.com/advisories/18650", "refsource": "MISC", "url": "http://secunia.com/advisories/18650" }, { "name": "http://secunia.com/advisories/18736", "refsource": "MISC", "url": "http://secunia.com/advisories/18736" }, { "name": "http://secunia.com/advisories/18798", "refsource": "MISC", "url": "http://secunia.com/advisories/18798" }, { "name": "http://secunia.com/advisories/18850", "refsource": "MISC", "url": "http://secunia.com/advisories/18850" }, { "name": "http://secunia.com/advisories/18910", "refsource": "MISC", "url": "http://secunia.com/advisories/18910" }, { "name": "http://secunia.com/advisories/18964", "refsource": "MISC", "url": "http://secunia.com/advisories/18964" }, { "name": "http://secunia.com/advisories/18969", "refsource": "MISC", "url": "http://secunia.com/advisories/18969" }, { "name": "http://secunia.com/advisories/18970", "refsource": "MISC", "url": "http://secunia.com/advisories/18970" }, { "name": "http://secunia.com/advisories/19159", "refsource": "MISC", "url": "http://secunia.com/advisories/19159" }, { "name": "http://secunia.com/advisories/20723", "refsource": "MISC", "url": "http://secunia.com/advisories/20723" }, { "name": "http://secunia.com/advisories/21129", "refsource": "MISC", "url": "http://secunia.com/advisories/21129" }, { "name": "http://secunia.com/advisories/21492", "refsource": "MISC", "url": "http://secunia.com/advisories/21492" }, { "name": "http://secunia.com/advisories/21724", "refsource": "MISC", "url": "http://secunia.com/advisories/21724" }, { "name": "http://secunia.com/advisories/22196", "refsource": "MISC", "url": "http://secunia.com/advisories/22196" }, { "name": "http://secunia.com/advisories/23241", "refsource": "MISC", "url": "http://secunia.com/advisories/23241" }, { "name": "http://secunia.com/advisories/25607", "refsource": "MISC", "url": "http://secunia.com/advisories/25607" }, { "name": "http://secunia.com/advisories/25936", "refsource": "MISC", "url": "http://secunia.com/advisories/25936" }, { "name": "http://securityreason.com/securityalert/462", "refsource": "MISC", "url": "http://securityreason.com/securityalert/462" }, { "name": "http://securitytracker.com/id?1015540", "refsource": "MISC", "url": "http://securitytracker.com/id?1015540" }, { "name": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.425802", "refsource": "MISC", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.425802" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102961-1", "refsource": "MISC", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102961-1" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-158.htm", "refsource": "MISC", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-158.htm" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm", "refsource": "MISC", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm", "refsource": "MISC", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2007-246.htm", "refsource": "MISC", "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-246.htm" }, { "name": "http://www.gentoo.org/security/en/glsa/glsa-200602-11.xml", "refsource": "MISC", "url": "http://www.gentoo.org/security/en/glsa/glsa-200602-11.xml" }, { "name": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:034", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:034" }, { "name": "http://www.novell.com/linux/security/advisories/2006_08_openssh.html", "refsource": "MISC", "url": "http://www.novell.com/linux/security/advisories/2006_08_openssh.html" }, { "name": "http://www.openpkg.org/security/OpenPKG-SA-2006.003-openssh.html", "refsource": "MISC", "url": "http://www.openpkg.org/security/OpenPKG-SA-2006.003-openssh.html" }, { "name": "http://www.osvdb.org/22692", "refsource": "MISC", "url": "http://www.osvdb.org/22692" }, { "name": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00062.html", "refsource": "MISC", "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00062.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2006-0044.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2006-0044.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2006-0298.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2006-0298.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2006-0698.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2006-0698.html" }, { "name": "http://www.securityfocus.com/bid/16369", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/16369" }, { "name": "http://www.trustix.org/errata/2006/0004", "refsource": "MISC", "url": "http://www.trustix.org/errata/2006/0004" }, { "name": "http://www.ubuntu.com/usn/usn-255-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/usn-255-1" }, { "name": "http://www.vupen.com/english/advisories/2006/0306", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/0306" }, { "name": "http://www.vupen.com/english/advisories/2006/2490", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/2490" }, { "name": "http://www.vupen.com/english/advisories/2006/4869", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/4869" }, { "name": "http://www.vupen.com/english/advisories/2007/2120", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2007/2120" }, { "name": "http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688", "refsource": "MISC", "url": "http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688" }, { "name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=2751", "refsource": "MISC", "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=2751" }, { "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026", "refsource": "MISC", "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24305", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24305" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1138", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1138" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9962", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9962" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2006-0225" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026" }, { "name": "16369", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/16369" }, { "name": "18579", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/18579" }, { "name": "18595", "refsource": "SECUNIA", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/18595" }, { "name": "2006-0004", "refsource": "TRUSTIX", "tags": [], "url": "http://www.trustix.org/errata/2006/0004" }, { "name": "1015540", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1015540" }, { "name": "18650", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/18650" }, { "name": "18736", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/18736" }, { "name": "20060212 [3.8] 005: SECURITY FIX: February 12, 2006", "refsource": "OPENBSD", "tags": [], "url": "ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch" }, { "name": "SUSE-SA:2006:008", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2006_08_openssh.html" }, { "name": "18798", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/18798" }, { "name": "18850", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/18850" }, { "name": "OpenPKG-SA-2006.003", "refsource": "OPENPKG", "tags": [], "url": "http://www.openpkg.org/security/OpenPKG-SA-2006.003-openssh.html" }, { "name": "SSA:2006-045-06", "refsource": "SLACKWARE", "tags": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.425802" }, { "name": "18910", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/18910" }, { "name": "GLSA-200602-11", "refsource": "GENTOO", "tags": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200602-11.xml" }, { "name": "USN-255-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-255-1" }, { "name": "22692", "refsource": "OSVDB", "tags": [], "url": "http://www.osvdb.org/22692" }, { "name": "18964", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/18964" }, { "name": "18969", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/18969" }, { "name": "18970", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/18970" }, { "name": "RHSA-2006:0044", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0044.html" }, { "name": "19159", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/19159" }, { "name": "http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688", "refsource": "CONFIRM", "tags": [], "url": "http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688" }, { "name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=2751", "refsource": "CONFIRM", "tags": [], "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=2751" }, { "name": "20723", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/20723" }, { "name": "RHSA-2006:0298", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0298.html" }, { "name": "21129", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/21129" }, { "name": "20060703-01-P", "refsource": "SGI", "tags": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc" }, { "name": "21262", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/21262" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-158.htm", "refsource": "CONFIRM", "tags": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-158.htm" }, { "name": "21492", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/21492" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm", "refsource": "CONFIRM", "tags": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm" }, { "name": "21724", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/21724" }, { "name": "RHSA-2006:0698", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0698.html" }, { "name": "22196", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22196" }, { "name": "23241", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23241" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm", "refsource": "CONFIRM", "tags": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm" }, { "name": "23340", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23340" }, { "name": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html" }, { "name": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html" }, { "name": "23680", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23680" }, { "name": "http://docs.info.apple.com/article.html?artnum=305214", "refsource": "CONFIRM", "tags": [], "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "24479", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/24479" }, { "name": "http://blogs.sun.com/security/entry/sun_alert_102961_security_vulnerability", "refsource": "CONFIRM", "tags": [], "url": "http://blogs.sun.com/security/entry/sun_alert_102961_security_vulnerability" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2007-246.htm", "refsource": "CONFIRM", "tags": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-246.htm" }, { "name": "APPLE-SA-2007-03-13", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "MDKSA-2006:034", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:034" }, { "name": "102961", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102961-1" }, { "name": "TA07-072A", "refsource": "CERT", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "25607", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/25607" }, { "name": "25936", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/25936" }, { "name": "462", "refsource": "SREASON", "tags": [], "url": "http://securityreason.com/securityalert/462" }, { "name": "ADV-2007-0930", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "ADV-2006-0306", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/0306" }, { "name": "ADV-2007-2120", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/2120" }, { "name": "ADV-2006-4869", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/4869" }, { "name": "ADV-2006-2490", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/2490" }, { "name": "HPSBUX02178", "refsource": "HP", "tags": [], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112" }, { "name": "FEDORA-2006-056", "refsource": "FEDORA", "tags": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00062.html" }, { "name": "openssh-scp-command-execution(24305)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24305" }, { "name": "oval:org.mitre.oval:def:9962", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9962" }, { "name": "oval:org.mitre.oval:def:1138", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1138" }, { "name": "FLSA-2006:168935", "refsource": "FEDORA", "tags": [], "url": "http://www.securityfocus.com/archive/1/425397/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-19T15:43Z", "publishedDate": "2006-01-25T11:03Z" } } }
opensuse-su-2024:11124-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
openssh-8.4p1-7.4 on GA media
Notes
Title of the patch
openssh-8.4p1-7.4 on GA media
Description of the patch
These are all security issues fixed in the openssh-8.4p1-7.4 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11124
