Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-61985 (GCVE-0-2025-61985)
Vulnerability from cvelistv5 – Published: 2025-10-06 00:00 – Updated: 2025-10-06 18:34- CWE-158 - Improper Neutralization of Null Byte or NUL Character
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-61985",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-06T18:33:49.712677Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-06T18:34:24.777Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "OpenSSH",
"vendor": "OpenBSD",
"versions": [
{
"lessThan": "10.1",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "ssh in OpenSSH before 10.1 allows the \u0027\\0\u0027 character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-158",
"description": "CWE-158 Improper Neutralization of Null Byte or NUL Character",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-06T18:19:08.824Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://www.openwall.com/lists/oss-security/2025/10/06/1"
},
{
"url": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2"
},
{
"url": "https://www.openssh.com/releasenotes.html#10.1p1"
}
],
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2025-61985",
"datePublished": "2025-10-06T00:00:00.000Z",
"dateReserved": "2025-10-06T00:00:00.000Z",
"dateUpdated": "2025-10-06T18:34:24.777Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-61985\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2025-10-06T19:15:36.357\",\"lastModified\":\"2025-10-08T19:38:32.610\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"ssh in OpenSSH before 10.1 allows the \u0027\\\\0\u0027 character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":3.6,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.0,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"cve@mitre.org\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-158\"}]}],\"references\":[{\"url\":\"https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.openssh.com/releasenotes.html#10.1p1\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.openwall.com/lists/oss-security/2025/10/06/1\",\"source\":\"cve@mitre.org\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-61985\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-10-06T18:33:49.712677Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-10-06T18:34:17.365Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 3.6, \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N\"}}], \"affected\": [{\"vendor\": \"OpenBSD\", \"product\": \"OpenSSH\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"10.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.openwall.com/lists/oss-security/2025/10/06/1\"}, {\"url\": \"https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2\"}, {\"url\": \"https://www.openssh.com/releasenotes.html#10.1p1\"}], \"x_generator\": {\"engine\": \"enrichogram 0.0.1\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"ssh in OpenSSH before 10.1 allows the \u0027\\\\0\u0027 character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-158\", \"description\": \"CWE-158 Improper Neutralization of Null Byte or NUL Character\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.1\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2025-10-06T18:19:08.824Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-61985\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-06T18:34:24.777Z\", \"dateReserved\": \"2025-10-06T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2025-10-06T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
OPENSUSE-SU-2025-20122-1
Vulnerability from csaf_opensuse - Published: 2025-11-28 07:46 - Updated: 2025-11-28 07:46Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssh",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssh fixes the following issues:\n\n - CVE-2025-61984: code execution via control characters in usernames when a ProxyCommand is used (bsc#1251198).\n - CVE-2025-61985: code execution via \u0027\\0\u0027 character in ssh:// URI when a ProxyCommand is used (bsc#1251199).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-81",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025-20122-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1251198",
"url": "https://bugzilla.suse.com/1251198"
},
{
"category": "self",
"summary": "SUSE Bug 1251199",
"url": "https://bugzilla.suse.com/1251199"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61984 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61984/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61985 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61985/"
}
],
"title": "Security update for openssh",
"tracking": {
"current_release_date": "2025-11-28T07:46:24Z",
"generator": {
"date": "2025-11-28T07:46:24Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025-20122-1",
"initial_release_date": "2025-11-28T07:46:24Z",
"revision_history": [
{
"date": "2025-11-28T07:46:24Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openssh-10.0p2-160000.3.1.aarch64",
"product": {
"name": "openssh-10.0p2-160000.3.1.aarch64",
"product_id": "openssh-10.0p2-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"product": {
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"product_id": "openssh-askpass-gnome-10.0p2-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-cavs-10.0p2-160000.3.1.aarch64",
"product": {
"name": "openssh-cavs-10.0p2-160000.3.1.aarch64",
"product_id": "openssh-cavs-10.0p2-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-clients-10.0p2-160000.3.1.aarch64",
"product": {
"name": "openssh-clients-10.0p2-160000.3.1.aarch64",
"product_id": "openssh-clients-10.0p2-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-common-10.0p2-160000.3.1.aarch64",
"product": {
"name": "openssh-common-10.0p2-160000.3.1.aarch64",
"product_id": "openssh-common-10.0p2-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-helpers-10.0p2-160000.3.1.aarch64",
"product": {
"name": "openssh-helpers-10.0p2-160000.3.1.aarch64",
"product_id": "openssh-helpers-10.0p2-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-server-10.0p2-160000.3.1.aarch64",
"product": {
"name": "openssh-server-10.0p2-160000.3.1.aarch64",
"product_id": "openssh-server-10.0p2-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"product": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"product_id": "openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-10.0p2-160000.3.1.ppc64le",
"product": {
"name": "openssh-10.0p2-160000.3.1.ppc64le",
"product_id": "openssh-10.0p2-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"product": {
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"product_id": "openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-cavs-10.0p2-160000.3.1.ppc64le",
"product": {
"name": "openssh-cavs-10.0p2-160000.3.1.ppc64le",
"product_id": "openssh-cavs-10.0p2-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-clients-10.0p2-160000.3.1.ppc64le",
"product": {
"name": "openssh-clients-10.0p2-160000.3.1.ppc64le",
"product_id": "openssh-clients-10.0p2-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-common-10.0p2-160000.3.1.ppc64le",
"product": {
"name": "openssh-common-10.0p2-160000.3.1.ppc64le",
"product_id": "openssh-common-10.0p2-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-helpers-10.0p2-160000.3.1.ppc64le",
"product": {
"name": "openssh-helpers-10.0p2-160000.3.1.ppc64le",
"product_id": "openssh-helpers-10.0p2-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-server-10.0p2-160000.3.1.ppc64le",
"product": {
"name": "openssh-server-10.0p2-160000.3.1.ppc64le",
"product_id": "openssh-server-10.0p2-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"product": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"product_id": "openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-10.0p2-160000.3.1.s390x",
"product": {
"name": "openssh-10.0p2-160000.3.1.s390x",
"product_id": "openssh-10.0p2-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"product": {
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"product_id": "openssh-askpass-gnome-10.0p2-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-cavs-10.0p2-160000.3.1.s390x",
"product": {
"name": "openssh-cavs-10.0p2-160000.3.1.s390x",
"product_id": "openssh-cavs-10.0p2-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-clients-10.0p2-160000.3.1.s390x",
"product": {
"name": "openssh-clients-10.0p2-160000.3.1.s390x",
"product_id": "openssh-clients-10.0p2-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-common-10.0p2-160000.3.1.s390x",
"product": {
"name": "openssh-common-10.0p2-160000.3.1.s390x",
"product_id": "openssh-common-10.0p2-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-helpers-10.0p2-160000.3.1.s390x",
"product": {
"name": "openssh-helpers-10.0p2-160000.3.1.s390x",
"product_id": "openssh-helpers-10.0p2-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-server-10.0p2-160000.3.1.s390x",
"product": {
"name": "openssh-server-10.0p2-160000.3.1.s390x",
"product_id": "openssh-server-10.0p2-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"product": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"product_id": "openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-10.0p2-160000.3.1.x86_64",
"product": {
"name": "openssh-10.0p2-160000.3.1.x86_64",
"product_id": "openssh-10.0p2-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"product": {
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"product_id": "openssh-askpass-gnome-10.0p2-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-cavs-10.0p2-160000.3.1.x86_64",
"product": {
"name": "openssh-cavs-10.0p2-160000.3.1.x86_64",
"product_id": "openssh-cavs-10.0p2-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-clients-10.0p2-160000.3.1.x86_64",
"product": {
"name": "openssh-clients-10.0p2-160000.3.1.x86_64",
"product_id": "openssh-clients-10.0p2-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-common-10.0p2-160000.3.1.x86_64",
"product": {
"name": "openssh-common-10.0p2-160000.3.1.x86_64",
"product_id": "openssh-common-10.0p2-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-helpers-10.0p2-160000.3.1.x86_64",
"product": {
"name": "openssh-helpers-10.0p2-160000.3.1.x86_64",
"product_id": "openssh-helpers-10.0p2-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-server-10.0p2-160000.3.1.x86_64",
"product": {
"name": "openssh-server-10.0p2-160000.3.1.x86_64",
"product_id": "openssh-server-10.0p2-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64",
"product": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64",
"product_id": "openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-10.0p2-160000.3.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-10.0p2-160000.3.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-10.0p2-160000.3.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-10.0p2-160000.3.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-10.0p2-160000.3.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-cavs-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-10.0p2-160000.3.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-cavs-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-10.0p2-160000.3.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-cavs-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-10.0p2-160000.3.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-cavs-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-10.0p2-160000.3.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-clients-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-10.0p2-160000.3.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-clients-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-10.0p2-160000.3.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-clients-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-10.0p2-160000.3.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-clients-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-10.0p2-160000.3.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-common-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-10.0p2-160000.3.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-common-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-10.0p2-160000.3.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-common-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-10.0p2-160000.3.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-common-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-10.0p2-160000.3.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-helpers-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-10.0p2-160000.3.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-helpers-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-10.0p2-160000.3.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-helpers-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-10.0p2-160000.3.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-helpers-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-10.0p2-160000.3.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-server-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-10.0p2-160000.3.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-server-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-10.0p2-160000.3.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-server-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-10.0p2-160000.3.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-server-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61984",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61984"
}
],
"notes": [
{
"category": "general",
"text": "ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61984",
"url": "https://www.suse.com/security/cve/CVE-2025-61984"
},
{
"category": "external",
"summary": "SUSE Bug 1251198 for CVE-2025-61984",
"url": "https://bugzilla.suse.com/1251198"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T07:46:24Z",
"details": "moderate"
}
],
"title": "CVE-2025-61984"
},
{
"cve": "CVE-2025-61985",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61985"
}
],
"notes": [
{
"category": "general",
"text": "ssh in OpenSSH before 10.1 allows the \u0027\\0\u0027 character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61985",
"url": "https://www.suse.com/security/cve/CVE-2025-61985"
},
{
"category": "external",
"summary": "SUSE Bug 1251199 for CVE-2025-61985",
"url": "https://bugzilla.suse.com/1251199"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-common-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-helpers-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-server-10.0p2-160000.3.1.x86_64",
"openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"openSUSE Leap 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T07:46:24Z",
"details": "moderate"
}
],
"title": "CVE-2025-61985"
}
]
}
RHSA-2026:0693
Vulnerability from csaf_redhat - Published: 2026-01-15 11:56 - Updated: 2026-01-15 16:01Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssh is now available for Red Hat Enterprise Linux 9.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.\n\nSecurity Fix(es):\n\n* openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand (CVE-2025-61984)\n\n* openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand (CVE-2025-61985)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0693",
"url": "https://access.redhat.com/errata/RHSA-2026:0693"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2401960",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401960"
},
{
"category": "external",
"summary": "2401962",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401962"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0693.json"
}
],
"title": "Red Hat Security Advisory: openssh security update",
"tracking": {
"current_release_date": "2026-01-15T16:01:03+00:00",
"generator": {
"date": "2026-01-15T16:01:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2026:0693",
"initial_release_date": "2026-01-15T11:56:04+00:00",
"revision_history": [
{
"date": "2026-01-15T11:56:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-15T11:56:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-15T16:01:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.6::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-askpass-0:8.7p1-45.el9_6.1.s390x",
"product": {
"name": "openssh-askpass-0:8.7p1-45.el9_6.1.s390x",
"product_id": "openssh-askpass-0:8.7p1-45.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@8.7p1-45.el9_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.s390x",
"product": {
"name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.s390x",
"product_id": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.10.4-5.45.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-debugsource-0:8.7p1-45.el9_6.1.s390x",
"product": {
"name": "openssh-debugsource-0:8.7p1-45.el9_6.1.s390x",
"product_id": "openssh-debugsource-0:8.7p1-45.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debugsource@8.7p1-45.el9_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"product": {
"name": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"product_id": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@8.7p1-45.el9_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"product": {
"name": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"product_id": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients-debuginfo@8.7p1-45.el9_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"product": {
"name": "openssh-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"product_id": "openssh-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@8.7p1-45.el9_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"product": {
"name": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"product_id": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@8.7p1-45.el9_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"product": {
"name": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"product_id": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server-debuginfo@8.7p1-45.el9_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"product": {
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"product_id": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-sk-dummy-debuginfo@8.7p1-45.el9_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.s390x",
"product": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.s390x",
"product_id": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam_ssh_agent_auth-debuginfo@0.10.4-5.45.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-0:8.7p1-45.el9_6.1.s390x",
"product": {
"name": "openssh-0:8.7p1-45.el9_6.1.s390x",
"product_id": "openssh-0:8.7p1-45.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@8.7p1-45.el9_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:8.7p1-45.el9_6.1.s390x",
"product": {
"name": "openssh-clients-0:8.7p1-45.el9_6.1.s390x",
"product_id": "openssh-clients-0:8.7p1-45.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@8.7p1-45.el9_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-0:8.7p1-45.el9_6.1.s390x",
"product": {
"name": "openssh-keycat-0:8.7p1-45.el9_6.1.s390x",
"product_id": "openssh-keycat-0:8.7p1-45.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat@8.7p1-45.el9_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:8.7p1-45.el9_6.1.s390x",
"product": {
"name": "openssh-server-0:8.7p1-45.el9_6.1.s390x",
"product_id": "openssh-server-0:8.7p1-45.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@8.7p1-45.el9_6.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-askpass-0:8.7p1-45.el9_6.1.aarch64",
"product": {
"name": "openssh-askpass-0:8.7p1-45.el9_6.1.aarch64",
"product_id": "openssh-askpass-0:8.7p1-45.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@8.7p1-45.el9_6.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.aarch64",
"product": {
"name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.aarch64",
"product_id": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.10.4-5.45.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-debugsource-0:8.7p1-45.el9_6.1.aarch64",
"product": {
"name": "openssh-debugsource-0:8.7p1-45.el9_6.1.aarch64",
"product_id": "openssh-debugsource-0:8.7p1-45.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debugsource@8.7p1-45.el9_6.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"product": {
"name": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"product_id": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@8.7p1-45.el9_6.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"product": {
"name": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"product_id": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients-debuginfo@8.7p1-45.el9_6.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"product": {
"name": "openssh-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"product_id": "openssh-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@8.7p1-45.el9_6.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"product": {
"name": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"product_id": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@8.7p1-45.el9_6.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"product": {
"name": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"product_id": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server-debuginfo@8.7p1-45.el9_6.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"product": {
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"product_id": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-sk-dummy-debuginfo@8.7p1-45.el9_6.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.aarch64",
"product": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.aarch64",
"product_id": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam_ssh_agent_auth-debuginfo@0.10.4-5.45.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-0:8.7p1-45.el9_6.1.aarch64",
"product": {
"name": "openssh-0:8.7p1-45.el9_6.1.aarch64",
"product_id": "openssh-0:8.7p1-45.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@8.7p1-45.el9_6.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:8.7p1-45.el9_6.1.aarch64",
"product": {
"name": "openssh-clients-0:8.7p1-45.el9_6.1.aarch64",
"product_id": "openssh-clients-0:8.7p1-45.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@8.7p1-45.el9_6.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-0:8.7p1-45.el9_6.1.aarch64",
"product": {
"name": "openssh-keycat-0:8.7p1-45.el9_6.1.aarch64",
"product_id": "openssh-keycat-0:8.7p1-45.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat@8.7p1-45.el9_6.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:8.7p1-45.el9_6.1.aarch64",
"product": {
"name": "openssh-server-0:8.7p1-45.el9_6.1.aarch64",
"product_id": "openssh-server-0:8.7p1-45.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@8.7p1-45.el9_6.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-askpass-0:8.7p1-45.el9_6.1.ppc64le",
"product": {
"name": "openssh-askpass-0:8.7p1-45.el9_6.1.ppc64le",
"product_id": "openssh-askpass-0:8.7p1-45.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@8.7p1-45.el9_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.ppc64le",
"product": {
"name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.ppc64le",
"product_id": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.10.4-5.45.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-debugsource-0:8.7p1-45.el9_6.1.ppc64le",
"product": {
"name": "openssh-debugsource-0:8.7p1-45.el9_6.1.ppc64le",
"product_id": "openssh-debugsource-0:8.7p1-45.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debugsource@8.7p1-45.el9_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"product": {
"name": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"product_id": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@8.7p1-45.el9_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"product": {
"name": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"product_id": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients-debuginfo@8.7p1-45.el9_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"product": {
"name": "openssh-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"product_id": "openssh-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@8.7p1-45.el9_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"product": {
"name": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"product_id": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@8.7p1-45.el9_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"product": {
"name": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"product_id": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server-debuginfo@8.7p1-45.el9_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"product": {
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"product_id": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-sk-dummy-debuginfo@8.7p1-45.el9_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.ppc64le",
"product": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.ppc64le",
"product_id": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam_ssh_agent_auth-debuginfo@0.10.4-5.45.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-0:8.7p1-45.el9_6.1.ppc64le",
"product": {
"name": "openssh-0:8.7p1-45.el9_6.1.ppc64le",
"product_id": "openssh-0:8.7p1-45.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@8.7p1-45.el9_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:8.7p1-45.el9_6.1.ppc64le",
"product": {
"name": "openssh-clients-0:8.7p1-45.el9_6.1.ppc64le",
"product_id": "openssh-clients-0:8.7p1-45.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@8.7p1-45.el9_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-0:8.7p1-45.el9_6.1.ppc64le",
"product": {
"name": "openssh-keycat-0:8.7p1-45.el9_6.1.ppc64le",
"product_id": "openssh-keycat-0:8.7p1-45.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat@8.7p1-45.el9_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:8.7p1-45.el9_6.1.ppc64le",
"product": {
"name": "openssh-server-0:8.7p1-45.el9_6.1.ppc64le",
"product_id": "openssh-server-0:8.7p1-45.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@8.7p1-45.el9_6.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-askpass-0:8.7p1-45.el9_6.1.x86_64",
"product": {
"name": "openssh-askpass-0:8.7p1-45.el9_6.1.x86_64",
"product_id": "openssh-askpass-0:8.7p1-45.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@8.7p1-45.el9_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.x86_64",
"product": {
"name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.x86_64",
"product_id": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.10.4-5.45.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-debugsource-0:8.7p1-45.el9_6.1.x86_64",
"product": {
"name": "openssh-debugsource-0:8.7p1-45.el9_6.1.x86_64",
"product_id": "openssh-debugsource-0:8.7p1-45.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debugsource@8.7p1-45.el9_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"product": {
"name": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"product_id": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@8.7p1-45.el9_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"product": {
"name": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"product_id": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients-debuginfo@8.7p1-45.el9_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"product": {
"name": "openssh-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"product_id": "openssh-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@8.7p1-45.el9_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"product": {
"name": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"product_id": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@8.7p1-45.el9_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"product": {
"name": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"product_id": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server-debuginfo@8.7p1-45.el9_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"product": {
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"product_id": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-sk-dummy-debuginfo@8.7p1-45.el9_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.x86_64",
"product": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.x86_64",
"product_id": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam_ssh_agent_auth-debuginfo@0.10.4-5.45.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-0:8.7p1-45.el9_6.1.x86_64",
"product": {
"name": "openssh-0:8.7p1-45.el9_6.1.x86_64",
"product_id": "openssh-0:8.7p1-45.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@8.7p1-45.el9_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:8.7p1-45.el9_6.1.x86_64",
"product": {
"name": "openssh-clients-0:8.7p1-45.el9_6.1.x86_64",
"product_id": "openssh-clients-0:8.7p1-45.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@8.7p1-45.el9_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-0:8.7p1-45.el9_6.1.x86_64",
"product": {
"name": "openssh-keycat-0:8.7p1-45.el9_6.1.x86_64",
"product_id": "openssh-keycat-0:8.7p1-45.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat@8.7p1-45.el9_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:8.7p1-45.el9_6.1.x86_64",
"product": {
"name": "openssh-server-0:8.7p1-45.el9_6.1.x86_64",
"product_id": "openssh-server-0:8.7p1-45.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@8.7p1-45.el9_6.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-0:8.7p1-45.el9_6.1.src",
"product": {
"name": "openssh-0:8.7p1-45.el9_6.1.src",
"product_id": "openssh-0:8.7p1-45.el9_6.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@8.7p1-45.el9_6.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.7p1-45.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.aarch64"
},
"product_reference": "openssh-0:8.7p1-45.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.7p1-45.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.ppc64le"
},
"product_reference": "openssh-0:8.7p1-45.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.7p1-45.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.s390x"