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "openssh-8.4p1-7.4 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the openssh-8.4p1-7.4 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11124", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11124-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2006-0225 page", "url": "https://www.suse.com/security/cve/CVE-2006-0225/" }, { "category": "self", "summary": "SUSE CVE CVE-2007-4752 page", "url": "https://www.suse.com/security/cve/CVE-2007-4752/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-1483 page", "url": "https://www.suse.com/security/cve/CVE-2008-1483/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10009 page", "url": "https://www.suse.com/security/cve/CVE-2016-10009/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10010 page", "url": "https://www.suse.com/security/cve/CVE-2016-10010/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10011 page", "url": "https://www.suse.com/security/cve/CVE-2016-10011/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10012 page", "url": "https://www.suse.com/security/cve/CVE-2016-10012/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8858 page", "url": "https://www.suse.com/security/cve/CVE-2016-8858/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20685 page", "url": "https://www.suse.com/security/cve/CVE-2018-20685/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6109 page", "url": "https://www.suse.com/security/cve/CVE-2019-6109/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6110 page", "url": "https://www.suse.com/security/cve/CVE-2019-6110/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6111 page", "url": "https://www.suse.com/security/cve/CVE-2019-6111/" } ], "title": "openssh-8.4p1-7.4 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11124-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openssh-8.4p1-7.4.aarch64", "product": { "name": "openssh-8.4p1-7.4.aarch64", "product_id": "openssh-8.4p1-7.4.aarch64" } }, { "category": "product_version", "name": "openssh-cavs-8.4p1-7.4.aarch64", "product": { "name": "openssh-cavs-8.4p1-7.4.aarch64", "product_id": "openssh-cavs-8.4p1-7.4.aarch64" } }, { "category": "product_version", "name": "openssh-clients-8.4p1-7.4.aarch64", "product": { "name": "openssh-clients-8.4p1-7.4.aarch64", "product_id": "openssh-clients-8.4p1-7.4.aarch64" } }, { "category": "product_version", "name": "openssh-common-8.4p1-7.4.aarch64", "product": { "name": "openssh-common-8.4p1-7.4.aarch64", "product_id": "openssh-common-8.4p1-7.4.aarch64" } }, { "category": "product_version", "name": "openssh-fips-8.4p1-7.4.aarch64", "product": { "name": "openssh-fips-8.4p1-7.4.aarch64", "product_id": "openssh-fips-8.4p1-7.4.aarch64" } }, { "category": "product_version", "name": "openssh-helpers-8.4p1-7.4.aarch64", "product": { "name": "openssh-helpers-8.4p1-7.4.aarch64", "product_id": "openssh-helpers-8.4p1-7.4.aarch64" } }, { "category": "product_version", "name": "openssh-server-8.4p1-7.4.aarch64", "product": { "name": "openssh-server-8.4p1-7.4.aarch64", "product_id": "openssh-server-8.4p1-7.4.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "openssh-8.4p1-7.4.ppc64le", "product": { "name": "openssh-8.4p1-7.4.ppc64le", "product_id": "openssh-8.4p1-7.4.ppc64le" } }, { "category": "product_version", "name": "openssh-cavs-8.4p1-7.4.ppc64le", "product": { "name": "openssh-cavs-8.4p1-7.4.ppc64le", "product_id": "openssh-cavs-8.4p1-7.4.ppc64le" } }, { "category": "product_version", "name": "openssh-clients-8.4p1-7.4.ppc64le", "product": { "name": "openssh-clients-8.4p1-7.4.ppc64le", "product_id": "openssh-clients-8.4p1-7.4.ppc64le" } }, { "category": "product_version", "name": "openssh-common-8.4p1-7.4.ppc64le", "product": { "name": "openssh-common-8.4p1-7.4.ppc64le", "product_id": "openssh-common-8.4p1-7.4.ppc64le" } }, { "category": "product_version", "name": "openssh-fips-8.4p1-7.4.ppc64le", "product": { "name": "openssh-fips-8.4p1-7.4.ppc64le", "product_id": "openssh-fips-8.4p1-7.4.ppc64le" } }, { "category": "product_version", "name": "openssh-helpers-8.4p1-7.4.ppc64le", "product": { "name": "openssh-helpers-8.4p1-7.4.ppc64le", "product_id": "openssh-helpers-8.4p1-7.4.ppc64le" } }, { "category": "product_version", "name": "openssh-server-8.4p1-7.4.ppc64le", "product": { "name": "openssh-server-8.4p1-7.4.ppc64le", "product_id": "openssh-server-8.4p1-7.4.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssh-8.4p1-7.4.s390x", "product": { "name": "openssh-8.4p1-7.4.s390x", "product_id": "openssh-8.4p1-7.4.s390x" } }, { "category": "product_version", "name": "openssh-cavs-8.4p1-7.4.s390x", "product": { "name": "openssh-cavs-8.4p1-7.4.s390x", "product_id": "openssh-cavs-8.4p1-7.4.s390x" } }, { "category": "product_version", "name": "openssh-clients-8.4p1-7.4.s390x", "product": { "name": "openssh-clients-8.4p1-7.4.s390x", "product_id": "openssh-clients-8.4p1-7.4.s390x" } }, { "category": "product_version", "name": "openssh-common-8.4p1-7.4.s390x", "product": { "name": "openssh-common-8.4p1-7.4.s390x", "product_id": "openssh-common-8.4p1-7.4.s390x" } }, { "category": "product_version", "name": "openssh-fips-8.4p1-7.4.s390x", "product": { "name": "openssh-fips-8.4p1-7.4.s390x", "product_id": "openssh-fips-8.4p1-7.4.s390x" } }, { "category": "product_version", "name": "openssh-helpers-8.4p1-7.4.s390x", "product": { "name": "openssh-helpers-8.4p1-7.4.s390x", "product_id": "openssh-helpers-8.4p1-7.4.s390x" } }, { "category": "product_version", "name": "openssh-server-8.4p1-7.4.s390x", "product": { "name": "openssh-server-8.4p1-7.4.s390x", "product_id": "openssh-server-8.4p1-7.4.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-8.4p1-7.4.x86_64", "product": { "name": "openssh-8.4p1-7.4.x86_64", "product_id": "openssh-8.4p1-7.4.x86_64" } }, { "category": "product_version", "name": "openssh-cavs-8.4p1-7.4.x86_64", "product": { "name": "openssh-cavs-8.4p1-7.4.x86_64", "product_id": "openssh-cavs-8.4p1-7.4.x86_64" } }, { "category": "product_version", "name": "openssh-clients-8.4p1-7.4.x86_64", "product": { "name": "openssh-clients-8.4p1-7.4.x86_64", "product_id": "openssh-clients-8.4p1-7.4.x86_64" } }, { "category": "product_version", "name": "openssh-common-8.4p1-7.4.x86_64", "product": { "name": "openssh-common-8.4p1-7.4.x86_64", "product_id": "openssh-common-8.4p1-7.4.x86_64" } }, { "category": "product_version", "name": "openssh-fips-8.4p1-7.4.x86_64", "product": { "name": "openssh-fips-8.4p1-7.4.x86_64", "product_id": "openssh-fips-8.4p1-7.4.x86_64" } }, { "category": "product_version", "name": "openssh-helpers-8.4p1-7.4.x86_64", "product": { "name": "openssh-helpers-8.4p1-7.4.x86_64", "product_id": "openssh-helpers-8.4p1-7.4.x86_64" } }, { "category": "product_version", "name": "openssh-server-8.4p1-7.4.x86_64", "product": { "name": "openssh-server-8.4p1-7.4.x86_64", "product_id": "openssh-server-8.4p1-7.4.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-7.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64" }, "product_reference": "openssh-8.4p1-7.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-7.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le" }, "product_reference": "openssh-8.4p1-7.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-7.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x" }, "product_reference": "openssh-8.4p1-7.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-8.4p1-7.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64" }, "product_reference": "openssh-8.4p1-7.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-8.4p1-7.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64" }, "product_reference": "openssh-cavs-8.4p1-7.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-8.4p1-7.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le" }, "product_reference": "openssh-cavs-8.4p1-7.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-8.4p1-7.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x" }, "product_reference": "openssh-cavs-8.4p1-7.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-cavs-8.4p1-7.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64" }, "product_reference": "openssh-cavs-8.4p1-7.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-7.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64" }, "product_reference": "openssh-clients-8.4p1-7.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-7.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le" }, "product_reference": "openssh-clients-8.4p1-7.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-7.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x" }, "product_reference": "openssh-clients-8.4p1-7.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-8.4p1-7.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64" }, "product_reference": "openssh-clients-8.4p1-7.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-7.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64" }, "product_reference": "openssh-common-8.4p1-7.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-7.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le" }, "product_reference": "openssh-common-8.4p1-7.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-7.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x" }, "product_reference": "openssh-common-8.4p1-7.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-common-8.4p1-7.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64" }, "product_reference": "openssh-common-8.4p1-7.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-7.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64" }, "product_reference": "openssh-fips-8.4p1-7.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-7.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le" }, "product_reference": "openssh-fips-8.4p1-7.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-7.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x" }, "product_reference": "openssh-fips-8.4p1-7.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-fips-8.4p1-7.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64" }, "product_reference": "openssh-fips-8.4p1-7.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-7.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64" }, "product_reference": "openssh-helpers-8.4p1-7.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-7.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le" }, "product_reference": "openssh-helpers-8.4p1-7.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-7.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x" }, "product_reference": "openssh-helpers-8.4p1-7.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-helpers-8.4p1-7.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64" }, "product_reference": "openssh-helpers-8.4p1-7.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-7.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64" }, "product_reference": "openssh-server-8.4p1-7.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-7.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le" }, "product_reference": "openssh-server-8.4p1-7.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-7.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x" }, "product_reference": "openssh-server-8.4p1-7.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-8.4p1-7.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" }, "product_reference": "openssh-server-8.4p1-7.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-0225", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2006-0225" } ], "notes": [ { "category": "general", "text": "scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2006-0225", "url": "https://www.suse.com/security/cve/CVE-2006-0225" }, { "category": "external", "summary": "SUSE Bug 143435 for CVE-2006-0225", "url": "https://bugzilla.suse.com/143435" }, { "category": "external", "summary": "SUSE Bug 206456 for CVE-2006-0225", "url": "https://bugzilla.suse.com/206456" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2006-0225" }, { "cve": "CVE-2007-4752", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-4752" } ], "notes": [ { "category": "general", "text": "ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-4752", "url": "https://www.suse.com/security/cve/CVE-2007-4752" }, { "category": "external", "summary": "SUSE Bug 308521 for CVE-2007-4752", "url": "https://bugzilla.suse.com/308521" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2007-4752" }, { "cve": "CVE-2008-1483", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-1483" } ], "notes": [ { "category": "general", "text": "OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-1483", "url": "https://www.suse.com/security/cve/CVE-2008-1483" }, { "category": "external", "summary": "SUSE Bug 1069509 for CVE-2008-1483", "url": "https://bugzilla.suse.com/1069509" }, { "category": "external", "summary": "SUSE Bug 373527 for CVE-2008-1483", "url": "https://bugzilla.suse.com/373527" }, { "category": "external", "summary": "SUSE Bug 585630 for CVE-2008-1483", "url": "https://bugzilla.suse.com/585630" }, { "category": "external", "summary": "SUSE Bug 647633 for CVE-2008-1483", "url": "https://bugzilla.suse.com/647633" }, { "category": "external", "summary": "SUSE Bug 706386 for CVE-2008-1483", "url": "https://bugzilla.suse.com/706386" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2008-1483" }, { "cve": "CVE-2016-10009", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10009" } ], "notes": [ { "category": "general", "text": "Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10009", "url": "https://www.suse.com/security/cve/CVE-2016-10009" }, { "category": "external", "summary": "SUSE Bug 1016336 