},
"product_reference": "openssh-0:8.7p1-45.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.7p1-45.el9_6.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.src"
},
"product_reference": "openssh-0:8.7p1-45.el9_6.1.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.7p1-45.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.x86_64"
},
"product_reference": "openssh-0:8.7p1-45.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:8.7p1-45.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.aarch64"
},
"product_reference": "openssh-askpass-0:8.7p1-45.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:8.7p1-45.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.ppc64le"
},
"product_reference": "openssh-askpass-0:8.7p1-45.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:8.7p1-45.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.s390x"
},
"product_reference": "openssh-askpass-0:8.7p1-45.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:8.7p1-45.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.x86_64"
},
"product_reference": "openssh-askpass-0:8.7p1-45.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.aarch64"
},
"product_reference": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.ppc64le"
},
"product_reference": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.s390x"
},
"product_reference": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.x86_64"
},
"product_reference": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:8.7p1-45.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.aarch64"
},
"product_reference": "openssh-clients-0:8.7p1-45.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:8.7p1-45.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.ppc64le"
},
"product_reference": "openssh-clients-0:8.7p1-45.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:8.7p1-45.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.s390x"
},
"product_reference": "openssh-clients-0:8.7p1-45.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:8.7p1-45.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.x86_64"
},
"product_reference": "openssh-clients-0:8.7p1-45.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.aarch64"
},
"product_reference": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.ppc64le"
},
"product_reference": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.s390x"
},
"product_reference": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.x86_64"
},
"product_reference": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:8.7p1-45.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.aarch64"
},
"product_reference": "openssh-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:8.7p1-45.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.ppc64le"
},
"product_reference": "openssh-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:8.7p1-45.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.s390x"
},
"product_reference": "openssh-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:8.7p1-45.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.x86_64"
},
"product_reference": "openssh-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:8.7p1-45.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.aarch64"
},
"product_reference": "openssh-debugsource-0:8.7p1-45.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:8.7p1-45.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.ppc64le"
},
"product_reference": "openssh-debugsource-0:8.7p1-45.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:8.7p1-45.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.s390x"
},
"product_reference": "openssh-debugsource-0:8.7p1-45.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:8.7p1-45.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.x86_64"
},
"product_reference": "openssh-debugsource-0:8.7p1-45.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:8.7p1-45.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.aarch64"
},
"product_reference": "openssh-keycat-0:8.7p1-45.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:8.7p1-45.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.ppc64le"
},
"product_reference": "openssh-keycat-0:8.7p1-45.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:8.7p1-45.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.s390x"
},
"product_reference": "openssh-keycat-0:8.7p1-45.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:8.7p1-45.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.x86_64"
},
"product_reference": "openssh-keycat-0:8.7p1-45.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.aarch64"
},
"product_reference": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.ppc64le"
},
"product_reference": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.s390x"
},
"product_reference": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.x86_64"
},
"product_reference": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:8.7p1-45.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.aarch64"
},
"product_reference": "openssh-server-0:8.7p1-45.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:8.7p1-45.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.ppc64le"
},
"product_reference": "openssh-server-0:8.7p1-45.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:8.7p1-45.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.s390x"
},
"product_reference": "openssh-server-0:8.7p1-45.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:8.7p1-45.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.x86_64"
},
"product_reference": "openssh-server-0:8.7p1-45.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.aarch64"
},
"product_reference": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.ppc64le"
},
"product_reference": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.s390x"
},
"product_reference": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.x86_64"
},
"product_reference": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.aarch64"
},
"product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.ppc64le"
},
"product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.s390x"
},
"product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.x86_64"
},
"product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.aarch64"
},
"product_reference": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.ppc64le"
},
"product_reference": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.s390x"
},
"product_reference": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.x86_64"
},
"product_reference": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.aarch64"
},
"product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.ppc64le"
},
"product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.s390x"
},
"product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.x86_64"
},
"product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.7p1-45.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.aarch64"
},
"product_reference": "openssh-0:8.7p1-45.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.7p1-45.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.ppc64le"
},
"product_reference": "openssh-0:8.7p1-45.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.7p1-45.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.s390x"
},
"product_reference": "openssh-0:8.7p1-45.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.7p1-45.el9_6.1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.src"
},
"product_reference": "openssh-0:8.7p1-45.el9_6.1.src",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.7p1-45.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.x86_64"
},
"product_reference": "openssh-0:8.7p1-45.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:8.7p1-45.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.aarch64"
},
"product_reference": "openssh-askpass-0:8.7p1-45.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:8.7p1-45.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.ppc64le"
},
"product_reference": "openssh-askpass-0:8.7p1-45.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:8.7p1-45.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.s390x"
},
"product_reference": "openssh-askpass-0:8.7p1-45.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:8.7p1-45.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.x86_64"
},
"product_reference": "openssh-askpass-0:8.7p1-45.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.aarch64"
},
"product_reference": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.ppc64le"
},
"product_reference": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.s390x"
},
"product_reference": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.x86_64"
},
"product_reference": "openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:8.7p1-45.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.aarch64"
},
"product_reference": "openssh-clients-0:8.7p1-45.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:8.7p1-45.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.ppc64le"
},
"product_reference": "openssh-clients-0:8.7p1-45.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:8.7p1-45.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.s390x"
},
"product_reference": "openssh-clients-0:8.7p1-45.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:8.7p1-45.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.x86_64"
},
"product_reference": "openssh-clients-0:8.7p1-45.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.aarch64"
},
"product_reference": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.ppc64le"
},
"product_reference": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.s390x"
},
"product_reference": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.x86_64"
},
"product_reference": "openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:8.7p1-45.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.aarch64"
},
"product_reference": "openssh-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:8.7p1-45.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.ppc64le"
},
"product_reference": "openssh-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:8.7p1-45.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.s390x"
},
"product_reference": "openssh-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:8.7p1-45.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.x86_64"
},
"product_reference": "openssh-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:8.7p1-45.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.aarch64"
},
"product_reference": "openssh-debugsource-0:8.7p1-45.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:8.7p1-45.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.ppc64le"
},
"product_reference": "openssh-debugsource-0:8.7p1-45.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:8.7p1-45.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.s390x"
},
"product_reference": "openssh-debugsource-0:8.7p1-45.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:8.7p1-45.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.x86_64"
},
"product_reference": "openssh-debugsource-0:8.7p1-45.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:8.7p1-45.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.aarch64"
},
"product_reference": "openssh-keycat-0:8.7p1-45.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:8.7p1-45.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.ppc64le"
},
"product_reference": "openssh-keycat-0:8.7p1-45.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:8.7p1-45.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.s390x"
},
"product_reference": "openssh-keycat-0:8.7p1-45.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:8.7p1-45.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.x86_64"
},
"product_reference": "openssh-keycat-0:8.7p1-45.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.aarch64"
},
"product_reference": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.ppc64le"
},
"product_reference": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.s390x"
},
"product_reference": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.x86_64"
},
"product_reference": "openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:8.7p1-45.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.aarch64"
},
"product_reference": "openssh-server-0:8.7p1-45.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:8.7p1-45.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.ppc64le"
},
"product_reference": "openssh-server-0:8.7p1-45.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:8.7p1-45.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.s390x"
},
"product_reference": "openssh-server-0:8.7p1-45.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:8.7p1-45.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.x86_64"
},
"product_reference": "openssh-server-0:8.7p1-45.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.aarch64"
},
"product_reference": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.ppc64le"
},
"product_reference": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.s390x"
},
"product_reference": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.x86_64"
},
"product_reference": "openssh-server-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.aarch64"
},
"product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.ppc64le"
},
"product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.s390x"
},
"product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.x86_64"
},
"product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.aarch64"
},
"product_reference": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.ppc64le"
},
"product_reference": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.s390x"
},
"product_reference": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.x86_64"
},
"product_reference": "pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.aarch64"
},
"product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.ppc64le"
},
"product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.s390x"
},
"product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.x86_64"
},
"product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61984",
"cwe": {
"id": "CWE-159",
"name": "Improper Handling of Invalid Use of Special Elements"
},
"discovery_date": "2025-10-06T19:01:13.449665+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401960"
}
],
"notes": [
{
"category": "description",
"text": "ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is MODERATE because it is a critical component used across many Red Hat products.\nThe issue occurs only when a ProxyCommand is configured and the SSH client handles a username containing control characters from an untrusted source, such as script-generated input or expanded configuration values.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-159: Improper Handling of Invalid Use of Special Elements\n\nStrict input validation sanitizes user-supplied data to ensure special elements, such as control characters, escape sequences, or delimiters, are only allowed when explicitly required, preventing malformed inputs from disrupting control flow, parsing, or protocol logic. Secure development practices, including static code analysis and peer reviews, catch improper handling of special elements early in the lifecycle, reducing the risk of logic flaws and injection vectors. Additionally, robust error handling and process isolation contain the impact of malformed inputs to the originating context, avoiding system-wide disruption or data exposure. Real-time monitoring detects anomalous behavior stemming from improper input handling, enabling prompt investigation and response.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.src",
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.src",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.aarch64",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.ppc64le",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.s390x",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.x86_64",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.aarch64",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.ppc64le",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.s390x",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61984"
},
{
"category": "external",
"summary": "RHBZ#2401960",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401960"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61984",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61984"
},
{
"category": "external",
"summary": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2",
"url": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2"
},
{
"category": "external",
"summary": "https://www.openssh.com/releasenotes.html#10.1p1",
"url": "https://www.openssh.com/releasenotes.html#10.1p1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/10/06/1",
"url": "https://www.openwall.com/lists/oss-security/2025/10/06/1"
}
],
"release_date": "2025-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-15T11:56:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.src",
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.src",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.aarch64",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.ppc64le",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.s390x",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.x86_64",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.aarch64",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.ppc64le",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.s390x",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.src",
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.src",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.aarch64",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.ppc64le",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.s390x",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.x86_64",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.aarch64",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.ppc64le",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.s390x",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand"
},
{
"cve": "CVE-2025-61985",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2025-10-06T19:01:16.841946+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401962"
}
],
"notes": [
{
"category": "description",
"text": "ssh in OpenSSH before 10.1 allows the \u0027\\0\u0027 character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is MODERATE because it is a critical component used across many Red Hat products.\nExploiting this vulnerability would require a specific configuration where ProxyCommand is enabled and the SSH client processes an untrusted ssh:// URI containing null bytes. Under these conditions, the command parser may misinterpret the URI and execute unintended shell commands.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-158: Improper Neutralization of Null Byte or NUL Character, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation routines rigorously sanitize user-supplied data, ensuring special elements, such as control characters, escape sequences, or delimiters, are securely handled or rejected when not explicitly required. This prevents malformed input from disrupting control flow, altering parsing logic, or introducing injection risks. Secure development practices, including static code analysis and peer reviews, detect and remediate improper handling of special elements early in the development lifecycle. Runtime safeguards such as process isolation confine the impact of unexpected input to its execution context, preventing broader system instability or data exposure. Real-time monitoring further supports timely detection and response to anomalies or parsing errors related to special element misuse.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.src",
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.src",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.aarch64",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.ppc64le",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.s390x",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.x86_64",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.aarch64",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.ppc64le",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.s390x",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61985"
},
{
"category": "external",
"summary": "RHBZ#2401962",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401962"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61985",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61985"
},
{
"category": "external",
"summary": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2",
"url": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2"
},
{
"category": "external",
"summary": "https://www.openssh.com/releasenotes.html#10.1p1",
"url": "https://www.openssh.com/releasenotes.html#10.1p1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/10/06/1",
"url": "https://www.openwall.com/lists/oss-security/2025/10/06/1"
}
],
"release_date": "2025-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-15T11:56:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.src",
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.src",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.aarch64",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.ppc64le",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.s390x",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.x86_64",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.aarch64",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.ppc64le",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.s390x",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.src",
"AppStream-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.src",
"BaseOS-9.6.0.Z.EUS:openssh-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-askpass-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-clients-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-clients-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-debugsource-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-keycat-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-server-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-server-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:openssh-sk-dummy-debuginfo-0:8.7p1-45.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.aarch64",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.ppc64le",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.s390x",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-0:0.10.4-5.45.el9_6.x86_64",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.aarch64",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.ppc64le",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.s390x",
"BaseOS-9.6.0.Z.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.45.el9_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand"
}
]
}
RHSA-2026:0685
Vulnerability from csaf_redhat - Published: 2026-01-15 10:02 - Updated: 2026-01-15 16:01Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "The latest release of Red Hat Update Infrastructure. For more details, see the product documentation.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Update Infrastructure (RHUI) container images are based on the latest RHUI RPM packages and the ubi9 or ubi9-init base images.\nThis release updates to the latest version.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0685",
"url": "https://access.redhat.com/errata/RHSA-2026:0685"
},
{
"category": "external",
"summary": "https://access.redhat.com/products/red-hat-update-infrastructure",
"url": "https://access.redhat.com/products/red-hat-update-infrastructure"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-5642",
"url": "https://access.redhat.com/security/cve/CVE-2024-5642"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-11083",
"url": "https://access.redhat.com/security/cve/CVE-2025-11083"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-45582",
"url": "https://access.redhat.com/security/cve/CVE-2025-45582"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-6069",
"url": "https://access.redhat.com/security/cve/CVE-2025-6069"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-6075",
"url": "https://access.redhat.com/security/cve/CVE-2025-6075"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61984",
"url": "https://access.redhat.com/security/cve/CVE-2025-61984"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61985",
"url": "https://access.redhat.com/security/cve/CVE-2025-61985"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-8291",
"url": "https://access.redhat.com/security/cve/CVE-2025-8291"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_update_infrastructure/5",
"url": "https://docs.redhat.com/en/documentation/red_hat_update_infrastructure/5"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0685.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Update Infrastructure 5 security update",
"tracking": {
"current_release_date": "2026-01-15T16:01:03+00:00",
"generator": {
"date": "2026-01-15T16:01:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2026:0685",
"initial_release_date": "2026-01-15T10:02:39+00:00",
"revision_history": [
{
"date": "2026-01-15T10:02:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-15T10:02:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-15T16:01:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Update Infrastructure 5",
"product": {
"name": "Red Hat Update Infrastructure 5",
"product_id": "Red Hat Update Infrastructure 5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhui:5::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Update Infrastructure"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"product": {
"name": "registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"product_id": "registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cds-rhel9@sha256%3A87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be?arch=amd64\u0026repository_url=registry.redhat.io/rhui5\u0026tag=1768221107"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"product": {
"name": "registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"product_id": "registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"product_identification_helper": {
"purl": "pkg:oci/haproxy-rhel9@sha256%3Ac0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16?arch=amd64\u0026repository_url=registry.redhat.io/rhui5\u0026tag=1768221100"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"product": {
"name": "registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"product_id": "registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/installer-rhel9@sha256%3Ae1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9?arch=amd64\u0026repository_url=registry.redhat.io/rhui5\u0026tag=1768296285"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64",
"product": {
"name": "registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64",
"product_id": "registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhua-rhel9@sha256%3A4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2?arch=amd64\u0026repository_url=registry.redhat.io/rhui5\u0026tag=1768377012"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64 as a component of Red Hat Update Infrastructure 5",
"product_id": "Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64"
},
"product_reference": "registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"relates_to_product_reference": "Red Hat Update Infrastructure 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64 as a component of Red Hat Update Infrastructure 5",
"product_id": "Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64"
},
"product_reference": "registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"relates_to_product_reference": "Red Hat Update Infrastructure 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64 as a component of Red Hat Update Infrastructure 5",
"product_id": "Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64"
},
"product_reference": "registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"relates_to_product_reference": "Red Hat Update Infrastructure 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64 as a component of Red Hat Update Infrastructure 5",
"product_id": "Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
},
"product_reference": "registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64",
"relates_to_product_reference": "Red Hat Update Infrastructure 5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5642",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294682"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Python/CPython that does not disallow configuring an empty list (\"[]\") for SSLContext.set_npn_protocols(), which is an invalid value for the underlying OpenSSL API. This issue results in a buffer over-read when NPN is used. See CVE -2024-5535 for OpenSSL for more information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated with a Low severity due to NPN not being widely used and specifying an empty list is likely uncommon in practice. Typically, a protocol name would be configured.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-5642"
},
{
"category": "external",
"summary": "RHBZ#2294682",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294682"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-5642",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5642"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/PLP2JI3PJY33YG6P5BZYSSNU66HASXBQ/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/PLP2JI3PJY33YG6P5BZYSSNU66HASXBQ/"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-15T10:02:39+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0685"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 2.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used"