for CVE-2016-10009", "url": "https://bugzilla.suse.com/1016336" }, { "category": "external", "summary": "SUSE Bug 1016366 for CVE-2016-10009", "url": "https://bugzilla.suse.com/1016366" }, { "category": "external", "summary": "SUSE Bug 1016370 for CVE-2016-10009", "url": "https://bugzilla.suse.com/1016370" }, { "category": "external", "summary": "SUSE Bug 1026634 for CVE-2016-10009", "url": "https://bugzilla.suse.com/1026634" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2016-10009", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 1213504 for CVE-2016-10009", "url": "https://bugzilla.suse.com/1213504" }, { "category": "external", "summary": "SUSE Bug 1217035 for CVE-2016-10009", "url": "https://bugzilla.suse.com/1217035" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-10009" }, { "cve": "CVE-2016-10010", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10010" } ], "notes": [ { "category": "general", "text": "sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10010", "url": "https://www.suse.com/security/cve/CVE-2016-10010" }, { "category": "external", "summary": "SUSE Bug 1016336 for CVE-2016-10010", "url": "https://bugzilla.suse.com/1016336" }, { "category": "external", "summary": "SUSE Bug 1016368 for CVE-2016-10010", "url": "https://bugzilla.suse.com/1016368" }, { "category": "external", "summary": "SUSE Bug 1021751 for CVE-2016-10010", "url": "https://bugzilla.suse.com/1021751" }, { "category": "external", "summary": "SUSE Bug 1196721 for CVE-2016-10010", "url": "https://bugzilla.suse.com/1196721" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-10010" }, { "cve": "CVE-2016-10011", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10011" } ], "notes": [ { "category": "general", "text": "authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10011", "url": "https://www.suse.com/security/cve/CVE-2016-10011" }, { "category": "external", "summary": "SUSE Bug 1016336 for CVE-2016-10011", "url": "https://bugzilla.suse.com/1016336" }, { "category": "external", "summary": "SUSE Bug 1016369 for CVE-2016-10011", "url": "https://bugzilla.suse.com/1016369" }, { "category": "external", "summary": "SUSE Bug 1016370 for CVE-2016-10011", "url": "https://bugzilla.suse.com/1016370" }, { "category": "external", "summary": "SUSE Bug 1017870 for CVE-2016-10011", "url": "https://bugzilla.suse.com/1017870" }, { "category": "external", "summary": "SUSE Bug 1026634 for CVE-2016-10011", "url": "https://bugzilla.suse.com/1026634" }, { "category": "external", "summary": "SUSE Bug 1029445 for CVE-2016-10011", "url": "https://bugzilla.suse.com/1029445" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-10011" }, { "cve": "CVE-2016-10012", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10012" } ], "notes": [ { "category": "general", "text": "The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10012", "url": "https://www.suse.com/security/cve/CVE-2016-10012" }, { "category": "external", "summary": "SUSE Bug 1006166 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1006166" }, { "category": "external", "summary": "SUSE Bug 1016336 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1016336" }, { "category": "external", "summary": "SUSE Bug 1016369 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1016369" }, { "category": "external", "summary": "SUSE Bug 1016370 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1016370" }, { "category": "external", "summary": "SUSE Bug 1017870 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1017870" }, { "category": "external", "summary": "SUSE Bug 1026634 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1026634" }, { "category": "external", "summary": "SUSE Bug 1035742 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1035742" }, { "category": "external", "summary": "SUSE Bug 1073044 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1073044" }, { "category": "external", "summary": "SUSE Bug 1092582 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1092582" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2016-10012", "url": "https://bugzilla.suse.com/1138392" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-10012" }, { "cve": "CVE-2016-8858", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8858" } ], "notes": [ { "category": "general", "text": "The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that \"OpenSSH upstream does not consider this as a security issue.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8858", "url": "https://www.suse.com/security/cve/CVE-2016-8858" }, { "category": "external", "summary": "SUSE Bug 1005480 for CVE-2016-8858", "url": "https://bugzilla.suse.com/1005480" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-8858" }, { "cve": "CVE-2018-20685", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20685" } ], "notes": [ { "category": "general", "text": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20685", "url": "https://www.suse.com/security/cve/CVE-2018-20685" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1123220 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1123220" }, { "category": "external", "summary": "SUSE Bug 1131109 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1131109" }, { "category": "external", "summary": "SUSE Bug 1134932 for CVE-2018-20685", "url": "https://bugzilla.suse.com/1134932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-20685" }, { "cve": "CVE-2019-6109", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6109" } ], "notes": [ { "category": "general", "text": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6109", "url": "https://www.suse.com/security/cve/CVE-2019-6109" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1121821" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 1144902 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1144902" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1148884 for CVE-2019-6109", "url": "https://bugzilla.suse.com/1148884" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-6109" }, { "cve": "CVE-2019-6110", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6110" } ], "notes": [ { "category": "general", "text": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6110", "url": "https://www.suse.com/security/cve/CVE-2019-6110" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6110", "url": "https://bugzilla.suse.com/1121821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-6110" }, { "cve": "CVE-2019-6111", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6111" } ], "notes": [ { "category": "general", "text": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6111", "url": "https://www.suse.com/security/cve/CVE-2019-6111" }, { "category": "external", "summary": "SUSE