},
{
"cve": "CVE-2025-6069",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2025-06-17T14:00:45.339399+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373234"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) vulnerability has been discovered in Python\u0027s html.parser.HTMLParser class. When processing specially malformed HTML input, the parsing runtime can become quadratic with respect to the input size. This significantly increased processing time can lead to excessive resource consumption, ultimately causing a denial-of-service condition in applications that rely on this parser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: Python HTMLParser quadratic complexity",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-1333: Inefficient Regular Expression Complexity and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nBaseline configurations enforce secure coding practices that restrict the use of inefficient or vulnerable regular expression patterns known to cause excessive backtracking or resource consumption. Input validation routines sanitize and constrain user input before it is evaluated by regular expressions, reducing the risk of triggering regex-related performance issues. Real-time system monitoring detects abnormal CPU usage or request latency indicative of inefficient regex execution, enabling timely investigation and response.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6069"
},
{
"category": "external",
"summary": "RHBZ#2373234",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373234"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6069",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6069"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949",
"url": "https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41",
"url": "https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b",
"url": "https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/135462",
"url": "https://github.com/python/cpython/issues/135462"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/135464",
"url": "https://github.com/python/cpython/pull/135464"
}
],
"release_date": "2025-06-17T13:39:46.058000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-15T10:02:39+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0685"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: Python HTMLParser quadratic complexity"
},
{
"cve": "CVE-2025-6075",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-31T17:01:47.052517+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408891"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in Python\u2019s os.path.expandvars() function that can cause performance degradation. When processing specially crafted, user-controlled input with nested environment variable patterns, the function exhibits quadratic time complexity, potentially leading to excessive CPU usage and denial of service (DoS) conditions. No code execution or data exposure occurs, so the impact is limited to performance slowdown.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: Quadratic complexity in os.path.expandvars() with user-controlled template",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low rather than Moderate because it only causes a performance inefficiency without affecting code execution, data integrity, or confidentiality. The flaw lies in the algorithmic complexity of os.path.expandvars(), which can become quadratic when processing crafted input containing repetitive or nested environment variable references. Exploitation requires the attacker to control the input string passed to this function, which is uncommon in secure applications. Moreover, the impact is limited to increased CPU utilization and potential slowdown, not system compromise or data manipulation. Since the issue does not introduce memory corruption, privilege escalation, or information disclosure risks, its overall impact scope and exploitability are minimal, justifying a Low severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6075"
},
{
"category": "external",
"summary": "RHBZ#2408891",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408891"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6075",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6075"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/136065",
"url": "https://github.com/python/cpython/issues/136065"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/IUP5QJ6D4KK6ULHOMPC7DPNKRYQTQNLA/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/IUP5QJ6D4KK6ULHOMPC7DPNKRYQTQNLA/"
}
],
"release_date": "2025-10-31T16:41:34.983000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-15T10:02:39+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0685"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "python: Quadratic complexity in os.path.expandvars() with user-controlled template"
},
{
"cve": "CVE-2025-8291",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2025-10-07T19:01:23.599055+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402342"
}
],
"notes": [
{
"category": "description",
"text": "The \u0027zipfile\u0027 module would not check the validity of the ZIP64 End of\nCentral Directory (EOCD) Locator record offset value would not be used to\nlocate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be\nassumed to be the previous record in the ZIP archive. This could be abused\nto create ZIP archives that are handled differently by the \u0027zipfile\u0027 module\ncompared to other ZIP implementations.\n\n\nRemediation maintains this behavior, but checks that the offset specified\nin the ZIP64 EOCD Locator record matches the expected value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: python: Python zipfile End of Central Directory (EOCD) Locator record offset not checked",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-130: Improper Handling of Length Parameter Inconsistency and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation ensures length parameters align with actual buffer or data structure sizes, preventing truncation, overflow, and memory corruption. Secure development practices, such as static code analysis and peer reviews, detect improper length handling early and enforce consistency between declared and actual sizes. At runtime, process isolation contains memory anomalies within the originating context, preventing system-wide impact. Real-time monitoring detects crashes, segmentation faults, or buffer misuse, enabling prompt investigation and remediation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-8291"
},
{
"category": "external",
"summary": "RHBZ#2402342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402342"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-8291",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8291"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/162997bb70e067668c039700141770687bc8f267",
"url": "https://github.com/python/cpython/commit/162997bb70e067668c039700141770687bc8f267"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/333d4a6f4967d3ace91492a39ededbcf3faa76a6",
"url": "https://github.com/python/cpython/commit/333d4a6f4967d3ace91492a39ededbcf3faa76a6"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/139700",
"url": "https://github.com/python/cpython/issues/139700"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/139702",
"url": "https://github.com/python/cpython/pull/139702"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/QECOPWMTH4VPPJAXAH2BGTA4XADOP62G/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/QECOPWMTH4VPPJAXAH2BGTA4XADOP62G/"
}
],
"release_date": "2025-10-07T18:10:05.908000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-15T10:02:39+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0685"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: python: Python zipfile End of Central Directory (EOCD) Locator record offset not checked"
},
{
"cve": "CVE-2025-11083",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-09-28T00:01:07.638629+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2399948"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability has been found in GNU Binutils 2.45. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 9ca499644a21ceb3f946d1c179c38a83be084490. To fix this issue, it is recommended to deploy a patch. The code maintainer replied with \"[f]ixed for 2.46\".",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "binutils: GNU Binutils Linker heap-based overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat rates this vulnerability as Moderate as a result of how the GNU Binutils are configured to be used in Red Hat products. When running with default configurations the affected program will have limited privileges and thus the impact of this flaw will be restricted.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-11083"
},
{
"category": "external",
"summary": "RHBZ#2399948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2399948"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-11083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-11083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-11083"
},
{
"category": "external",
"summary": "https://sourceware.org/bugzilla/attachment.cgi?id=16353",
"url": "https://sourceware.org/bugzilla/attachment.cgi?id=16353"
},
{
"category": "external",
"summary": "https://sourceware.org/bugzilla/show_bug.cgi?id=33457",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33457"
},
{
"category": "external",
"summary": "https://sourceware.org/bugzilla/show_bug.cgi?id=33457#c1",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33457#c1"
},
{
"category": "external",
"summary": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=9ca499644a21ceb3f946d1c179c38a83be084490",
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=9ca499644a21ceb3f946d1c179c38a83be084490"
},
{
"category": "external",
"summary": "https://vuldb.com/?ctiid.326124",
"url": "https://vuldb.com/?ctiid.326124"
},
{
"category": "external",
"summary": "https://vuldb.com/?id.326124",
"url": "https://vuldb.com/?id.326124"
},
{
"category": "external",
"summary": "https://vuldb.com/?submit.661277",
"url": "https://vuldb.com/?submit.661277"
},
{
"category": "external",
"summary": "https://www.gnu.org/",
"url": "https://www.gnu.org/"
}
],
"release_date": "2025-09-27T23:02:08.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-15T10:02:39+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0685"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "binutils: GNU Binutils Linker heap-based overflow"
},
{
"cve": "CVE-2025-45582",
"cwe": {
"id": "CWE-24",
"name": "Path Traversal: \u0027../filedir\u0027"
},
"discovery_date": "2025-07-11T17:00:47.340822+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2379592"
}
],
"notes": [
{
"category": "description",
"text": "A relative path traversal flaw was found in the gnu tar utility. When archives with relative paths are extracted without the \u2018--keep-old-files\u2019 (\u2018-k\u2019), the extraction process may overwrite existing files that the current user has access to. The server may be impacted if these files are critical to the operation of some service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tar: Tar path traversal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-24: Path Traversal: \u0027../filedir\u0027 and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nBaseline configurations enforce strict privilege levels for code execution, allowing only authorized processes to access or modify files within approved directories. Input validation sanitizes and verifies user-supplied file paths against defined patterns, blocking traversal sequences that could enable unauthorized access outside designated locations. Configuration settings further restrict directory and file system access, ensuring applications operate within approved resources and execution boundaries.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-45582"
},
{
"category": "external",
"summary": "RHBZ#2379592",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2379592"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-45582",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-45582"
},
{
"category": "external",
"summary": "https://github.com/i900008/vulndb/blob/main/Gnu_tar_vuln.md",
"url": "https://github.com/i900008/vulndb/blob/main/Gnu_tar_vuln.md"
},
{
"category": "external",
"summary": "https://www.gnu.org/software/tar/",
"url": "https://www.gnu.org/software/tar/"
},
{
"category": "external",
"summary": "https://www.gnu.org/software/tar/manual/html_node/Integrity.html#Integrity",
"url": "https://www.gnu.org/software/tar/manual/html_node/Integrity.html#Integrity"
}
],
"release_date": "2025-07-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-15T10:02:39+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0685"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tar: Tar path traversal"
},
{
"cve": "CVE-2025-61984",
"cwe": {
"id": "CWE-159",
"name": "Improper Handling of Invalid Use of Special Elements"
},
"discovery_date": "2025-10-06T19:01:13.449665+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401960"
}
],
"notes": [
{
"category": "description",
"text": "ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is MODERATE because it is a critical component used across many Red Hat products.\nThe issue occurs only when a ProxyCommand is configured and the SSH client handles a username containing control characters from an untrusted source, such as script-generated input or expanded configuration values.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-159: Improper Handling of Invalid Use of Special Elements\n\nStrict input validation sanitizes user-supplied data to ensure special elements, such as control characters, escape sequences, or delimiters, are only allowed when explicitly required, preventing malformed inputs from disrupting control flow, parsing, or protocol logic. Secure development practices, including static code analysis and peer reviews, catch improper handling of special elements early in the lifecycle, reducing the risk of logic flaws and injection vectors. Additionally, robust error handling and process isolation contain the impact of malformed inputs to the originating context, avoiding system-wide disruption or data exposure. Real-time monitoring detects anomalous behavior stemming from improper input handling, enabling prompt investigation and response.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61984"
},
{
"category": "external",
"summary": "RHBZ#2401960",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401960"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61984",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61984"
},
{
"category": "external",
"summary": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2",
"url": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2"
},
{
"category": "external",
"summary": "https://www.openssh.com/releasenotes.html#10.1p1",
"url": "https://www.openssh.com/releasenotes.html#10.1p1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/10/06/1",
"url": "https://www.openwall.com/lists/oss-security/2025/10/06/1"
}
],
"release_date": "2025-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-15T10:02:39+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0685"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand"
},
{
"cve": "CVE-2025-61985",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2025-10-06T19:01:16.841946+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401962"
}
],
"notes": [
{
"category": "description",
"text": "ssh in OpenSSH before 10.1 allows the \u0027\\0\u0027 character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is MODERATE because it is a critical component used across many Red Hat products.\nExploiting this vulnerability would require a specific configuration where ProxyCommand is enabled and the SSH client processes an untrusted ssh:// URI containing null bytes. Under these conditions, the command parser may misinterpret the URI and execute unintended shell commands.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-158: Improper Neutralization of Null Byte or NUL Character, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation routines rigorously sanitize user-supplied data, ensuring special elements, such as control characters, escape sequences, or delimiters, are securely handled or rejected when not explicitly required. This prevents malformed input from disrupting control flow, altering parsing logic, or introducing injection risks. Secure development practices, including static code analysis and peer reviews, detect and remediate improper handling of special elements early in the development lifecycle. Runtime safeguards such as process isolation confine the impact of unexpected input to its execution context, preventing broader system instability or data exposure. Real-time monitoring further supports timely detection and response to anomalies or parsing errors related to special element misuse.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61985"
},
{
"category": "external",
"summary": "RHBZ#2401962",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401962"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61985",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61985"
},
{
"category": "external",
"summary": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2",
"url": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2"
},
{
"category": "external",
"summary": "https://www.openssh.com/releasenotes.html#10.1p1",
"url": "https://www.openssh.com/releasenotes.html#10.1p1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/10/06/1",
"url": "https://www.openwall.com/lists/oss-security/2025/10/06/1"
}
],
"release_date": "2025-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-15T10:02:39+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0685"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand"
}
]
}
RHSA-2026:0414
Vulnerability from csaf_redhat - Published: 2026-01-08 22:34 - Updated: 2026-01-17 01:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A Subscription Management tool for finding and reporting Red Hat product usage",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Discovery, also known as Discovery, is an inspection and reporting tool that finds,\nidentifies, and reports environment data, or facts, such as the number of physical and virtual\nsystems on a network, their operating systems, and relevant configuration data stored within\nthem. Discovery also identifies and reports more detailed facts for some versions of key\nRed Hat packages and products that it finds in the network.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0414",
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-5642",
"url": "https://access.redhat.com/security/cve/CVE-2024-5642"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-12816",
"url": "https://access.redhat.com/security/cve/CVE-2025-12816"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15284",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-45582",
"url": "https://access.redhat.com/security/cve/CVE-2025-45582"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-4598",
"url": "https://access.redhat.com/security/cve/CVE-2025-4598"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-59375",
"url": "https://access.redhat.com/security/cve/CVE-2025-59375"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-59682",
"url": "https://access.redhat.com/security/cve/CVE-2025-59682"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-6069",
"url": "https://access.redhat.com/security/cve/CVE-2025-6069"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-6075",
"url": "https://access.redhat.com/security/cve/CVE-2025-6075"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61984",
"url": "https://access.redhat.com/security/cve/CVE-2025-61984"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61985",
"url": "https://access.redhat.com/security/cve/CVE-2025-61985"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-64460",
"url": "https://access.redhat.com/security/cve/CVE-2025-64460"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-64720",
"url": "https://access.redhat.com/security/cve/CVE-2025-64720"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-64756",
"url": "https://access.redhat.com/security/cve/CVE-2025-64756"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-65018",
"url": "https://access.redhat.com/security/cve/CVE-2025-65018"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66031",
"url": "https://access.redhat.com/security/cve/CVE-2025-66031"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66293",
"url": "https://access.redhat.com/security/cve/CVE-2025-66293"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66418",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-8291",
"url": "https://access.redhat.com/security/cve/CVE-2025-8291"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-9714",
"url": "https://access.redhat.com/security/cve/CVE-2025-9714"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/subscription_central/1-latest/#Discovery",
"url": "https://docs.redhat.com/en/documentation/subscription_central/1-latest/#Discovery"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0414.json"
}
],
"title": "Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage",
"tracking": {
"current_release_date": "2026-01-17T01:00:16+00:00",
"generator": {
"date": "2026-01-17T01:00:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2026:0414",
"initial_release_date": "2026-01-08T22:34:17+00:00",
"revision_history": [
{
"date": "2026-01-08T22:34:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-08T22:34:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-17T01:00:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Discovery 2",
"product": {
"name": "Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:discovery:2::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Discovery"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"product": {
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"product_id": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-server-rhel9@sha256%3Ad4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf?arch=amd64\u0026repository_url=registry.redhat.io/discovery\u0026tag=1767888970"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"product": {
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"product_id": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-ui-rhel9@sha256%3A899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee?arch=amd64\u0026repository_url=registry.redhat.io/discovery\u0026tag=1767904573"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"product": {
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"product_id": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-server-rhel9@sha256%3A75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543?arch=arm64\u0026repository_url=registry.redhat.io/discovery\u0026tag=1767888970"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64",
"product": {
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64",
"product_id": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-ui-rhel9@sha256%3A8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e?arch=arm64\u0026repository_url=registry.redhat.io/discovery\u0026tag=1767904573"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64 as a component of Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64"
},
"product_reference": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"relates_to_product_reference": "Red Hat Discovery 2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64 as a component of Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
},
"product_reference": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"relates_to_product_reference": "Red Hat Discovery 2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64 as a component of Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64"
},
"product_reference": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"relates_to_product_reference": "Red Hat Discovery 2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64 as a component of Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
},
"product_reference": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64",
"relates_to_product_reference": "Red Hat Discovery 2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5642",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294682"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Python/CPython that does not disallow configuring an empty list (\"[]\") for SSLContext.set_npn_protocols(), which is an invalid value for the underlying OpenSSL API. This issue results in a buffer over-read when NPN is used. See CVE -2024-5535 for OpenSSL for more information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated with a Low severity due to NPN not being widely used and specifying an empty list is likely uncommon in practice. Typically, a protocol name would be configured.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-5642"
},
{
"category": "external",
"summary": "RHBZ#2294682",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294682"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-5642",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5642"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/PLP2JI3PJY33YG6P5BZYSSNU66HASXBQ/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/PLP2JI3PJY33YG6P5BZYSSNU66HASXBQ/"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 2.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used"
},
{
"cve": "CVE-2025-4598",
"cwe": {
"id": "CWE-364",
"name": "Signal Handler Race Condition"
},
"discovery_date": "2025-05-29T19:04:54.578000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2369242"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original\u0027s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner\u0027s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original\u0027s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd-coredump: race condition that allows a local attacker to crash a SUID program and gain read access to the resulting core dump",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was rated as having a severity of Moderate due to the complexity to exploit this flaw. The attacker needs to setup a way to win the race condition and have an unprivileged local account to successfully exploit this vulnerability.\n\nBy default Red Hat Enterprise Linux 8 doesn\u0027t allow systemd-coredump to create dumps of SUID programs as the /proc/sys/fs/suid_dumpable is set to 0, disabling by default this capability.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-364: Signal Handler Race Condition vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces least functionality by enabling only essential features, services, and ports to reduce the system\u2019s attack surface. Static code analysis, peer reviews, and strong input validation detect unsafe input that could influence execution timing or path resolution. Real-time threat detection, including IPS/IDS, antimalware, and continuous monitoring, supports rapid identification of exploitation attempts. Process isolation and Kubernetes orchestration minimize the risk of concurrent execution conflicts and contain potential impacts. Executable search paths are limited to trusted, explicitly defined directories, reducing the risk of executing malicious files. Additionally, signal handling is implemented using secure development practices that mitigate asynchronous execution risks, and workloads run in environments that abstract direct signal management.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-4598"
},
{
"category": "external",
"summary": "RHBZ#2369242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369242"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4598"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/05/29/3",
"url": "https://www.openwall.com/lists/oss-security/2025/05/29/3"
}
],
"release_date": "2025-05-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "This issue can be mitigated by disabling the capability of the system to generate a coredump for SUID binaries. The perform that, the following command can be ran as `root` user:\n\n~~~\necho 0 \u003e /proc/sys/fs/suid_dumpable\n~~~\n\nWhile this mitigates this vulnerability while it\u0027s not possible to update the systemd package, it disables the capability of analyzing crashes for such binaries.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd-coredump: race condition that allows a local attacker to crash a SUID program and gain read access to the resulting core dump"
},
{
"cve": "CVE-2025-6069",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2025-06-17T14:00:45.339399+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373234"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) vulnerability has been discovered in Python\u0027s html.parser.HTMLParser class. When processing specially malformed HTML input, the parsing runtime can become quadratic with respect to the input size. This significantly increased processing time can lead to excessive resource consumption, ultimately causing a denial-of-service condition in applications that rely on this parser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: Python HTMLParser quadratic complexity",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-1333: Inefficient Regular Expression Complexity and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nBaseline configurations enforce secure coding practices that restrict the use of inefficient or vulnerable regular expression patterns known to cause excessive backtracking or resource consumption. Input validation routines sanitize and constrain user input before it is evaluated by regular expressions, reducing the risk of triggering regex-related performance issues. Real-time system monitoring detects abnormal CPU usage or request latency indicative of inefficient regex execution, enabling timely investigation and response.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6069"