Bug 1121571 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121571" }, { "category": "external", "summary": "SUSE Bug 1121816 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121816" }, { "category": "external", "summary": "SUSE Bug 1121818 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121818" }, { "category": "external", "summary": "SUSE Bug 1121821 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1121821" }, { "category": "external", "summary": "SUSE Bug 1123028 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1123028" }, { "category": "external", "summary": "SUSE Bug 1123220 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1123220" }, { "category": "external", "summary": "SUSE Bug 1131109 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1131109" }, { "category": "external", "summary": "SUSE Bug 1138392 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1138392" }, { "category": "external", "summary": "SUSE Bug 1144902 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1144902" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1148884 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1148884" }, { "category": "external", "summary": "SUSE Bug 1201840 for CVE-2019-6111", "url": "https://bugzilla.suse.com/1201840" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:openssh-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-cavs-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-clients-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-common-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-fips-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-helpers-8.4p1-7.4.x86_64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.aarch64", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.ppc64le", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.s390x", "openSUSE Tumbleweed:openssh-server-8.4p1-7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-6111" } ] }
ghsa-fjc8-474c-2xx3
Vulnerability from github
Published
2022-05-03 03:15
Modified
2022-05-03 03:15
VLAI Severity ?
Details
scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.
{ "affected": [], "aliases": [ "CVE-2006-0225" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2006-01-25T11:03:00Z", "severity": "MODERATE" }, "details": "scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.", "id": "GHSA-fjc8-474c-2xx3", "modified": "2022-05-03T03:15:29Z", "published": "2022-05-03T03:15:29Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0225" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24305" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1138" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9962" }, { "type": "WEB", "url": "http://blogs.sun.com/security/entry/sun_alert_102961_security_vulnerability" }, { "type": "WEB", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "type": "WEB", "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/18579" }, { "type": "WEB", "url": "http://secunia.com/advisories/18595" }, { "type": "WEB", "url": "http://secunia.com/advisories/18650" }, { "type": "WEB", "url": "http://secunia.com/advisories/18736" }, { "type": "WEB", "url": "http://secunia.com/advisories/18798" }, { "type": "WEB", "url": "http://secunia.com/advisories/18850" }, { "type": "WEB", "url": "http://secunia.com/advisories/18910" }, { "type": "WEB", "url": "http://secunia.com/advisories/18964" }, { "type": "WEB", "url": "http://secunia.com/advisories/18969" }, { "type": "WEB", "url": "http://secunia.com/advisories/18970" }, { "type": "WEB", "url": "http://secunia.com/advisories/19159" }, { "type": "WEB", "url": "http://secunia.com/advisories/20723" }, { "type": "WEB", "url": "http://secunia.com/advisories/21129" }, { "type": "WEB", "url": "http://secunia.com/advisories/21262" }, { "type": "WEB", "url": "http://secunia.com/advisories/21492" }, { "type": "WEB", "url": "http://secunia.com/advisories/21724" }, { "type": "WEB", "url": "http://secunia.com/advisories/22196" }, { "type": "WEB", "url": "http://secunia.com/advisories/23241" }, { "type": "WEB", "url": "http://secunia.com/advisories/23340" }, { "type": "WEB", "url": "http://secunia.com/advisories/23680" }, { "type": "WEB", "url": "http://secunia.com/advisories/24479" }, { "type": "WEB", "url": "http://secunia.com/advisories/25607" }, { "type": "WEB", "url": "http://secunia.com/advisories/25936" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/462" }, { "type": "WEB", "url": "http://securitytracker.com/id?1015540" }, { "type": "WEB", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.425802" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102961-1" }, { "type": "WEB", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-158.htm" }, { "type": "WEB", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm" }, { "type": "WEB", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm" }, { "type": "WEB", "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-246.htm" }, { "type": "WEB", "url": "http://www.gentoo.org/security/en/glsa/glsa-200602-11.xml" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:034" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2006_08_openssh.html" }, { "type": "WEB", "url": "http://www.openpkg.org/security/OpenPKG-SA-2006.003-openssh.html" }, { "type": "WEB", "url": "http://www.osvdb.org/22692" }, { "type": "WEB", "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00062.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2006-0044.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2006-0298.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2006-0698.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/425397/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/16369" }, { "type": "WEB", "url": "http://www.trustix.org/errata/2006/0004" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-255-1" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "type": "WEB", "url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html" }, { "type": "WEB", "url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/0306" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/2490" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/4869" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/2120" }, { "type": "WEB", "url": "http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688" }, { "type": "WEB", "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=2751" } ], "schema_version": "1.4.0", "severity": [] }
fkie_cve-2006-0225
Vulnerability from fkie_nvd
Published
2006-01-25 11:03
Modified
2025-04-03 01:03
Severity ?