},
{
"category": "external",
"summary": "RHBZ#2373234",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373234"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6069",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6069"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949",
"url": "https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41",
"url": "https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b",
"url": "https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/135462",
"url": "https://github.com/python/cpython/issues/135462"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/135464",
"url": "https://github.com/python/cpython/pull/135464"
}
],
"release_date": "2025-06-17T13:39:46.058000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: Python HTMLParser quadratic complexity"
},
{
"cve": "CVE-2025-6075",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-31T17:01:47.052517+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408891"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in Python\u2019s os.path.expandvars() function that can cause performance degradation. When processing specially crafted, user-controlled input with nested environment variable patterns, the function exhibits quadratic time complexity, potentially leading to excessive CPU usage and denial of service (DoS) conditions. No code execution or data exposure occurs, so the impact is limited to performance slowdown.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: Quadratic complexity in os.path.expandvars() with user-controlled template",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low rather than Moderate because it only causes a performance inefficiency without affecting code execution, data integrity, or confidentiality. The flaw lies in the algorithmic complexity of os.path.expandvars(), which can become quadratic when processing crafted input containing repetitive or nested environment variable references. Exploitation requires the attacker to control the input string passed to this function, which is uncommon in secure applications. Moreover, the impact is limited to increased CPU utilization and potential slowdown, not system compromise or data manipulation. Since the issue does not introduce memory corruption, privilege escalation, or information disclosure risks, its overall impact scope and exploitability are minimal, justifying a Low severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6075"
},
{
"category": "external",
"summary": "RHBZ#2408891",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408891"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6075",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6075"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/136065",
"url": "https://github.com/python/cpython/issues/136065"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/IUP5QJ6D4KK6ULHOMPC7DPNKRYQTQNLA/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/IUP5QJ6D4KK6ULHOMPC7DPNKRYQTQNLA/"
}
],
"release_date": "2025-10-31T16:41:34.983000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "python: Quadratic complexity in os.path.expandvars() with user-controlled template"
},
{
"cve": "CVE-2025-8291",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2025-10-07T19:01:23.599055+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402342"
}
],
"notes": [
{
"category": "description",
"text": "The \u0027zipfile\u0027 module would not check the validity of the ZIP64 End of\nCentral Directory (EOCD) Locator record offset value would not be used to\nlocate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be\nassumed to be the previous record in the ZIP archive. This could be abused\nto create ZIP archives that are handled differently by the \u0027zipfile\u0027 module\ncompared to other ZIP implementations.\n\n\nRemediation maintains this behavior, but checks that the offset specified\nin the ZIP64 EOCD Locator record matches the expected value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: python: Python zipfile End of Central Directory (EOCD) Locator record offset not checked",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-130: Improper Handling of Length Parameter Inconsistency and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation ensures length parameters align with actual buffer or data structure sizes, preventing truncation, overflow, and memory corruption. Secure development practices, such as static code analysis and peer reviews, detect improper length handling early and enforce consistency between declared and actual sizes. At runtime, process isolation contains memory anomalies within the originating context, preventing system-wide impact. Real-time monitoring detects crashes, segmentation faults, or buffer misuse, enabling prompt investigation and remediation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-8291"
},
{
"category": "external",
"summary": "RHBZ#2402342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402342"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-8291",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8291"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/162997bb70e067668c039700141770687bc8f267",
"url": "https://github.com/python/cpython/commit/162997bb70e067668c039700141770687bc8f267"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/333d4a6f4967d3ace91492a39ededbcf3faa76a6",
"url": "https://github.com/python/cpython/commit/333d4a6f4967d3ace91492a39ededbcf3faa76a6"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/139700",
"url": "https://github.com/python/cpython/issues/139700"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/139702",
"url": "https://github.com/python/cpython/pull/139702"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/QECOPWMTH4VPPJAXAH2BGTA4XADOP62G/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/QECOPWMTH4VPPJAXAH2BGTA4XADOP62G/"
}
],
"release_date": "2025-10-07T18:10:05.908000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: python: Python zipfile End of Central Directory (EOCD) Locator record offset not checked"
},
{
"cve": "CVE-2025-9714",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"discovery_date": "2025-09-02T13:03:56.452000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2392605"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxstl/libxml2. The \u0027exsltDynMapFunction\u0027 function in libexslt/dynamic.c does not contain a recursion depth check, which may cause an infinite loop via a specially crafted XSLT document while handling \u0027dyn:map()\u0027, leading to stack exhaustion and a local denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxslt: libxml2: Inifinite recursion at exsltDynMapFunction function in libexslt/dynamic.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "No evidence was found for arbitrary memory corruption through this flaw, limiting its impact to Availability only, and reducing its severity to Moderate.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-606: Unchecked Input for Loop Condition vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation controls are in place, which ensure that any input controlling loop behavior is validated against strict criteria like type, length, and range before being processed. This prevents malicious or abnormal inputs from causing excessive or infinite iterations, thereby avoiding logic errors or system overloads. Memory protection controls such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) protect the system\u2019s memory from overuse or corruption if an unchecked input were to cause a loop to execute excessively. It ensures that memory is safely allocated and accessed, reducing the risks of buffer overflows, resource exhaustion, or crashes. Lastly, the implementation of security engineering principles dictates the use of secure coding practices, such as input validation, loop iteration limits, and error handling, are integrated during system design and development.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9714"
},
{
"category": "external",
"summary": "RHBZ#2392605",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392605"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9714",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9714"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21",
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/148",
"url": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/148"
}
],
"release_date": "2025-09-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "The impact of this flaw may be reduced by setting strict resource limits to the stack size of processes at the operational system level. This can be achieved either through the \u0027ulimit\u0027 shell built-in or the \u0027limits.conf\u0027 file.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxslt: libxml2: Inifinite recursion at exsltDynMapFunction function in libexslt/dynamic.c"
},
{
"cve": "CVE-2025-12816",
"cwe": {
"id": "CWE-179",
"name": "Incorrect Behavior Order: Early Validation"
},
"discovery_date": "2025-11-25T20:01:05.875196+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2417097"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in node-forge. This vulnerability allows unauthenticated attackers to bypass downstream cryptographic verifications and security decisions via crafting ASN.1 (Abstract Syntax Notation One) structures to desynchronize schema validations, yielding a semantic divergence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products due to an interpretation conflict in the node-forge library. An unauthenticated attacker could exploit this flaw by crafting malicious ASN.1 structures, leading to a bypass of cryptographic verifications and security decisions in affected applications. This impacts various Red Hat products that utilize node-forge for cryptographic operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12816"
},
{
"category": "external",
"summary": "RHBZ#2417097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2417097"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12816"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge",
"url": "https://github.com/digitalbazaar/forge"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/pull/1124",
"url": "https://github.com/digitalbazaar/forge/pull/1124"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/521113",
"url": "https://kb.cert.org/vuls/id/521113"
},
{
"category": "external",
"summary": "https://www.npmjs.com/package/node-forge",
"url": "https://www.npmjs.com/package/node-forge"
}
],
"release_date": "2025-11-25T19:15:50.243000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications"
},
{
"cve": "CVE-2025-15284",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-29T23:00:58.541337+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2425946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in qs, a module used for parsing query strings. A remote attacker can exploit an improper input validation vulnerability by sending specially crafted HTTP requests that use bracket notation (e.g., `a[]=value`). This bypasses the `arrayLimit` option, which is designed to limit the size of parsed arrays and prevent resource exhaustion. Successful exploitation can lead to memory exhaustion, causing a Denial of Service (DoS) where the application crashes or becomes unresponsive, making the service unavailable to users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "qs: qs: Denial of Service via improper input validation in array parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products that utilize the `qs` module for parsing query strings, particularly when processing user-controlled input with bracket notation. The `arrayLimit` option, intended to prevent resource exhaustion, is bypassed when bracket notation (`a[]=value`) is used, allowing a remote attacker to cause a denial of service through memory exhaustion. This can lead to application crashes or unresponsiveness, making the service unavailable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "RHBZ#2425946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9",
"url": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p",
"url": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p"
}
],
"release_date": "2025-12-29T22:56:45.240000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "qs: qs: Denial of Service via improper input validation in array parsing"
},
{
"cve": "CVE-2025-45582",
"cwe": {
"id": "CWE-24",
"name": "Path Traversal: \u0027../filedir\u0027"
},
"discovery_date": "2025-07-11T17:00:47.340822+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2379592"
}
],
"notes": [
{
"category": "description",
"text": "A relative path traversal flaw was found in the gnu tar utility. When archives with relative paths are extracted without the \u2018--keep-old-files\u2019 (\u2018-k\u2019), the extraction process may overwrite existing files that the current user has access to. The server may be impacted if these files are critical to the operation of some service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tar: Tar path traversal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-24: Path Traversal: \u0027../filedir\u0027 and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nBaseline configurations enforce strict privilege levels for code execution, allowing only authorized processes to access or modify files within approved directories. Input validation sanitizes and verifies user-supplied file paths against defined patterns, blocking traversal sequences that could enable unauthorized access outside designated locations. Configuration settings further restrict directory and file system access, ensuring applications operate within approved resources and execution boundaries.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-45582"
},
{
"category": "external",
"summary": "RHBZ#2379592",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2379592"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-45582",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-45582"
},
{
"category": "external",
"summary": "https://github.com/i900008/vulndb/blob/main/Gnu_tar_vuln.md",
"url": "https://github.com/i900008/vulndb/blob/main/Gnu_tar_vuln.md"
},
{
"category": "external",
"summary": "https://www.gnu.org/software/tar/",
"url": "https://www.gnu.org/software/tar/"
},
{
"category": "external",
"summary": "https://www.gnu.org/software/tar/manual/html_node/Integrity.html#Integrity",
"url": "https://www.gnu.org/software/tar/manual/html_node/Integrity.html#Integrity"
}
],
"release_date": "2025-07-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tar: Tar path traversal"
},
{
"cve": "CVE-2025-59375",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-09-15T03:00:59.775098+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2395108"
}
],
"notes": [
{
"category": "description",
"text": "A memory amplification vulnerability in libexpat allows attackers to trigger excessive dynamic memory allocations by submitting specially crafted XML input. A small input (~250 KiB) can cause the parser to allocate hundreds of megabytes, leading to denial-of-service (DoS) through memory exhaustion.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is Important rather than Critical because, while it allows for significant resource exhaustion leading to denial-of-service (DoS), it does not enable arbitrary code execution, data leakage, or privilege escalation. The vulnerability stems from an uncontrolled memory amplification behavior in libexpat\u2019s parser, where a relatively small XML payload can cause disproportionately large heap allocations. However, the flaw is limited in scope to service disruption and requires the attacker to submit a crafted XML document\u2014something that can be mitigated with proper input validation and memory usage limits. Therefore, while the exploitability is high, the impact is confined to availability, not confidentiality or integrity, making it a high-severity but not critical flaw.\n\nIn Firefox and Thunderbird, where libexpat is a transitive userspace dependency, exploitation usually just crashes the application (app-level DoS), so it is classify as Moderate instead of Important.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59375"
},
{
"category": "external",
"summary": "RHBZ#2395108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395108"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59375",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59375"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/blob/676a4c531ec768732fac215da9730b5f50fbd2bf/expat/Changes#L45-L74",
"url": "https://github.com/libexpat/libexpat/blob/676a4c531ec768732fac215da9730b5f50fbd2bf/expat/Changes#L45-L74"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/issues/1018",
"url": "https://github.com/libexpat/libexpat/issues/1018"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/pull/1034",
"url": "https://github.com/libexpat/libexpat/pull/1034"
},
{
"category": "external",
"summary": "https://issues.oss-fuzz.com/issues/439133977",
"url": "https://issues.oss-fuzz.com/issues/439133977"
}
],
"release_date": "2025-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "To mitigate the issue, limit XML input size and complexity before parsing, and avoid accepting compressed or deeply nested XML. Use OS-level resource controls (like ulimit or setrlimit()) to cap memory usage, or run the parser in a sandboxed or isolated process with strict memory and CPU limits. This helps prevent denial-of-service by containing excessive resource consumption.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing"
},
{
"cve": "CVE-2025-59682",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-09-30T13:18:31.746000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2400450"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. The django.utils.archive.extract() function, used by the \"startapp --template\" and \"startproject --template\" commands, allows partial directory traversal via an archive with file paths sharing a common prefix with the target directory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "django: Potential partial directory-traversal via archive.extract()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59682"
},
{
"category": "external",
"summary": "RHBZ#2400450",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400450"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59682"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59682",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59682"
}
],
"release_date": "2025-10-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "django: Potential partial directory-traversal via archive.extract()"
},
{
"cve": "CVE-2025-61984",
"cwe": {
"id": "CWE-159",
"name": "Improper Handling of Invalid Use of Special Elements"
},
"discovery_date": "2025-10-06T19:01:13.449665+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401960"
}
],
"notes": [
{
"category": "description",
"text": "ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is MODERATE because it is a critical component used across many Red Hat products.\nThe issue occurs only when a ProxyCommand is configured and the SSH client handles a username containing control characters from an untrusted source, such as script-generated input or expanded configuration values.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-159: Improper Handling of Invalid Use of Special Elements\n\nStrict input validation sanitizes user-supplied data to ensure special elements, such as control characters, escape sequences, or delimiters, are only allowed when explicitly required, preventing malformed inputs from disrupting control flow, parsing, or protocol logic. Secure development practices, including static code analysis and peer reviews, catch improper handling of special elements early in the lifecycle, reducing the risk of logic flaws and injection vectors. Additionally, robust error handling and process isolation contain the impact of malformed inputs to the originating context, avoiding system-wide disruption or data exposure. Real-time monitoring detects anomalous behavior stemming from improper input handling, enabling prompt investigation and response.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61984"
},
{
"category": "external",
"summary": "RHBZ#2401960",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401960"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61984",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61984"
},
{
"category": "external",
"summary": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2",
"url": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2"
},
{
"category": "external",
"summary": "https://www.openssh.com/releasenotes.html#10.1p1",
"url": "https://www.openssh.com/releasenotes.html#10.1p1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/10/06/1",
"url": "https://www.openwall.com/lists/oss-security/2025/10/06/1"
}
],
"release_date": "2025-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand"
},
{
"cve": "CVE-2025-61985",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2025-10-06T19:01:16.841946+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401962"
}
],
"notes": [
{
"category": "description",
"text": "ssh in OpenSSH before 10.1 allows the \u0027\\0\u0027 character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is MODERATE because it is a critical component used across many Red Hat products.\nExploiting this vulnerability would require a specific configuration where ProxyCommand is enabled and the SSH client processes an untrusted ssh:// URI containing null bytes. Under these conditions, the command parser may misinterpret the URI and execute unintended shell commands.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-158: Improper Neutralization of Null Byte or NUL Character, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation routines rigorously sanitize user-supplied data, ensuring special elements, such as control characters, escape sequences, or delimiters, are securely handled or rejected when not explicitly required. This prevents malformed input from disrupting control flow, altering parsing logic, or introducing injection risks. Secure development practices, including static code analysis and peer reviews, detect and remediate improper handling of special elements early in the development lifecycle. Runtime safeguards such as process isolation confine the impact of unexpected input to its execution context, preventing broader system instability or data exposure. Real-time monitoring further supports timely detection and response to anomalies or parsing errors related to special element misuse.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61985"
},
{
"category": "external",
"summary": "RHBZ#2401962",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401962"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61985",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61985"
},
{
"category": "external",
"summary": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2",
"url": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2"
},
{
"category": "external",
"summary": "https://www.openssh.com/releasenotes.html#10.1p1",
"url": "https://www.openssh.com/releasenotes.html#10.1p1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/10/06/1",
"url": "https://www.openwall.com/lists/oss-security/2025/10/06/1"
}
],
"release_date": "2025-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand"
},
{
"cve": "CVE-2025-64460",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2025-12-02T16:01:05.300335+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418366"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Django. This vulnerability allows a remote attacker to cause a potential denial-of-service (DoS) attack triggering Central Processing Unit (CPU) and memory exhaustion via specially crafted Extensible Markup Language (XML) input processed by the XML Deserializer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Django: Django: Algorithmic complexity in XML Deserializer leads to denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products that process XML input using Django\u0027s XML Deserializer, including Red Hat Ansible Automation Platform, Red Hat OpenStack Platform, and OpenShift Service Mesh. A remote attacker can exploit this flaw by providing specially crafted XML, leading to a denial-of-service due to CPU and memory exhaustion.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-64460"
},
{
"category": "external",
"summary": "RHBZ#2418366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418366"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-64460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64460"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-64460",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64460"
},
{
"category": "external",
"summary": "https://docs.djangoproject.com/en/dev/releases/security/",
"url": "https://docs.djangoproject.com/en/dev/releases/security/"
},
{
"category": "external",
"summary": "https://groups.google.com/g/django-announce",
"url": "https://groups.google.com/g/django-announce"
},
{
"category": "external",
"summary": "https://www.djangoproject.com/weblog/2025/dec/02/security-releases/",
"url": "https://www.djangoproject.com/weblog/2025/dec/02/security-releases/"
}
],
"release_date": "2025-12-02T15:15:34.451000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Django: Django: Algorithmic complexity in XML Deserializer leads to denial of service"
},
{
"cve": "CVE-2025-64720",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-11-25T00:00:54.081073+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416904"
}
],
"notes": [
{
"category": "description",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component \u2264 alpha \u00d7 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libpng: LIBPNG buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. An out-of-bounds read in libpng can occur when processing specially crafted palette images with `PNG_FLAG_OPTIMIZE_ALPHA` enabled. Successful exploitation requires a user to process a malicious PNG file, leading to potential application crash or information disclosure.\n\njava-*-openjdk-headless packages do not contain libsplashscreen.so, hence are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-64720"
},
{
"category": "external",
"summary": "RHBZ#2416904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416904"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-64720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-64720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64720"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/commit/08da33b4c88cfcd36e5a706558a8d7e0e4773643",
"url": "https://github.com/pnggroup/libpng/commit/08da33b4c88cfcd36e5a706558a8d7e0e4773643"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/issues/686",
"url": "https://github.com/pnggroup/libpng/issues/686"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/pull/751",
"url": "https://github.com/pnggroup/libpng/pull/751"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/security/advisories/GHSA-hfc7-ph9c-wcww",
"url": "https://github.com/pnggroup/libpng/security/advisories/GHSA-hfc7-ph9c-wcww"
}
],
"release_date": "2025-11-24T23:45:38.315000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libpng: LIBPNG buffer overflow"
},
{
"cve": "CVE-2025-64756",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2025-11-17T18:01:28.077927+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2415451"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in glob. This vulnerability allows arbitrary command execution via processing files with malicious names when the glob command-line interface (CLI) is used with the -c/--cmd option, enabling shell metacharacters to trigger command injection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glob: glob: Command Injection Vulnerability via Malicious Filenames",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw in glob allows arbitrary command execution when the `glob` command-line interface is used with the `-c/--cmd` option to process files with malicious names. The vulnerability is triggered by shell metacharacters in filenames, leading to command injection. The glob CLI tool utilizes the -c option to execute shell commands over the files which matched the searched pattern by using the shell:true parameter when creating the subprocess which will further execute the command informed via \u0027-c\u0027 option, this parameter allows the shell meta characters to be used and processed when executing the command. Given that information glob misses to sanitize the file name to eliminate such characters and expressions from the filename, leading to code execution as when performing the shell expansion such characters will be interpreted as shell commands.\n\nTo exploit this vulnerability the targeted system should run the glob CLI over a file with a maliciously crafted filename, additionally the attacker needs to have enough permission to create such file or trick the user to download and process the required file with the glob CLI.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-64756"
},
{
"category": "external",
"summary": "RHBZ#2415451",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2415451"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-64756",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64756"
},
{
"category": "external",
"summary": "https://github.com/isaacs/node-glob/commit/47473c046b91c67269df7a66eab782a6c2716146",
"url": "https://github.com/isaacs/node-glob/commit/47473c046b91c67269df7a66eab782a6c2716146"
},
{
"category": "external",
"summary": "https://github.com/isaacs/node-glob/security/advisories/GHSA-5j98-mcp5-4vw2",
"url": "https://github.com/isaacs/node-glob/security/advisories/GHSA-5j98-mcp5-4vw2"
}
],
"release_date": "2025-11-17T17:29:08.029000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "To mitigate this issue, avoid using the `glob` command-line interface with the `-c` or `--cmd` option when processing filenames from untrusted sources. If programmatic use of `glob` is necessary, ensure that filenames are thoroughly sanitized before being passed to commands executed with shell interpretation enabled.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "glob: glob: Command Injection Vulnerability via Malicious Filenames"
},
{
"cve": "CVE-2025-65018",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-11-25T00:01:05.570152+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416907"
}
],
"notes": [
{
"category": "description",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libpng: LIBPNG heap buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. A heap buffer overflow exists in the libpng library\u0027s png_image_finish_read function when processing specially crafted 16-bit interlaced PNG images with an 8-bit output format. Successful exploitation requires a user or an automated system to process a malicious PNG file, which could lead to application crashes or arbitrary code execution.\n\njava-*-openjdk-headless packages do not contain libsplashscreen.so, hence are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-65018"
},
{
"category": "external",
"summary": "RHBZ#2416907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-65018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65018"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-65018",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65018"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/commit/16b5e3823918840aae65c0a6da57c78a5a496a4d",
"url": "https://github.com/pnggroup/libpng/commit/16b5e3823918840aae65c0a6da57c78a5a496a4d"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea",
"url": "https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/issues/755",
"url": "https://github.com/pnggroup/libpng/issues/755"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/pull/757",
"url": "https://github.com/pnggroup/libpng/pull/757"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/security/advisories/GHSA-7wv6-48j4-hj3g",
"url": "https://github.com/pnggroup/libpng/security/advisories/GHSA-7wv6-48j4-hj3g"
}
],
"release_date": "2025-11-24T23:50:18.294000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libpng: LIBPNG heap buffer overflow"
},
{
"cve": "CVE-2025-66031",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-11-26T23:01:36.363253+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2417397"
}
],
"notes": [
{
"category": "description",
"text": "Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: node-forge ASN.1 Unbounded Recursion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66031"
},
{
"category": "external",
"summary": "RHBZ#2417397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2417397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66031"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66031",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66031"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/commit/260425c6167a38aae038697132483b5517b26451",
"url": "https://github.com/digitalbazaar/forge/commit/260425c6167a38aae038697132483b5517b26451"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-554w-wpv2-vw27",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-554w-wpv2-vw27"
}
],
"release_date": "2025-11-26T22:23:26.013000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "node-forge: node-forge ASN.1 Unbounded Recursion"
},
{
"cve": "CVE-2025-66293",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-12-03T21:00:59.956903+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418711"
}
],
"notes": [
{
"category": "description",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng\u0027s simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng\u0027s internal state management. Upgrade to libpng 1.6.52 or later.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libpng: LIBPNG out-of-bounds read in png_image_read_composite",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products as it affects libpng, a widely used library for processing PNG images. An out-of-bounds read can occur in libpng\u0027s simplified API when handling specially crafted PNG images with partial transparency and gamma correction. This could lead to information disclosure or application crashes in software that processes untrusted PNG files using affected versions of libpng.\n\njava-*-openjdk-headless packages do not contain libsplashscreen.so, hence are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66293"
},
{
"category": "external",
"summary": "RHBZ#2418711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418711"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66293",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66293"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1",
"url": "https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/commit/a05a48b756de63e3234ea6b3b938b8f5f862484a",
"url": "https://github.com/pnggroup/libpng/commit/a05a48b756de63e3234ea6b3b938b8f5f862484a"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/issues/764",
"url": "https://github.com/pnggroup/libpng/issues/764"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/security/advisories/GHSA-9mpm-9pxh-mg4f",
"url": "https://github.com/pnggroup/libpng/security/advisories/GHSA-9mpm-9pxh-mg4f"
}
],
"release_date": "2025-12-03T20:33:57.086000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libpng: LIBPNG out-of-bounds read in png_image_read_composite"
},
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-05T17:01:20.277857+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419455"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "RHBZ#2419455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"release_date": "2025-12-05T16:02:15.271000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion"
}
]
}
RHSA-2025:23480
Vulnerability from csaf_redhat - Published: 2025-12-17 16:48 - Updated: 2026-01-15 16:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssh is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.\n\nSecurity Fix(es):\n\n* openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand (CVE-2025-61984)\n\n* openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand (CVE-2025-61985)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:23480",
"url": "https://access.redhat.com/errata/RHSA-2025:23480"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2401960",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401960"
},
{
"category": "external",
"summary": "2401962",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401962"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_23480.json"
}
],
"title": "Red Hat Security Advisory: openssh security update",
"tracking": {
"current_release_date": "2026-01-15T16:00:46+00:00",
"generator": {
"date": "2026-01-15T16:00:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2025:23480",
"initial_release_date": "2025-12-17T16:48:13+00:00",
"revision_history": [
{
"date": "2025-12-17T16:48:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-12-17T16:48:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-15T16:00:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-askpass-0:8.7p1-47.el9_7.aarch64",
"product": {
"name": "openssh-askpass-0:8.7p1-47.el9_7.aarch64",
"product_id": "openssh-askpass-0:8.7p1-47.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@8.7p1-47.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.aarch64",
"product": {
"name": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.aarch64",
"product_id": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.10.4-5.47.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-debugsource-0:8.7p1-47.el9_7.aarch64",
"product": {
"name": "openssh-debugsource-0:8.7p1-47.el9_7.aarch64",
"product_id": "openssh-debugsource-0:8.7p1-47.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debugsource@8.7p1-47.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.aarch64",
"product": {
"name": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.aarch64",
"product_id": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@8.7p1-47.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.aarch64",
"product": {
"name": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.aarch64",
"product_id": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients-debuginfo@8.7p1-47.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-debuginfo-0:8.7p1-47.el9_7.aarch64",
"product": {
"name": "openssh-debuginfo-0:8.7p1-47.el9_7.aarch64",
"product_id": "openssh-debuginfo-0:8.7p1-47.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@8.7p1-47.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.aarch64",
"product": {
"name": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.aarch64",
"product_id": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@8.7p1-47.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-server-debuginfo-0:8.7p1-47.el9_7.aarch64",
"product": {
"name": "openssh-server-debuginfo-0:8.7p1-47.el9_7.aarch64",
"product_id": "openssh-server-debuginfo-0:8.7p1-47.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server-debuginfo@8.7p1-47.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.aarch64",
"product": {
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.aarch64",
"product_id": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-sk-dummy-debuginfo@8.7p1-47.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.aarch64",
"product": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.aarch64",
"product_id": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam_ssh_agent_auth-debuginfo@0.10.4-5.47.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-0:8.7p1-47.el9_7.aarch64",
"product": {
"name": "openssh-0:8.7p1-47.el9_7.aarch64",
"product_id": "openssh-0:8.7p1-47.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@8.7p1-47.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:8.7p1-47.el9_7.aarch64",
"product": {
"name": "openssh-clients-0:8.7p1-47.el9_7.aarch64",
"product_id": "openssh-clients-0:8.7p1-47.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@8.7p1-47.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-0:8.7p1-47.el9_7.aarch64",
"product": {
"name": "openssh-keycat-0:8.7p1-47.el9_7.aarch64",
"product_id": "openssh-keycat-0:8.7p1-47.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat@8.7p1-47.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:8.7p1-47.el9_7.aarch64",
"product": {
"name": "openssh-server-0:8.7p1-47.el9_7.aarch64",
"product_id": "openssh-server-0:8.7p1-47.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@8.7p1-47.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-askpass-0:8.7p1-47.el9_7.ppc64le",
"product": {
"name": "openssh-askpass-0:8.7p1-47.el9_7.ppc64le",
"product_id": "openssh-askpass-0:8.7p1-47.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@8.7p1-47.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.ppc64le",
"product": {
"name": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.ppc64le",
"product_id": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.10.4-5.47.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-debugsource-0:8.7p1-47.el9_7.ppc64le",
"product": {
"name": "openssh-debugsource-0:8.7p1-47.el9_7.ppc64le",
"product_id": "openssh-debugsource-0:8.7p1-47.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debugsource@8.7p1-47.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"product": {
"name": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"product_id": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@8.7p1-47.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"product": {
"name": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"product_id": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients-debuginfo@8.7p1-47.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"product": {
"name": "openssh-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"product_id": "openssh-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@8.7p1-47.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"product": {
"name": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"product_id": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@8.7p1-47.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-server-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"product": {
"name": "openssh-server-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"product_id": "openssh-server-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server-debuginfo@8.7p1-47.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"product": {
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"product_id": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-sk-dummy-debuginfo@8.7p1-47.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.ppc64le",
"product": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.ppc64le",
"product_id": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam_ssh_agent_auth-debuginfo@0.10.4-5.47.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-0:8.7p1-47.el9_7.ppc64le",
"product": {
"name": "openssh-0:8.7p1-47.el9_7.ppc64le",
"product_id": "openssh-0:8.7p1-47.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@8.7p1-47.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:8.7p1-47.el9_7.ppc64le",
"product": {
"name": "openssh-clients-0:8.7p1-47.el9_7.ppc64le",
"product_id": "openssh-clients-0:8.7p1-47.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@8.7p1-47.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-0:8.7p1-47.el9_7.ppc64le",
"product": {
"name": "openssh-keycat-0:8.7p1-47.el9_7.ppc64le",
"product_id": "openssh-keycat-0:8.7p1-47.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat@8.7p1-47.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:8.7p1-47.el9_7.ppc64le",
"product": {
"name": "openssh-server-0:8.7p1-47.el9_7.ppc64le",
"product_id": "openssh-server-0:8.7p1-47.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@8.7p1-47.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-askpass-0:8.7p1-47.el9_7.x86_64",
"product": {
"name": "openssh-askpass-0:8.7p1-47.el9_7.x86_64",
"product_id": "openssh-askpass-0:8.7p1-47.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@8.7p1-47.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.x86_64",
"product": {
"name": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.x86_64",
"product_id": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.10.4-5.47.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-debugsource-0:8.7p1-47.el9_7.x86_64",
"product": {
"name": "openssh-debugsource-0:8.7p1-47.el9_7.x86_64",
"product_id": "openssh-debugsource-0:8.7p1-47.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debugsource@8.7p1-47.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.x86_64",
"product": {
"name": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.x86_64",
"product_id": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@8.7p1-47.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.x86_64",
"product": {
"name": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.x86_64",
"product_id": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients-debuginfo@8.7p1-47.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-debuginfo-0:8.7p1-47.el9_7.x86_64",
"product": {
"name": "openssh-debuginfo-0:8.7p1-47.el9_7.x86_64",
"product_id": "openssh-debuginfo-0:8.7p1-47.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@8.7p1-47.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.x86_64",
"product": {
"name": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.x86_64",
"product_id": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@8.7p1-47.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-server-debuginfo-0:8.7p1-47.el9_7.x86_64",
"product": {
"name": "openssh-server-debuginfo-0:8.7p1-47.el9_7.x86_64",
"product_id": "openssh-server-debuginfo-0:8.7p1-47.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server-debuginfo@8.7p1-47.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.x86_64",
"product": {
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.x86_64",
"product_id": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-sk-dummy-debuginfo@8.7p1-47.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.x86_64",
"product": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.x86_64",
"product_id": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam_ssh_agent_auth-debuginfo@0.10.4-5.47.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-0:8.7p1-47.el9_7.x86_64",
"product": {
"name": "openssh-0:8.7p1-47.el9_7.x86_64",
"product_id": "openssh-0:8.7p1-47.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@8.7p1-47.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:8.7p1-47.el9_7.x86_64",
"product": {
"name": "openssh-clients-0:8.7p1-47.el9_7.x86_64",
"product_id": "openssh-clients-0:8.7p1-47.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@8.7p1-47.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-0:8.7p1-47.el9_7.x86_64",
"product": {
"name": "openssh-keycat-0:8.7p1-47.el9_7.x86_64",
"product_id": "openssh-keycat-0:8.7p1-47.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat@8.7p1-47.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:8.7p1-47.el9_7.x86_64",
"product": {
"name": "openssh-server-0:8.7p1-47.el9_7.x86_64",
"product_id": "openssh-server-0:8.7p1-47.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@8.7p1-47.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-askpass-0:8.7p1-47.el9_7.s390x",
"product": {
"name": "openssh-askpass-0:8.7p1-47.el9_7.s390x",
"product_id": "openssh-askpass-0:8.7p1-47.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@8.7p1-47.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.s390x",
"product": {
"name": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.s390x",
"product_id": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.10.4-5.47.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-debugsource-0:8.7p1-47.el9_7.s390x",
"product": {
"name": "openssh-debugsource-0:8.7p1-47.el9_7.s390x",
"product_id": "openssh-debugsource-0:8.7p1-47.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debugsource@8.7p1-47.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.s390x",
"product": {
"name": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.s390x",
"product_id": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@8.7p1-47.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.s390x",
"product": {
"name": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.s390x",
"product_id": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients-debuginfo@8.7p1-47.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-debuginfo-0:8.7p1-47.el9_7.s390x",
"product": {
"name": "openssh-debuginfo-0:8.7p1-47.el9_7.s390x",
"product_id": "openssh-debuginfo-0:8.7p1-47.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@8.7p1-47.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.s390x",
"product": {
"name": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.s390x",
"product_id": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@8.7p1-47.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-server-debuginfo-0:8.7p1-47.el9_7.s390x",
"product": {
"name": "openssh-server-debuginfo-0:8.7p1-47.el9_7.s390x",
"product_id": "openssh-server-debuginfo-0:8.7p1-47.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server-debuginfo@8.7p1-47.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.s390x",
"product": {
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.s390x",
"product_id": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-sk-dummy-debuginfo@8.7p1-47.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.s390x",
"product": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.s390x",
"product_id": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam_ssh_agent_auth-debuginfo@0.10.4-5.47.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-0:8.7p1-47.el9_7.s390x",
"product": {
"name": "openssh-0:8.7p1-47.el9_7.s390x",
"product_id": "openssh-0:8.7p1-47.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@8.7p1-47.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:8.7p1-47.el9_7.s390x",
"product": {
"name": "openssh-clients-0:8.7p1-47.el9_7.s390x",
"product_id": "openssh-clients-0:8.7p1-47.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@8.7p1-47.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-0:8.7p1-47.el9_7.s390x",
"product": {
"name": "openssh-keycat-0:8.7p1-47.el9_7.s390x",
"product_id": "openssh-keycat-0:8.7p1-47.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat@8.7p1-47.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:8.7p1-47.el9_7.s390x",
"product": {
"name": "openssh-server-0:8.7p1-47.el9_7.s390x",
"product_id": "openssh-server-0:8.7p1-47.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@8.7p1-47.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-0:8.7p1-47.el9_7.src",
"product": {
"name": "openssh-0:8.7p1-47.el9_7.src",
"product_id": "openssh-0:8.7p1-47.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@8.7p1-47.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.7p1-47.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.aarch64"
},
"product_reference": "openssh-0:8.7p1-47.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.7p1-47.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.ppc64le"
},
"product_reference": "openssh-0:8.7p1-47.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.7p1-47.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.s390x"
},
"product_reference": "openssh-0:8.7p1-47.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.7p1-47.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.src"
},
"product_reference": "openssh-0:8.7p1-47.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.7p1-47.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.x86_64"
},
"product_reference": "openssh-0:8.7p1-47.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:8.7p1-47.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.aarch64"
},
"product_reference": "openssh-askpass-0:8.7p1-47.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:8.7p1-47.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.ppc64le"
},
"product_reference": "openssh-askpass-0:8.7p1-47.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:8.7p1-47.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.s390x"
},
"product_reference": "openssh-askpass-0:8.7p1-47.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:8.7p1-47.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.x86_64"
},
"product_reference": "openssh-askpass-0:8.7p1-47.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.aarch64"
},
"product_reference": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.ppc64le"
},
"product_reference": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.s390x"
},
"product_reference": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.x86_64"
},
"product_reference": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:8.7p1-47.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.aarch64"
},
"product_reference": "openssh-clients-0:8.7p1-47.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:8.7p1-47.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.ppc64le"
},
"product_reference": "openssh-clients-0:8.7p1-47.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:8.7p1-47.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.s390x"
},
"product_reference": "openssh-clients-0:8.7p1-47.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:8.7p1-47.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.x86_64"
},
"product_reference": "openssh-clients-0:8.7p1-47.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.aarch64"
},
"product_reference": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.ppc64le"
},
"product_reference": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.s390x"
},
"product_reference": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.x86_64"
},
"product_reference": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:8.7p1-47.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.aarch64"
},
"product_reference": "openssh-debuginfo-0:8.7p1-47.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:8.7p1-47.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.ppc64le"
},
"product_reference": "openssh-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:8.7p1-47.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.s390x"
},
"product_reference": "openssh-debuginfo-0:8.7p1-47.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:8.7p1-47.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.x86_64"
},
"product_reference": "openssh-debuginfo-0:8.7p1-47.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:8.7p1-47.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.aarch64"
},
"product_reference": "openssh-debugsource-0:8.7p1-47.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:8.7p1-47.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.ppc64le"
},
"product_reference": "openssh-debugsource-0:8.7p1-47.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:8.7p1-47.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.s390x"
},
"product_reference": "openssh-debugsource-0:8.7p1-47.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:8.7p1-47.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.x86_64"
},
"product_reference": "openssh-debugsource-0:8.7p1-47.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:8.7p1-47.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.aarch64"
},
"product_reference": "openssh-keycat-0:8.7p1-47.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:8.7p1-47.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.ppc64le"
},
"product_reference": "openssh-keycat-0:8.7p1-47.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:8.7p1-47.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.s390x"
},
"product_reference": "openssh-keycat-0:8.7p1-47.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:8.7p1-47.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.x86_64"
},
"product_reference": "openssh-keycat-0:8.7p1-47.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.aarch64"
},
"product_reference": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.ppc64le"
},
"product_reference": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.s390x"
},
"product_reference": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.x86_64"
},
"product_reference": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:8.7p1-47.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.aarch64"
},
"product_reference": "openssh-server-0:8.7p1-47.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:8.7p1-47.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.ppc64le"
},
"product_reference": "openssh-server-0:8.7p1-47.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:8.7p1-47.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.s390x"
},
"product_reference": "openssh-server-0:8.7p1-47.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:8.7p1-47.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.x86_64"
},
"product_reference": "openssh-server-0:8.7p1-47.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:8.7p1-47.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.aarch64"
},
"product_reference": "openssh-server-debuginfo-0:8.7p1-47.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:8.7p1-47.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.ppc64le"
},
"product_reference": "openssh-server-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:8.7p1-47.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.s390x"
},
"product_reference": "openssh-server-debuginfo-0:8.7p1-47.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:8.7p1-47.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.x86_64"
},
"product_reference": "openssh-server-debuginfo-0:8.7p1-47.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.aarch64"
},
"product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.ppc64le"
},
"product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.s390x"
},
"product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.x86_64"
},
"product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.aarch64"
},
"product_reference": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.ppc64le"
},
"product_reference": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.s390x"
},
"product_reference": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.x86_64"
},
"product_reference": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.aarch64"
},
"product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.ppc64le"
},
"product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.s390x"
},
"product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.x86_64"
},
"product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.7p1-47.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.aarch64"
},
"product_reference": "openssh-0:8.7p1-47.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.7p1-47.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.ppc64le"
},
"product_reference": "openssh-0:8.7p1-47.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.7p1-47.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.s390x"
},
"product_reference": "openssh-0:8.7p1-47.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.7p1-47.el9_7.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.src"
},
"product_reference": "openssh-0:8.7p1-47.el9_7.src",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.7p1-47.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.x86_64"
},
"product_reference": "openssh-0:8.7p1-47.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:8.7p1-47.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.aarch64"
},