Summary
scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openbsd | openssh | 3.0 | |
openbsd | openssh | 3.0.1 | |
openbsd | openssh | 3.0.1p1 | |
openbsd | openssh | 3.0.2 | |
openbsd | openssh | 3.0.2p1 | |
openbsd | openssh | 3.0p1 | |
openbsd | openssh | 3.1 | |
openbsd | openssh | 3.1p1 | |
openbsd | openssh | 3.2 | |
openbsd | openssh | 3.2.2p1 | |
openbsd | openssh | 3.2.3p1 | |
openbsd | openssh | 3.3 | |
openbsd | openssh | 3.3p1 | |
openbsd | openssh | 3.4 | |
openbsd | openssh | 3.4p1 | |
openbsd | openssh | 3.5 | |
openbsd | openssh | 3.5p1 | |
openbsd | openssh | 3.6 | |
openbsd | openssh | 3.6.1 | |
openbsd | openssh | 3.6.1p1 | |
openbsd | openssh | 3.6.1p2 | |
openbsd | openssh | 3.7 | |
openbsd | openssh | 3.7.1 | |
openbsd | openssh | 3.7.1p2 | |
openbsd | openssh | 3.8 | |
openbsd | openssh | 3.8.1 | |
openbsd | openssh | 3.8.1p1 | |
openbsd | openssh | 3.9 | |
openbsd | openssh | 3.9.1 | |
openbsd | openssh | 3.9.1p1 | |
openbsd | openssh | 4.0p1 | |
openbsd | openssh | 4.1p1 | |
openbsd | openssh | 4.2p1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "580008AC-2667-4708-8F7E-D70416A460EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E05D8E86-EC01-4589-B372-4DEB7845C81F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*", "matchCriteriaId": "764AD252-CA2F-4A87-BCAA-7747E8C410E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "CFFAA075-4277-4FD8-8A5A-867EEE1BA2F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*", "matchCriteriaId": "269BB9F7-55E5-4CB3-8429-C37C7132799F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*", "matchCriteriaId": "C6E6F639-31A0-4026-B6D4-51BA79FB1D20", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "0211BCE3-0DED-40BA-8A21-1A97B91F71C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*", "matchCriteriaId": "B4EE9E4B-CABC-4EA2-9075-CC23CEB1B0A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "5AD7BB30-AC79-4153-852C-1053DCF4DE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*", "matchCriteriaId": "9E188C66-C8F1-4C13-AAFF-7C83B2A884B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*", "matchCriteriaId": "9039BE91-AF0A-41E7-8F9F-15375890E120", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "08BCB2EA-DF9D-4853-805B-29FA6274E2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*", "matchCriteriaId": "0F93417F-2498-4576-9F5D-B59F77D39669", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*", "matchCriteriaId": "AF3AB42C-B614-4746-99AD-E94140D91BF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*", "matchCriteriaId": "458167E5-9BC2-40BE-AC8A-9761A4F19494", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "3FB9B4C7-4235-4388-8E5D-E72ECCC37A7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*", "matchCriteriaId": "86ACA0ED-A3D0-48A7-B06F-13709AD23B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "0FEB9262-D05E-4610-9C79-3EDE44AC7C0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "8176879B-1875-4AC9-B15A-2ABCFCD04F88", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*", "matchCriteriaId": "FAA26A12-F96A-4025-BBCA-72B7A3B1E60C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*", "matchCriteriaId": "A02751E9-2D38-4495-9572-8D84D71D4773", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*", "matchCriteriaId": "7A36BEA2-DAE4-423C-8D85-0F6036351F98", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "80DC64F6-FE28-44BA-91D1-EC2DB11B2CFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*", "matchCriteriaId": "44CCF5CD-B434-4392-A79A-C1945D2AE30A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*", "matchCriteriaId": "AEB456B8-9D8B-4985-858D-6A43FA5EE2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2BD4E0F6-4EEA-4EC7-83E7-FC6F7D2E7A3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*", "matchCriteriaId": "C35F4ABE-1B0C-4195-8F99-BF993A17882B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*", "matchCriteriaId": "ADC7352D-2916-47F7-A256-F897D763DC9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "AEC3FC36-B246-4DCB-8984-228525D9A356", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*", "matchCriteriaId": "BC861000-37D8-4B0F-BFA0-57E9BE125B56", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*", "matchCriteriaId": "5EBE75FE-DDE2-43BA-80EF-15A6698EABC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*", "matchCriteriaId": "683B26F0-5EA2-455A-8948-27C100BBA3AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*", "matchCriteriaId": "7279E1EC-DEBC-4ACC-925D-06A7697C162F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice." }, { "lang": "es", "value": "scp en OpenSSH 4.2p1 permite a atacantes ejecutar \u00f3rdenes de su elecci\u00f3n mediante nombres de ficheros que contienen metacaract\u00e9res o espacios, que son expandidos dos veces." } ], "id": "CVE-2006-0225", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-01-25T11:03:00.000", "references": [ { "source": "secalert@redhat.com", "url": "ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch" }, { "source": "secalert@redhat.com", "url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc" }, { "source": "secalert@redhat.com", "url": "http://blogs.sun.com/security/entry/sun_alert_102961_security_vulnerability" }, { "source": "secalert@redhat.com", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "source": "secalert@redhat.com", "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112" }, { "source": "secalert@redhat.com", "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112" }, { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/18579" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/18595" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/18650" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/18736" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/18798" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/18850" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/18910" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/18964" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/18969" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/18970" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/19159" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/20723" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/21129" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/21262" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/21492" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/21724" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/22196" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/23241" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/23340" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/23680" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/24479" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/25607" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/25936" }, { "source": "secalert@redhat.com", "url": "http://securityreason.com/securityalert/462" }, { "source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1015540" }, { "source": "secalert@redhat.com", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.425802" }, { "source": "secalert@redhat.com", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102961-1" }, { "source": "secalert@redhat.com", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-158.htm" }, { "source": "secalert@redhat.com", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm" }, { "source": "secalert@redhat.com", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm" }, { "source": "secalert@redhat.com", "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-246.htm" }, { "source": "secalert@redhat.com", "url": "http://www.gentoo.org/security/en/glsa/glsa-200602-11.xml" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:034" }, { "source": "secalert@redhat.com", "url": "http://www.novell.com/linux/security/advisories/2006_08_openssh.html" }, { "source": "secalert@redhat.com", "url": "http://www.openpkg.org/security/OpenPKG-SA-2006.003-openssh.html" }, { "source": "secalert@redhat.com", "url": "http://www.osvdb.org/22692" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00062.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2006-0044.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2006-0298.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2006-0698.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/425397/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/16369" }, { "source": "secalert@redhat.com", "url": "http://www.trustix.org/errata/2006/0004" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/usn-255-1" }, { "source": "secalert@redhat.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "source": "secalert@redhat.com", "url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html" }, { "source": "secalert@redhat.com", "url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2006/0306" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2006/2490" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2006/4869" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2007/2120" }, { "source": "secalert@redhat.com", "url": "http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688" }, { "source": "secalert@redhat.com", "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=2751" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24305" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1138" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9962" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://blogs.sun.com/security/entry/sun_alert_102961_security_vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/18579" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/18595" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/18650" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/18736" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/18798" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/18850" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/18910" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/18964" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/18969" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/18970" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/19159" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/21129" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/21262" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/21492" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/21724" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/22196" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/23241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/23340" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/23680" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/24479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/25607" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/25936" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/462" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015540" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.425802" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102961-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-158.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-246.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gentoo.org/security/en/glsa/glsa-200602-11.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:034" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2006_08_openssh.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openpkg.org/security/OpenPKG-SA-2006.003-openssh.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/22692" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00062.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2006-0044.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2006-0298.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2006-0698.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/425397/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/16369" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.trustix.org/errata/2006/0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-255-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/0306" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/2490" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/4869" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=2751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24305" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1138" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9962" } ], "sourceIdentifier": "secalert@redhat.com", "vendorComments": [ { "comment": "This issue was addressed in Red Hat Enterprise Linux 2.1, 3 and 4:\n\nhttps://rhn.redhat.com/errata/CVE-2006-0225.html\nhttps://www.redhat.com/security/data/cve/CVE-2006-0225.html\n\nIssue was fixed upstream in version 4.3. The openssh packages in Red Hat Enterprise Linux 5 are based on the fixed upstream version and were not affected by this flaw.", "lastModified": "2009-09-09T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…