"product_reference": "openssh-askpass-0:8.7p1-47.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:8.7p1-47.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.ppc64le"
},
"product_reference": "openssh-askpass-0:8.7p1-47.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:8.7p1-47.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.s390x"
},
"product_reference": "openssh-askpass-0:8.7p1-47.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:8.7p1-47.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.x86_64"
},
"product_reference": "openssh-askpass-0:8.7p1-47.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.aarch64"
},
"product_reference": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.ppc64le"
},
"product_reference": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.s390x"
},
"product_reference": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.x86_64"
},
"product_reference": "openssh-askpass-debuginfo-0:8.7p1-47.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:8.7p1-47.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.aarch64"
},
"product_reference": "openssh-clients-0:8.7p1-47.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:8.7p1-47.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.ppc64le"
},
"product_reference": "openssh-clients-0:8.7p1-47.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:8.7p1-47.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.s390x"
},
"product_reference": "openssh-clients-0:8.7p1-47.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:8.7p1-47.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.x86_64"
},
"product_reference": "openssh-clients-0:8.7p1-47.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.aarch64"
},
"product_reference": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.ppc64le"
},
"product_reference": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.s390x"
},
"product_reference": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.x86_64"
},
"product_reference": "openssh-clients-debuginfo-0:8.7p1-47.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:8.7p1-47.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.aarch64"
},
"product_reference": "openssh-debuginfo-0:8.7p1-47.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:8.7p1-47.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.ppc64le"
},
"product_reference": "openssh-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:8.7p1-47.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.s390x"
},
"product_reference": "openssh-debuginfo-0:8.7p1-47.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:8.7p1-47.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.x86_64"
},
"product_reference": "openssh-debuginfo-0:8.7p1-47.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:8.7p1-47.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.aarch64"
},
"product_reference": "openssh-debugsource-0:8.7p1-47.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:8.7p1-47.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.ppc64le"
},
"product_reference": "openssh-debugsource-0:8.7p1-47.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:8.7p1-47.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.s390x"
},
"product_reference": "openssh-debugsource-0:8.7p1-47.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:8.7p1-47.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.x86_64"
},
"product_reference": "openssh-debugsource-0:8.7p1-47.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:8.7p1-47.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.aarch64"
},
"product_reference": "openssh-keycat-0:8.7p1-47.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:8.7p1-47.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.ppc64le"
},
"product_reference": "openssh-keycat-0:8.7p1-47.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:8.7p1-47.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.s390x"
},
"product_reference": "openssh-keycat-0:8.7p1-47.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:8.7p1-47.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.x86_64"
},
"product_reference": "openssh-keycat-0:8.7p1-47.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.aarch64"
},
"product_reference": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.ppc64le"
},
"product_reference": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.s390x"
},
"product_reference": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.x86_64"
},
"product_reference": "openssh-keycat-debuginfo-0:8.7p1-47.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:8.7p1-47.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.aarch64"
},
"product_reference": "openssh-server-0:8.7p1-47.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:8.7p1-47.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.ppc64le"
},
"product_reference": "openssh-server-0:8.7p1-47.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:8.7p1-47.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.s390x"
},
"product_reference": "openssh-server-0:8.7p1-47.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:8.7p1-47.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.x86_64"
},
"product_reference": "openssh-server-0:8.7p1-47.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:8.7p1-47.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.aarch64"
},
"product_reference": "openssh-server-debuginfo-0:8.7p1-47.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:8.7p1-47.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.ppc64le"
},
"product_reference": "openssh-server-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:8.7p1-47.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.s390x"
},
"product_reference": "openssh-server-debuginfo-0:8.7p1-47.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:8.7p1-47.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.x86_64"
},
"product_reference": "openssh-server-debuginfo-0:8.7p1-47.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.aarch64"
},
"product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.ppc64le"
},
"product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.s390x"
},
"product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.x86_64"
},
"product_reference": "openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.aarch64"
},
"product_reference": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.ppc64le"
},
"product_reference": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.s390x"
},
"product_reference": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.x86_64"
},
"product_reference": "pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.aarch64"
},
"product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.ppc64le"
},
"product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.s390x"
},
"product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.x86_64"
},
"product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61984",
"cwe": {
"id": "CWE-159",
"name": "Improper Handling of Invalid Use of Special Elements"
},
"discovery_date": "2025-10-06T19:01:13.449665+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401960"
}
],
"notes": [
{
"category": "description",
"text": "ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is MODERATE because it is a critical component used across many Red Hat products.\nThe issue occurs only when a ProxyCommand is configured and the SSH client handles a username containing control characters from an untrusted source, such as script-generated input or expanded configuration values.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-159: Improper Handling of Invalid Use of Special Elements\n\nStrict input validation sanitizes user-supplied data to ensure special elements, such as control characters, escape sequences, or delimiters, are only allowed when explicitly required, preventing malformed inputs from disrupting control flow, parsing, or protocol logic. Secure development practices, including static code analysis and peer reviews, catch improper handling of special elements early in the lifecycle, reducing the risk of logic flaws and injection vectors. Additionally, robust error handling and process isolation contain the impact of malformed inputs to the originating context, avoiding system-wide disruption or data exposure. Real-time monitoring detects anomalous behavior stemming from improper input handling, enabling prompt investigation and response.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.src",
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.src",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61984"
},
{
"category": "external",
"summary": "RHBZ#2401960",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401960"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61984",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61984"
},
{
"category": "external",
"summary": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2",
"url": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2"
},
{
"category": "external",
"summary": "https://www.openssh.com/releasenotes.html#10.1p1",
"url": "https://www.openssh.com/releasenotes.html#10.1p1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/10/06/1",
"url": "https://www.openwall.com/lists/oss-security/2025/10/06/1"
}
],
"release_date": "2025-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-17T16:48:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.src",
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.src",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23480"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.src",
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.src",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand"
},
{
"cve": "CVE-2025-61985",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2025-10-06T19:01:16.841946+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401962"
}
],
"notes": [
{
"category": "description",
"text": "ssh in OpenSSH before 10.1 allows the \u0027\\0\u0027 character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is MODERATE because it is a critical component used across many Red Hat products.\nExploiting this vulnerability would require a specific configuration where ProxyCommand is enabled and the SSH client processes an untrusted ssh:// URI containing null bytes. Under these conditions, the command parser may misinterpret the URI and execute unintended shell commands.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-158: Improper Neutralization of Null Byte or NUL Character, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation routines rigorously sanitize user-supplied data, ensuring special elements, such as control characters, escape sequences, or delimiters, are securely handled or rejected when not explicitly required. This prevents malformed input from disrupting control flow, altering parsing logic, or introducing injection risks. Secure development practices, including static code analysis and peer reviews, detect and remediate improper handling of special elements early in the development lifecycle. Runtime safeguards such as process isolation confine the impact of unexpected input to its execution context, preventing broader system instability or data exposure. Real-time monitoring further supports timely detection and response to anomalies or parsing errors related to special element misuse.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.src",
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.src",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61985"
},
{
"category": "external",
"summary": "RHBZ#2401962",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401962"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61985",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61985"
},
{
"category": "external",
"summary": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2",
"url": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2"
},
{
"category": "external",
"summary": "https://www.openssh.com/releasenotes.html#10.1p1",
"url": "https://www.openssh.com/releasenotes.html#10.1p1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/10/06/1",
"url": "https://www.openwall.com/lists/oss-security/2025/10/06/1"
}
],
"release_date": "2025-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-17T16:48:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.src",
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.src",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23480"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.src",
"AppStream-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.src",
"BaseOS-9.7.0.Z.MAIN:openssh-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-askpass-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-clients-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-debugsource-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-keycat-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-server-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-server-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:openssh-sk-dummy-debuginfo-0:8.7p1-47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-0:0.10.4-5.47.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:pam_ssh_agent_auth-debuginfo-0:0.10.4-5.47.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand"
}
]
}
RHSA-2025:23481
Vulnerability from csaf_redhat - Published: 2025-12-17 17:42 - Updated: 2026-01-15 16:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssh is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.\n\nSecurity Fix(es):\n\n* openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand (CVE-2025-61984)\n\n* openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand (CVE-2025-61985)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:23481",
"url": "https://access.redhat.com/errata/RHSA-2025:23481"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2401960",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401960"
},
{
"category": "external",
"summary": "2401962",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401962"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_23481.json"
}
],
"title": "Red Hat Security Advisory: openssh security update",
"tracking": {
"current_release_date": "2026-01-15T16:00:49+00:00",
"generator": {
"date": "2026-01-15T16:00:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2025:23481",
"initial_release_date": "2025-12-17T17:42:18+00:00",
"revision_history": [
{
"date": "2025-12-17T17:42:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-12-17T17:42:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-15T16:00:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-askpass-0:8.0p1-27.el8_10.aarch64",
"product": {
"name": "openssh-askpass-0:8.0p1-27.el8_10.aarch64",
"product_id": "openssh-askpass-0:8.0p1-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@8.0p1-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-debugsource-0:8.0p1-27.el8_10.aarch64",
"product": {
"name": "openssh-debugsource-0:8.0p1-27.el8_10.aarch64",
"product_id": "openssh-debugsource-0:8.0p1-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debugsource@8.0p1-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.aarch64",
"product": {
"name": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.aarch64",
"product_id": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@8.0p1-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.aarch64",
"product": {
"name": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.aarch64",
"product_id": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-cavs-debuginfo@8.0p1-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.aarch64",
"product": {
"name": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.aarch64",
"product_id": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients-debuginfo@8.0p1-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-debuginfo-0:8.0p1-27.el8_10.aarch64",
"product": {
"name": "openssh-debuginfo-0:8.0p1-27.el8_10.aarch64",
"product_id": "openssh-debuginfo-0:8.0p1-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@8.0p1-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.aarch64",
"product": {
"name": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.aarch64",
"product_id": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@8.0p1-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.aarch64",
"product": {
"name": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.aarch64",
"product_id": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-ldap-debuginfo@8.0p1-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-server-debuginfo-0:8.0p1-27.el8_10.aarch64",
"product": {
"name": "openssh-server-debuginfo-0:8.0p1-27.el8_10.aarch64",
"product_id": "openssh-server-debuginfo-0:8.0p1-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server-debuginfo@8.0p1-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.aarch64",
"product": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.aarch64",
"product_id": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam_ssh_agent_auth-debuginfo@0.10.3-7.27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-0:8.0p1-27.el8_10.aarch64",
"product": {
"name": "openssh-0:8.0p1-27.el8_10.aarch64",
"product_id": "openssh-0:8.0p1-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@8.0p1-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-cavs-0:8.0p1-27.el8_10.aarch64",
"product": {
"name": "openssh-cavs-0:8.0p1-27.el8_10.aarch64",
"product_id": "openssh-cavs-0:8.0p1-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-cavs@8.0p1-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:8.0p1-27.el8_10.aarch64",
"product": {
"name": "openssh-clients-0:8.0p1-27.el8_10.aarch64",
"product_id": "openssh-clients-0:8.0p1-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@8.0p1-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-0:8.0p1-27.el8_10.aarch64",
"product": {
"name": "openssh-keycat-0:8.0p1-27.el8_10.aarch64",
"product_id": "openssh-keycat-0:8.0p1-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat@8.0p1-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-ldap-0:8.0p1-27.el8_10.aarch64",
"product": {
"name": "openssh-ldap-0:8.0p1-27.el8_10.aarch64",
"product_id": "openssh-ldap-0:8.0p1-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-ldap@8.0p1-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:8.0p1-27.el8_10.aarch64",
"product": {
"name": "openssh-server-0:8.0p1-27.el8_10.aarch64",
"product_id": "openssh-server-0:8.0p1-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@8.0p1-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.aarch64",
"product": {
"name": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.aarch64",
"product_id": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.10.3-7.27.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-askpass-0:8.0p1-27.el8_10.ppc64le",
"product": {
"name": "openssh-askpass-0:8.0p1-27.el8_10.ppc64le",
"product_id": "openssh-askpass-0:8.0p1-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@8.0p1-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-debugsource-0:8.0p1-27.el8_10.ppc64le",
"product": {
"name": "openssh-debugsource-0:8.0p1-27.el8_10.ppc64le",
"product_id": "openssh-debugsource-0:8.0p1-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debugsource@8.0p1-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"product": {
"name": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"product_id": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@8.0p1-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"product": {
"name": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"product_id": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-cavs-debuginfo@8.0p1-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"product": {
"name": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"product_id": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients-debuginfo@8.0p1-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"product": {
"name": "openssh-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"product_id": "openssh-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@8.0p1-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"product": {
"name": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"product_id": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@8.0p1-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"product": {
"name": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"product_id": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-ldap-debuginfo@8.0p1-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-server-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"product": {
"name": "openssh-server-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"product_id": "openssh-server-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server-debuginfo@8.0p1-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.ppc64le",
"product": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.ppc64le",
"product_id": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam_ssh_agent_auth-debuginfo@0.10.3-7.27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-0:8.0p1-27.el8_10.ppc64le",
"product": {
"name": "openssh-0:8.0p1-27.el8_10.ppc64le",
"product_id": "openssh-0:8.0p1-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@8.0p1-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-cavs-0:8.0p1-27.el8_10.ppc64le",
"product": {
"name": "openssh-cavs-0:8.0p1-27.el8_10.ppc64le",
"product_id": "openssh-cavs-0:8.0p1-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-cavs@8.0p1-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:8.0p1-27.el8_10.ppc64le",
"product": {
"name": "openssh-clients-0:8.0p1-27.el8_10.ppc64le",
"product_id": "openssh-clients-0:8.0p1-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@8.0p1-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-0:8.0p1-27.el8_10.ppc64le",
"product": {
"name": "openssh-keycat-0:8.0p1-27.el8_10.ppc64le",
"product_id": "openssh-keycat-0:8.0p1-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat@8.0p1-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-ldap-0:8.0p1-27.el8_10.ppc64le",
"product": {
"name": "openssh-ldap-0:8.0p1-27.el8_10.ppc64le",
"product_id": "openssh-ldap-0:8.0p1-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-ldap@8.0p1-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:8.0p1-27.el8_10.ppc64le",
"product": {
"name": "openssh-server-0:8.0p1-27.el8_10.ppc64le",
"product_id": "openssh-server-0:8.0p1-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@8.0p1-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.ppc64le",
"product": {
"name": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.ppc64le",
"product_id": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.10.3-7.27.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-askpass-0:8.0p1-27.el8_10.x86_64",
"product": {
"name": "openssh-askpass-0:8.0p1-27.el8_10.x86_64",
"product_id": "openssh-askpass-0:8.0p1-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@8.0p1-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-debugsource-0:8.0p1-27.el8_10.x86_64",
"product": {
"name": "openssh-debugsource-0:8.0p1-27.el8_10.x86_64",
"product_id": "openssh-debugsource-0:8.0p1-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debugsource@8.0p1-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.x86_64",
"product": {
"name": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.x86_64",
"product_id": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@8.0p1-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.x86_64",
"product": {
"name": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.x86_64",
"product_id": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-cavs-debuginfo@8.0p1-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.x86_64",
"product": {
"name": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.x86_64",
"product_id": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients-debuginfo@8.0p1-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-debuginfo-0:8.0p1-27.el8_10.x86_64",
"product": {
"name": "openssh-debuginfo-0:8.0p1-27.el8_10.x86_64",
"product_id": "openssh-debuginfo-0:8.0p1-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@8.0p1-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.x86_64",
"product": {
"name": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.x86_64",
"product_id": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@8.0p1-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.x86_64",
"product": {
"name": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.x86_64",
"product_id": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-ldap-debuginfo@8.0p1-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-server-debuginfo-0:8.0p1-27.el8_10.x86_64",
"product": {
"name": "openssh-server-debuginfo-0:8.0p1-27.el8_10.x86_64",
"product_id": "openssh-server-debuginfo-0:8.0p1-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server-debuginfo@8.0p1-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.x86_64",
"product": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.x86_64",
"product_id": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam_ssh_agent_auth-debuginfo@0.10.3-7.27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-0:8.0p1-27.el8_10.x86_64",
"product": {
"name": "openssh-0:8.0p1-27.el8_10.x86_64",
"product_id": "openssh-0:8.0p1-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@8.0p1-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-cavs-0:8.0p1-27.el8_10.x86_64",
"product": {
"name": "openssh-cavs-0:8.0p1-27.el8_10.x86_64",
"product_id": "openssh-cavs-0:8.0p1-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-cavs@8.0p1-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:8.0p1-27.el8_10.x86_64",
"product": {
"name": "openssh-clients-0:8.0p1-27.el8_10.x86_64",
"product_id": "openssh-clients-0:8.0p1-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@8.0p1-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-0:8.0p1-27.el8_10.x86_64",
"product": {
"name": "openssh-keycat-0:8.0p1-27.el8_10.x86_64",
"product_id": "openssh-keycat-0:8.0p1-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat@8.0p1-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-ldap-0:8.0p1-27.el8_10.x86_64",
"product": {
"name": "openssh-ldap-0:8.0p1-27.el8_10.x86_64",
"product_id": "openssh-ldap-0:8.0p1-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-ldap@8.0p1-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:8.0p1-27.el8_10.x86_64",
"product": {
"name": "openssh-server-0:8.0p1-27.el8_10.x86_64",
"product_id": "openssh-server-0:8.0p1-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@8.0p1-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.x86_64",
"product": {
"name": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.x86_64",
"product_id": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.10.3-7.27.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-askpass-0:8.0p1-27.el8_10.s390x",
"product": {
"name": "openssh-askpass-0:8.0p1-27.el8_10.s390x",
"product_id": "openssh-askpass-0:8.0p1-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@8.0p1-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-debugsource-0:8.0p1-27.el8_10.s390x",
"product": {
"name": "openssh-debugsource-0:8.0p1-27.el8_10.s390x",
"product_id": "openssh-debugsource-0:8.0p1-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debugsource@8.0p1-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.s390x",
"product": {
"name": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.s390x",
"product_id": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@8.0p1-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.s390x",
"product": {
"name": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.s390x",
"product_id": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-cavs-debuginfo@8.0p1-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.s390x",
"product": {
"name": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.s390x",
"product_id": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients-debuginfo@8.0p1-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-debuginfo-0:8.0p1-27.el8_10.s390x",
"product": {
"name": "openssh-debuginfo-0:8.0p1-27.el8_10.s390x",
"product_id": "openssh-debuginfo-0:8.0p1-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@8.0p1-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.s390x",
"product": {
"name": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.s390x",
"product_id": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@8.0p1-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.s390x",
"product": {
"name": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.s390x",
"product_id": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-ldap-debuginfo@8.0p1-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-server-debuginfo-0:8.0p1-27.el8_10.s390x",
"product": {
"name": "openssh-server-debuginfo-0:8.0p1-27.el8_10.s390x",
"product_id": "openssh-server-debuginfo-0:8.0p1-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server-debuginfo@8.0p1-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.s390x",
"product": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.s390x",
"product_id": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam_ssh_agent_auth-debuginfo@0.10.3-7.27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-0:8.0p1-27.el8_10.s390x",
"product": {
"name": "openssh-0:8.0p1-27.el8_10.s390x",
"product_id": "openssh-0:8.0p1-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@8.0p1-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-cavs-0:8.0p1-27.el8_10.s390x",
"product": {
"name": "openssh-cavs-0:8.0p1-27.el8_10.s390x",
"product_id": "openssh-cavs-0:8.0p1-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-cavs@8.0p1-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:8.0p1-27.el8_10.s390x",
"product": {
"name": "openssh-clients-0:8.0p1-27.el8_10.s390x",
"product_id": "openssh-clients-0:8.0p1-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@8.0p1-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-0:8.0p1-27.el8_10.s390x",
"product": {
"name": "openssh-keycat-0:8.0p1-27.el8_10.s390x",
"product_id": "openssh-keycat-0:8.0p1-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat@8.0p1-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-ldap-0:8.0p1-27.el8_10.s390x",
"product": {
"name": "openssh-ldap-0:8.0p1-27.el8_10.s390x",
"product_id": "openssh-ldap-0:8.0p1-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-ldap@8.0p1-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:8.0p1-27.el8_10.s390x",
"product": {
"name": "openssh-server-0:8.0p1-27.el8_10.s390x",
"product_id": "openssh-server-0:8.0p1-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@8.0p1-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.s390x",
"product": {
"name": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.s390x",
"product_id": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.10.3-7.27.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-0:8.0p1-27.el8_10.src",
"product": {
"name": "openssh-0:8.0p1-27.el8_10.src",
"product_id": "openssh-0:8.0p1-27.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@8.0p1-27.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.0p1-27.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.src"
},
"product_reference": "openssh-0:8.0p1-27.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-askpass-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-askpass-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-askpass-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-askpass-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-cavs-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-cavs-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-cavs-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-cavs-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-clients-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-clients-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-clients-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-clients-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-debuginfo-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-debuginfo-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-debuginfo-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-debugsource-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-debugsource-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-debugsource-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-debugsource-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-keycat-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-keycat-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-keycat-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-keycat-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-ldap-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-ldap-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-ldap-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-ldap-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-ldap-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-ldap-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-ldap-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-ldap-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-server-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-server-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-server-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-server-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-server-debuginfo-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-server-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-server-debuginfo-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-server-debuginfo-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.aarch64"
},
"product_reference": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.ppc64le"
},
"product_reference": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.s390x"
},
"product_reference": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.x86_64"
},
"product_reference": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.aarch64"
},
"product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.ppc64le"
},
"product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.s390x"
},
"product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.x86_64"
},
"product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.0p1-27.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.src"
},
"product_reference": "openssh-0:8.0p1-27.el8_10.src",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-askpass-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-askpass-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-askpass-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-askpass-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-askpass-debuginfo-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-cavs-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-cavs-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-cavs-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-cavs-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-cavs-debuginfo-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-clients-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-clients-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-clients-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-clients-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-clients-debuginfo-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-debuginfo-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-debuginfo-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-debuginfo-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-debugsource-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-debugsource-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-debugsource-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-debugsource-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-keycat-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-keycat-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-keycat-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-keycat-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-keycat-debuginfo-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-ldap-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-ldap-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-ldap-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-ldap-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-ldap-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-ldap-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-ldap-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-ldap-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-ldap-debuginfo-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-server-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-server-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-server-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-server-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:8.0p1-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.aarch64"
},
"product_reference": "openssh-server-debuginfo-0:8.0p1-27.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:8.0p1-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.ppc64le"
},
"product_reference": "openssh-server-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:8.0p1-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.s390x"
},
"product_reference": "openssh-server-debuginfo-0:8.0p1-27.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:8.0p1-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.x86_64"
},
"product_reference": "openssh-server-debuginfo-0:8.0p1-27.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.aarch64"
},
"product_reference": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.ppc64le"
},
"product_reference": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.s390x"
},
"product_reference": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.x86_64"
},
"product_reference": "pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.aarch64"
},
"product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.ppc64le"
},
"product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.s390x"
},
"product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.x86_64"
},
"product_reference": "pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61984",
"cwe": {
"id": "CWE-159",
"name": "Improper Handling of Invalid Use of Special Elements"
},
"discovery_date": "2025-10-06T19:01:13.449665+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401960"
}
],
"notes": [
{
"category": "description",
"text": "ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is MODERATE because it is a critical component used across many Red Hat products.\nThe issue occurs only when a ProxyCommand is configured and the SSH client handles a username containing control characters from an untrusted source, such as script-generated input or expanded configuration values.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-159: Improper Handling of Invalid Use of Special Elements\n\nStrict input validation sanitizes user-supplied data to ensure special elements, such as control characters, escape sequences, or delimiters, are only allowed when explicitly required, preventing malformed inputs from disrupting control flow, parsing, or protocol logic. Secure development practices, including static code analysis and peer reviews, catch improper handling of special elements early in the lifecycle, reducing the risk of logic flaws and injection vectors. Additionally, robust error handling and process isolation contain the impact of malformed inputs to the originating context, avoiding system-wide disruption or data exposure. Real-time monitoring detects anomalous behavior stemming from improper input handling, enabling prompt investigation and response.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61984"
},
{
"category": "external",
"summary": "RHBZ#2401960",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401960"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61984",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61984"
},
{
"category": "external",
"summary": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2",
"url": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2"
},
{
"category": "external",
"summary": "https://www.openssh.com/releasenotes.html#10.1p1",
"url": "https://www.openssh.com/releasenotes.html#10.1p1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/10/06/1",
"url": "https://www.openwall.com/lists/oss-security/2025/10/06/1"
}
],
"release_date": "2025-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-17T17:42:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23481"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand"
},
{
"cve": "CVE-2025-61985",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2025-10-06T19:01:16.841946+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401962"
}
],
"notes": [
{
"category": "description",
"text": "ssh in OpenSSH before 10.1 allows the \u0027\\0\u0027 character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is MODERATE because it is a critical component used across many Red Hat products.\nExploiting this vulnerability would require a specific configuration where ProxyCommand is enabled and the SSH client processes an untrusted ssh:// URI containing null bytes. Under these conditions, the command parser may misinterpret the URI and execute unintended shell commands.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-158: Improper Neutralization of Null Byte or NUL Character, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation routines rigorously sanitize user-supplied data, ensuring special elements, such as control characters, escape sequences, or delimiters, are securely handled or rejected when not explicitly required. This prevents malformed input from disrupting control flow, altering parsing logic, or introducing injection risks. Secure development practices, including static code analysis and peer reviews, detect and remediate improper handling of special elements early in the development lifecycle. Runtime safeguards such as process isolation confine the impact of unexpected input to its execution context, preventing broader system instability or data exposure. Real-time monitoring further supports timely detection and response to anomalies or parsing errors related to special element misuse.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61985"
},
{
"category": "external",
"summary": "RHBZ#2401962",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401962"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61985",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61985"
},
{
"category": "external",
"summary": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2",
"url": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2"
},
{
"category": "external",
"summary": "https://www.openssh.com/releasenotes.html#10.1p1",
"url": "https://www.openssh.com/releasenotes.html#10.1p1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/10/06/1",
"url": "https://www.openwall.com/lists/oss-security/2025/10/06/1"
}
],
"release_date": "2025-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-17T17:42:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23481"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-askpass-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-cavs-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-clients-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-debugsource-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-keycat-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-ldap-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:openssh-server-debuginfo-0:8.0p1-27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-0:0.10.3-7.27.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:pam_ssh_agent_auth-debuginfo-0:0.10.3-7.27.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand"
}
]
}
RHSA-2025:23479
Vulnerability from csaf_redhat - Published: 2025-12-17 14:16 - Updated: 2026-01-15 16:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssh is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.\n\nSecurity Fix(es):\n\n* openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand (CVE-2025-61984)\n\n* openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand (CVE-2025-61985)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:23479",
"url": "https://access.redhat.com/errata/RHSA-2025:23479"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2401960",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401960"
},
{
"category": "external",
"summary": "2401962",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401962"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_23479.json"
}
],
"title": "Red Hat Security Advisory: openssh security update",
"tracking": {
"current_release_date": "2026-01-15T16:00:49+00:00",
"generator": {
"date": "2026-01-15T16:00:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2025:23479",
"initial_release_date": "2025-12-17T14:16:13+00:00",
"revision_history": [
{
"date": "2025-12-17T14:16:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-12-17T14:16:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-15T16:00:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-askpass-0:9.9p1-12.el10_1.aarch64",
"product": {
"name": "openssh-askpass-0:9.9p1-12.el10_1.aarch64",
"product_id": "openssh-askpass-0:9.9p1-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@9.9p1-12.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-keysign-0:9.9p1-12.el10_1.aarch64",
"product": {
"name": "openssh-keysign-0:9.9p1-12.el10_1.aarch64",
"product_id": "openssh-keysign-0:9.9p1-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keysign@9.9p1-12.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-debugsource-0:9.9p1-12.el10_1.aarch64",
"product": {
"name": "openssh-debugsource-0:9.9p1-12.el10_1.aarch64",
"product_id": "openssh-debugsource-0:9.9p1-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debugsource@9.9p1-12.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.aarch64",
"product": {
"name": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.aarch64",
"product_id": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@9.9p1-12.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.aarch64",
"product": {
"name": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.aarch64",
"product_id": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients-debuginfo@9.9p1-12.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-debuginfo-0:9.9p1-12.el10_1.aarch64",
"product": {
"name": "openssh-debuginfo-0:9.9p1-12.el10_1.aarch64",
"product_id": "openssh-debuginfo-0:9.9p1-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@9.9p1-12.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.aarch64",
"product": {
"name": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.aarch64",
"product_id": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@9.9p1-12.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.aarch64",
"product": {
"name": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.aarch64",
"product_id": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keysign-debuginfo@9.9p1-12.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-server-debuginfo-0:9.9p1-12.el10_1.aarch64",
"product": {
"name": "openssh-server-debuginfo-0:9.9p1-12.el10_1.aarch64",
"product_id": "openssh-server-debuginfo-0:9.9p1-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server-debuginfo@9.9p1-12.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.aarch64",
"product": {
"name": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.aarch64",
"product_id": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-sk-dummy-debuginfo@9.9p1-12.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-0:9.9p1-12.el10_1.aarch64",
"product": {
"name": "openssh-0:9.9p1-12.el10_1.aarch64",
"product_id": "openssh-0:9.9p1-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@9.9p1-12.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:9.9p1-12.el10_1.aarch64",
"product": {
"name": "openssh-clients-0:9.9p1-12.el10_1.aarch64",
"product_id": "openssh-clients-0:9.9p1-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@9.9p1-12.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-0:9.9p1-12.el10_1.aarch64",
"product": {
"name": "openssh-keycat-0:9.9p1-12.el10_1.aarch64",
"product_id": "openssh-keycat-0:9.9p1-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat@9.9p1-12.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:9.9p1-12.el10_1.aarch64",
"product": {
"name": "openssh-server-0:9.9p1-12.el10_1.aarch64",
"product_id": "openssh-server-0:9.9p1-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@9.9p1-12.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-askpass-0:9.9p1-12.el10_1.ppc64le",
"product": {
"name": "openssh-askpass-0:9.9p1-12.el10_1.ppc64le",
"product_id": "openssh-askpass-0:9.9p1-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@9.9p1-12.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-keysign-0:9.9p1-12.el10_1.ppc64le",
"product": {
"name": "openssh-keysign-0:9.9p1-12.el10_1.ppc64le",
"product_id": "openssh-keysign-0:9.9p1-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keysign@9.9p1-12.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-debugsource-0:9.9p1-12.el10_1.ppc64le",
"product": {
"name": "openssh-debugsource-0:9.9p1-12.el10_1.ppc64le",
"product_id": "openssh-debugsource-0:9.9p1-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debugsource@9.9p1-12.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"product": {
"name": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"product_id": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@9.9p1-12.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"product": {
"name": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"product_id": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients-debuginfo@9.9p1-12.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"product": {
"name": "openssh-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"product_id": "openssh-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@9.9p1-12.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"product": {
"name": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"product_id": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@9.9p1-12.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"product": {
"name": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"product_id": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keysign-debuginfo@9.9p1-12.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-server-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"product": {
"name": "openssh-server-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"product_id": "openssh-server-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server-debuginfo@9.9p1-12.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"product": {
"name": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"product_id": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-sk-dummy-debuginfo@9.9p1-12.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-0:9.9p1-12.el10_1.ppc64le",
"product": {
"name": "openssh-0:9.9p1-12.el10_1.ppc64le",
"product_id": "openssh-0:9.9p1-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@9.9p1-12.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:9.9p1-12.el10_1.ppc64le",
"product": {
"name": "openssh-clients-0:9.9p1-12.el10_1.ppc64le",
"product_id": "openssh-clients-0:9.9p1-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@9.9p1-12.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-0:9.9p1-12.el10_1.ppc64le",
"product": {
"name": "openssh-keycat-0:9.9p1-12.el10_1.ppc64le",
"product_id": "openssh-keycat-0:9.9p1-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat@9.9p1-12.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:9.9p1-12.el10_1.ppc64le",
"product": {
"name": "openssh-server-0:9.9p1-12.el10_1.ppc64le",
"product_id": "openssh-server-0:9.9p1-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@9.9p1-12.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-askpass-0:9.9p1-12.el10_1.x86_64",
"product": {
"name": "openssh-askpass-0:9.9p1-12.el10_1.x86_64",
"product_id": "openssh-askpass-0:9.9p1-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@9.9p1-12.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-keysign-0:9.9p1-12.el10_1.x86_64",
"product": {
"name": "openssh-keysign-0:9.9p1-12.el10_1.x86_64",
"product_id": "openssh-keysign-0:9.9p1-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keysign@9.9p1-12.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-debugsource-0:9.9p1-12.el10_1.x86_64",
"product": {
"name": "openssh-debugsource-0:9.9p1-12.el10_1.x86_64",
"product_id": "openssh-debugsource-0:9.9p1-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debugsource@9.9p1-12.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.x86_64",
"product": {
"name": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.x86_64",
"product_id": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@9.9p1-12.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.x86_64",
"product": {
"name": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.x86_64",
"product_id": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients-debuginfo@9.9p1-12.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-debuginfo-0:9.9p1-12.el10_1.x86_64",
"product": {
"name": "openssh-debuginfo-0:9.9p1-12.el10_1.x86_64",
"product_id": "openssh-debuginfo-0:9.9p1-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@9.9p1-12.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.x86_64",
"product": {
"name": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.x86_64",
"product_id": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@9.9p1-12.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.x86_64",
"product": {
"name": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.x86_64",
"product_id": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keysign-debuginfo@9.9p1-12.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-server-debuginfo-0:9.9p1-12.el10_1.x86_64",
"product": {
"name": "openssh-server-debuginfo-0:9.9p1-12.el10_1.x86_64",
"product_id": "openssh-server-debuginfo-0:9.9p1-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server-debuginfo@9.9p1-12.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.x86_64",
"product": {
"name": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.x86_64",
"product_id": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-sk-dummy-debuginfo@9.9p1-12.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-0:9.9p1-12.el10_1.x86_64",
"product": {
"name": "openssh-0:9.9p1-12.el10_1.x86_64",
"product_id": "openssh-0:9.9p1-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@9.9p1-12.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:9.9p1-12.el10_1.x86_64",
"product": {
"name": "openssh-clients-0:9.9p1-12.el10_1.x86_64",
"product_id": "openssh-clients-0:9.9p1-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@9.9p1-12.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-0:9.9p1-12.el10_1.x86_64",
"product": {
"name": "openssh-keycat-0:9.9p1-12.el10_1.x86_64",
"product_id": "openssh-keycat-0:9.9p1-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat@9.9p1-12.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:9.9p1-12.el10_1.x86_64",
"product": {
"name": "openssh-server-0:9.9p1-12.el10_1.x86_64",
"product_id": "openssh-server-0:9.9p1-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@9.9p1-12.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-askpass-0:9.9p1-12.el10_1.s390x",
"product": {
"name": "openssh-askpass-0:9.9p1-12.el10_1.s390x",
"product_id": "openssh-askpass-0:9.9p1-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@9.9p1-12.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-keysign-0:9.9p1-12.el10_1.s390x",
"product": {
"name": "openssh-keysign-0:9.9p1-12.el10_1.s390x",
"product_id": "openssh-keysign-0:9.9p1-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keysign@9.9p1-12.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-debugsource-0:9.9p1-12.el10_1.s390x",
"product": {
"name": "openssh-debugsource-0:9.9p1-12.el10_1.s390x",
"product_id": "openssh-debugsource-0:9.9p1-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debugsource@9.9p1-12.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.s390x",
"product": {
"name": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.s390x",
"product_id": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-debuginfo@9.9p1-12.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.s390x",
"product": {
"name": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.s390x",
"product_id": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients-debuginfo@9.9p1-12.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-debuginfo-0:9.9p1-12.el10_1.s390x",
"product": {
"name": "openssh-debuginfo-0:9.9p1-12.el10_1.s390x",
"product_id": "openssh-debuginfo-0:9.9p1-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@9.9p1-12.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.s390x",
"product": {
"name": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.s390x",
"product_id": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat-debuginfo@9.9p1-12.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.s390x",
"product": {
"name": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.s390x",
"product_id": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keysign-debuginfo@9.9p1-12.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-server-debuginfo-0:9.9p1-12.el10_1.s390x",
"product": {
"name": "openssh-server-debuginfo-0:9.9p1-12.el10_1.s390x",
"product_id": "openssh-server-debuginfo-0:9.9p1-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server-debuginfo@9.9p1-12.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.s390x",
"product": {
"name": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.s390x",
"product_id": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-sk-dummy-debuginfo@9.9p1-12.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-0:9.9p1-12.el10_1.s390x",
"product": {
"name": "openssh-0:9.9p1-12.el10_1.s390x",
"product_id": "openssh-0:9.9p1-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@9.9p1-12.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:9.9p1-12.el10_1.s390x",
"product": {
"name": "openssh-clients-0:9.9p1-12.el10_1.s390x",
"product_id": "openssh-clients-0:9.9p1-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@9.9p1-12.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-keycat-0:9.9p1-12.el10_1.s390x",
"product": {
"name": "openssh-keycat-0:9.9p1-12.el10_1.s390x",
"product_id": "openssh-keycat-0:9.9p1-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-keycat@9.9p1-12.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:9.9p1-12.el10_1.s390x",
"product": {
"name": "openssh-server-0:9.9p1-12.el10_1.s390x",
"product_id": "openssh-server-0:9.9p1-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@9.9p1-12.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-0:9.9p1-12.el10_1.src",
"product": {
"name": "openssh-0:9.9p1-12.el10_1.src",
"product_id": "openssh-0:9.9p1-12.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@9.9p1-12.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:9.9p1-12.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.src"
},
"product_reference": "openssh-0:9.9p1-12.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-askpass-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-askpass-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-askpass-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-askpass-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-clients-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-clients-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-clients-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-clients-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-debuginfo-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-debuginfo-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-debuginfo-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-debugsource-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-debugsource-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-debugsource-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-debugsource-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-keycat-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-keycat-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-keycat-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-keycat-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keysign-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-keysign-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keysign-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-keysign-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keysign-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-keysign-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keysign-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-keysign-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-server-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-server-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-server-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-server-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-server-debuginfo-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-server-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-server-debuginfo-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-server-debuginfo-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:9.9p1-12.el10_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.src"
},
"product_reference": "openssh-0:9.9p1-12.el10_1.src",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-askpass-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-askpass-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-askpass-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-askpass-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-askpass-debuginfo-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-clients-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-clients-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-clients-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-clients-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-clients-debuginfo-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-debuginfo-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-debuginfo-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-debuginfo-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-debugsource-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-debugsource-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-debugsource-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debugsource-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-debugsource-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-keycat-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-keycat-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-keycat-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-keycat-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-keycat-debuginfo-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keysign-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-keysign-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keysign-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-keysign-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keysign-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-keysign-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keysign-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-keysign-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-keysign-debuginfo-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-server-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-server-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-server-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-server-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-server-debuginfo-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-server-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-server-debuginfo-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-debuginfo-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-server-debuginfo-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.aarch64"
},
"product_reference": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.ppc64le"
},
"product_reference": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.s390x"
},
"product_reference": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.x86_64"
},
"product_reference": "openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61984",
"cwe": {
"id": "CWE-159",
"name": "Improper Handling of Invalid Use of Special Elements"
},
"discovery_date": "2025-10-06T19:01:13.449665+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401960"
}
],
"notes": [
{
"category": "description",
"text": "ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is MODERATE because it is a critical component used across many Red Hat products.\nThe issue occurs only when a ProxyCommand is configured and the SSH client handles a username containing control characters from an untrusted source, such as script-generated input or expanded configuration values.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-159: Improper Handling of Invalid Use of Special Elements\n\nStrict input validation sanitizes user-supplied data to ensure special elements, such as control characters, escape sequences, or delimiters, are only allowed when explicitly required, preventing malformed inputs from disrupting control flow, parsing, or protocol logic. Secure development practices, including static code analysis and peer reviews, catch improper handling of special elements early in the lifecycle, reducing the risk of logic flaws and injection vectors. Additionally, robust error handling and process isolation contain the impact of malformed inputs to the originating context, avoiding system-wide disruption or data exposure. Real-time monitoring detects anomalous behavior stemming from improper input handling, enabling prompt investigation and response.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.src",
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.src",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61984"
},
{
"category": "external",
"summary": "RHBZ#2401960",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401960"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61984",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61984"
},
{
"category": "external",
"summary": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2",
"url": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2"
},
{
"category": "external",
"summary": "https://www.openssh.com/releasenotes.html#10.1p1",
"url": "https://www.openssh.com/releasenotes.html#10.1p1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/10/06/1",
"url": "https://www.openwall.com/lists/oss-security/2025/10/06/1"
}
],
"release_date": "2025-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-17T14:16:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.src",
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.src",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23479"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.src",
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.src",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand"
},
{
"cve": "CVE-2025-61985",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2025-10-06T19:01:16.841946+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401962"
}
],
"notes": [
{
"category": "description",
"text": "ssh in OpenSSH before 10.1 allows the \u0027\\0\u0027 character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is MODERATE because it is a critical component used across many Red Hat products.\nExploiting this vulnerability would require a specific configuration where ProxyCommand is enabled and the SSH client processes an untrusted ssh:// URI containing null bytes. Under these conditions, the command parser may misinterpret the URI and execute unintended shell commands.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-158: Improper Neutralization of Null Byte or NUL Character, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation routines rigorously sanitize user-supplied data, ensuring special elements, such as control characters, escape sequences, or delimiters, are securely handled or rejected when not explicitly required. This prevents malformed input from disrupting control flow, altering parsing logic, or introducing injection risks. Secure development practices, including static code analysis and peer reviews, detect and remediate improper handling of special elements early in the development lifecycle. Runtime safeguards such as process isolation confine the impact of unexpected input to its execution context, preventing broader system instability or data exposure. Real-time monitoring further supports timely detection and response to anomalies or parsing errors related to special element misuse.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.src",
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.src",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61985"
},
{
"category": "external",
"summary": "RHBZ#2401962",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401962"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61985",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61985"
},
{
"category": "external",
"summary": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2",
"url": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2"
},
{
"category": "external",
"summary": "https://www.openssh.com/releasenotes.html#10.1p1",
"url": "https://www.openssh.com/releasenotes.html#10.1p1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/10/06/1",
"url": "https://www.openwall.com/lists/oss-security/2025/10/06/1"
}
],
"release_date": "2025-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-17T14:16:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.src",
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.src",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23479"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.src",
"AppStream-10.1.Z:openssh-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-server-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.x86_64",
"AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.aarch64",
"AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.s390x",
"AppStream-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.src",
"BaseOS-10.1.Z:openssh-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-askpass-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-askpass-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-clients-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-clients-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-debugsource-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-keycat-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-keycat-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-keysign-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-keysign-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-server-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-server-debuginfo-0:9.9p1-12.el10_1.x86_64",
"BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.aarch64",
"BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.ppc64le",
"BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.s390x",
"BaseOS-10.1.Z:openssh-sk-dummy-debuginfo-0:9.9p1-12.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand"
}
]
}
SUSE-SU-2025:4098-1
Vulnerability from csaf_suse - Published: 2025-11-14 08:22 - Updated: 2025-11-14 08:22Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssh8.4",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssh8.4 fixes the following issues:\n\n- CVE-2025-61984: Fixed code execution via control characters in usernames when a ProxyCommand is used (bsc#1251198)\n- CVE-2025-61985: Fixed code execution via \u0027\\0\u0027 character in ssh:// URI when a ProxyCommand is used (bsc#1251199)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4098,SUSE-SLE-SERVER-12-SP5-LTSS-2025-4098,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4098",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4098-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4098-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254098-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4098-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023284.html"
},
{
"category": "self",
"summary": "SUSE Bug 1251198",
"url": "https://bugzilla.suse.com/1251198"
},
{
"category": "self",
"summary": "SUSE Bug 1251199",
"url": "https://bugzilla.suse.com/1251199"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61984 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61984/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61985 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61985/"
}
],
"title": "Security update for openssh8.4",
"tracking": {
"current_release_date": "2025-11-14T08:22:50Z",
"generator": {
"date": "2025-11-14T08:22:50Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4098-1",
"initial_release_date": "2025-11-14T08:22:50Z",
"revision_history": [
{
"date": "2025-11-14T08:22:50Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openssh8.4-8.4p1-8.19.1.aarch64",
"product": {
"name": "openssh8.4-8.4p1-8.19.1.aarch64",
"product_id": "openssh8.4-8.4p1-8.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh8.4-cavs-8.4p1-8.19.1.aarch64",
"product": {
"name": "openssh8.4-cavs-8.4p1-8.19.1.aarch64",
"product_id": "openssh8.4-cavs-8.4p1-8.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh8.4-clients-8.4p1-8.19.1.aarch64",
"product": {
"name": "openssh8.4-clients-8.4p1-8.19.1.aarch64",
"product_id": "openssh8.4-clients-8.4p1-8.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh8.4-common-8.4p1-8.19.1.aarch64",
"product": {
"name": "openssh8.4-common-8.4p1-8.19.1.aarch64",
"product_id": "openssh8.4-common-8.4p1-8.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh8.4-fips-8.4p1-8.19.1.aarch64",
"product": {
"name": "openssh8.4-fips-8.4p1-8.19.1.aarch64",
"product_id": "openssh8.4-fips-8.4p1-8.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh8.4-helpers-8.4p1-8.19.1.aarch64",
"product": {
"name": "openssh8.4-helpers-8.4p1-8.19.1.aarch64",
"product_id": "openssh8.4-helpers-8.4p1-8.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh8.4-server-8.4p1-8.19.1.aarch64",
"product": {
"name": "openssh8.4-server-8.4p1-8.19.1.aarch64",
"product_id": "openssh8.4-server-8.4p1-8.19.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh8.4-8.4p1-8.19.1.i586",
"product": {
"name": "openssh8.4-8.4p1-8.19.1.i586",
"product_id": "openssh8.4-8.4p1-8.19.1.i586"
}
},
{
"category": "product_version",
"name": "openssh8.4-cavs-8.4p1-8.19.1.i586",
"product": {
"name": "openssh8.4-cavs-8.4p1-8.19.1.i586",
"product_id": "openssh8.4-cavs-8.4p1-8.19.1.i586"
}
},
{
"category": "product_version",
"name": "openssh8.4-clients-8.4p1-8.19.1.i586",
"product": {
"name": "openssh8.4-clients-8.4p1-8.19.1.i586",
"product_id": "openssh8.4-clients-8.4p1-8.19.1.i586"
}
},
{
"category": "product_version",
"name": "openssh8.4-common-8.4p1-8.19.1.i586",
"product": {
"name": "openssh8.4-common-8.4p1-8.19.1.i586",
"product_id": "openssh8.4-common-8.4p1-8.19.1.i586"
}
},
{
"category": "product_version",
"name": "openssh8.4-fips-8.4p1-8.19.1.i586",
"product": {
"name": "openssh8.4-fips-8.4p1-8.19.1.i586",
"product_id": "openssh8.4-fips-8.4p1-8.19.1.i586"
}
},
{
"category": "product_version",
"name": "openssh8.4-helpers-8.4p1-8.19.1.i586",
"product": {
"name": "openssh8.4-helpers-8.4p1-8.19.1.i586",
"product_id": "openssh8.4-helpers-8.4p1-8.19.1.i586"
}
},
{
"category": "product_version",
"name": "openssh8.4-server-8.4p1-8.19.1.i586",
"product": {
"name": "openssh8.4-server-8.4p1-8.19.1.i586",
"product_id": "openssh8.4-server-8.4p1-8.19.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh8.4-8.4p1-8.19.1.ppc64le",
"product": {
"name": "openssh8.4-8.4p1-8.19.1.ppc64le",
"product_id": "openssh8.4-8.4p1-8.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh8.4-cavs-8.4p1-8.19.1.ppc64le",
"product": {
"name": "openssh8.4-cavs-8.4p1-8.19.1.ppc64le",
"product_id": "openssh8.4-cavs-8.4p1-8.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh8.4-clients-8.4p1-8.19.1.ppc64le",
"product": {
"name": "openssh8.4-clients-8.4p1-8.19.1.ppc64le",
"product_id": "openssh8.4-clients-8.4p1-8.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh8.4-common-8.4p1-8.19.1.ppc64le",
"product": {
"name": "openssh8.4-common-8.4p1-8.19.1.ppc64le",
"product_id": "openssh8.4-common-8.4p1-8.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh8.4-fips-8.4p1-8.19.1.ppc64le",
"product": {
"name": "openssh8.4-fips-8.4p1-8.19.1.ppc64le",
"product_id": "openssh8.4-fips-8.4p1-8.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh8.4-helpers-8.4p1-8.19.1.ppc64le",
"product": {
"name": "openssh8.4-helpers-8.4p1-8.19.1.ppc64le",
"product_id": "openssh8.4-helpers-8.4p1-8.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh8.4-server-8.4p1-8.19.1.ppc64le",
"product": {
"name": "openssh8.4-server-8.4p1-8.19.1.ppc64le",
"product_id": "openssh8.4-server-8.4p1-8.19.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh8.4-8.4p1-8.19.1.s390",
"product": {
"name": "openssh8.4-8.4p1-8.19.1.s390",
"product_id": "openssh8.4-8.4p1-8.19.1.s390"
}
},
{
"category": "product_version",
"name": "openssh8.4-cavs-8.4p1-8.19.1.s390",
"product": {
"name": "openssh8.4-cavs-8.4p1-8.19.1.s390",
"product_id": "openssh8.4-cavs-8.4p1-8.19.1.s390"
}
},
{
"category": "product_version",
"name": "openssh8.4-clients-8.4p1-8.19.1.s390",
"product": {
"name": "openssh8.4-clients-8.4p1-8.19.1.s390",
"product_id": "openssh8.4-clients-8.4p1-8.19.1.s390"
}
},
{
"category": "product_version",
"name": "openssh8.4-common-8.4p1-8.19.1.s390",
"product": {
"name": "openssh8.4-common-8.4p1-8.19.1.s390",
"product_id": "openssh8.4-common-8.4p1-8.19.1.s390"
}
},
{
"category": "product_version",
"name": "openssh8.4-fips-8.4p1-8.19.1.s390",
"product": {
"name": "openssh8.4-fips-8.4p1-8.19.1.s390",
"product_id": "openssh8.4-fips-8.4p1-8.19.1.s390"
}
},
{
"category": "product_version",
"name": "openssh8.4-helpers-8.4p1-8.19.1.s390",
"product": {
"name": "openssh8.4-helpers-8.4p1-8.19.1.s390",
"product_id": "openssh8.4-helpers-8.4p1-8.19.1.s390"
}
},
{
"category": "product_version",
"name": "openssh8.4-server-8.4p1-8.19.1.s390",
"product": {
"name": "openssh8.4-server-8.4p1-8.19.1.s390",
"product_id": "openssh8.4-server-8.4p1-8.19.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh8.4-8.4p1-8.19.1.s390x",
"product": {
"name": "openssh8.4-8.4p1-8.19.1.s390x",
"product_id": "openssh8.4-8.4p1-8.19.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh8.4-cavs-8.4p1-8.19.1.s390x",
"product": {
"name": "openssh8.4-cavs-8.4p1-8.19.1.s390x",
"product_id": "openssh8.4-cavs-8.4p1-8.19.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh8.4-clients-8.4p1-8.19.1.s390x",
"product": {
"name": "openssh8.4-clients-8.4p1-8.19.1.s390x",
"product_id": "openssh8.4-clients-8.4p1-8.19.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh8.4-common-8.4p1-8.19.1.s390x",
"product": {
"name": "openssh8.4-common-8.4p1-8.19.1.s390x",
"product_id": "openssh8.4-common-8.4p1-8.19.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh8.4-fips-8.4p1-8.19.1.s390x",
"product": {
"name": "openssh8.4-fips-8.4p1-8.19.1.s390x",
"product_id": "openssh8.4-fips-8.4p1-8.19.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh8.4-helpers-8.4p1-8.19.1.s390x",
"product": {
"name": "openssh8.4-helpers-8.4p1-8.19.1.s390x",
"product_id": "openssh8.4-helpers-8.4p1-8.19.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh8.4-server-8.4p1-8.19.1.s390x",
"product": {
"name": "openssh8.4-server-8.4p1-8.19.1.s390x",
"product_id": "openssh8.4-server-8.4p1-8.19.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh8.4-8.4p1-8.19.1.x86_64",
"product": {
"name": "openssh8.4-8.4p1-8.19.1.x86_64",
"product_id": "openssh8.4-8.4p1-8.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh8.4-cavs-8.4p1-8.19.1.x86_64",
"product": {
"name": "openssh8.4-cavs-8.4p1-8.19.1.x86_64",
"product_id": "openssh8.4-cavs-8.4p1-8.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh8.4-clients-8.4p1-8.19.1.x86_64",
"product": {
"name": "openssh8.4-clients-8.4p1-8.19.1.x86_64",
"product_id": "openssh8.4-clients-8.4p1-8.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh8.4-common-8.4p1-8.19.1.x86_64",
"product": {
"name": "openssh8.4-common-8.4p1-8.19.1.x86_64",
"product_id": "openssh8.4-common-8.4p1-8.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh8.4-fips-8.4p1-8.19.1.x86_64",
"product": {
"name": "openssh8.4-fips-8.4p1-8.19.1.x86_64",
"product_id": "openssh8.4-fips-8.4p1-8.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh8.4-helpers-8.4p1-8.19.1.x86_64",
"product": {
"name": "openssh8.4-helpers-8.4p1-8.19.1.x86_64",
"product_id": "openssh8.4-helpers-8.4p1-8.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh8.4-server-8.4p1-8.19.1.x86_64",
"product": {
"name": "openssh8.4-server-8.4p1-8.19.1.x86_64",
"product_id": "openssh8.4-server-8.4p1-8.19.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-8.4p1-8.19.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.aarch64"
},
"product_reference": "openssh8.4-8.4p1-8.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-8.4p1-8.19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.ppc64le"
},
"product_reference": "openssh8.4-8.4p1-8.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-8.4p1-8.19.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.s390x"
},
"product_reference": "openssh8.4-8.4p1-8.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-8.4p1-8.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.x86_64"
},
"product_reference": "openssh8.4-8.4p1-8.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-clients-8.4p1-8.19.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.aarch64"
},
"product_reference": "openssh8.4-clients-8.4p1-8.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-clients-8.4p1-8.19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.ppc64le"
},
"product_reference": "openssh8.4-clients-8.4p1-8.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-clients-8.4p1-8.19.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.s390x"
},
"product_reference": "openssh8.4-clients-8.4p1-8.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-clients-8.4p1-8.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.x86_64"
},
"product_reference": "openssh8.4-clients-8.4p1-8.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-common-8.4p1-8.19.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.aarch64"
},
"product_reference": "openssh8.4-common-8.4p1-8.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-common-8.4p1-8.19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.ppc64le"
},
"product_reference": "openssh8.4-common-8.4p1-8.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-common-8.4p1-8.19.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.s390x"
},
"product_reference": "openssh8.4-common-8.4p1-8.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-common-8.4p1-8.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.x86_64"
},
"product_reference": "openssh8.4-common-8.4p1-8.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-fips-8.4p1-8.19.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.aarch64"
},
"product_reference": "openssh8.4-fips-8.4p1-8.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-fips-8.4p1-8.19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.ppc64le"
},
"product_reference": "openssh8.4-fips-8.4p1-8.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-fips-8.4p1-8.19.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.s390x"
},
"product_reference": "openssh8.4-fips-8.4p1-8.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-fips-8.4p1-8.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.x86_64"
},
"product_reference": "openssh8.4-fips-8.4p1-8.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-helpers-8.4p1-8.19.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.aarch64"
},
"product_reference": "openssh8.4-helpers-8.4p1-8.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-helpers-8.4p1-8.19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.ppc64le"
},
"product_reference": "openssh8.4-helpers-8.4p1-8.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-helpers-8.4p1-8.19.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.s390x"
},
"product_reference": "openssh8.4-helpers-8.4p1-8.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-helpers-8.4p1-8.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.x86_64"
},
"product_reference": "openssh8.4-helpers-8.4p1-8.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-server-8.4p1-8.19.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.aarch64"
},
"product_reference": "openssh8.4-server-8.4p1-8.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-server-8.4p1-8.19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.ppc64le"
},
"product_reference": "openssh8.4-server-8.4p1-8.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-server-8.4p1-8.19.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.s390x"
},
"product_reference": "openssh8.4-server-8.4p1-8.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-server-8.4p1-8.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.x86_64"
},
"product_reference": "openssh8.4-server-8.4p1-8.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-8.4p1-8.19.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-8.4p1-8.19.1.x86_64"
},
"product_reference": "openssh8.4-8.4p1-8.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-clients-8.4p1-8.19.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-clients-8.4p1-8.19.1.x86_64"
},
"product_reference": "openssh8.4-clients-8.4p1-8.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-common-8.4p1-8.19.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-common-8.4p1-8.19.1.x86_64"
},
"product_reference": "openssh8.4-common-8.4p1-8.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-fips-8.4p1-8.19.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-fips-8.4p1-8.19.1.x86_64"
},
"product_reference": "openssh8.4-fips-8.4p1-8.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-helpers-8.4p1-8.19.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-helpers-8.4p1-8.19.1.x86_64"
},
"product_reference": "openssh8.4-helpers-8.4p1-8.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh8.4-server-8.4p1-8.19.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-server-8.4p1-8.19.1.x86_64"
},
"product_reference": "openssh8.4-server-8.4p1-8.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61984",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61984"
}
],
"notes": [
{
"category": "general",
"text": "ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-clients-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-common-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-fips-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-helpers-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-server-8.4p1-8.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61984",
"url": "https://www.suse.com/security/cve/CVE-2025-61984"
},
{
"category": "external",
"summary": "SUSE Bug 1251198 for CVE-2025-61984",
"url": "https://bugzilla.suse.com/1251198"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-clients-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-common-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-fips-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-helpers-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-server-8.4p1-8.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-clients-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-common-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-fips-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-helpers-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-server-8.4p1-8.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-14T08:22:50Z",
"details": "moderate"
}
],
"title": "CVE-2025-61984"
},
{
"cve": "CVE-2025-61985",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61985"
}
],
"notes": [
{
"category": "general",
"text": "ssh in OpenSSH before 10.1 allows the \u0027\\0\u0027 character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-clients-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-common-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-fips-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-helpers-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-server-8.4p1-8.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61985",
"url": "https://www.suse.com/security/cve/CVE-2025-61985"
},
{
"category": "external",
"summary": "SUSE Bug 1251199 for CVE-2025-61985",
"url": "https://bugzilla.suse.com/1251199"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-clients-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-common-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-fips-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-helpers-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-server-8.4p1-8.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-clients-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-common-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-fips-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-helpers-8.4p1-8.19.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-server-8.4p1-8.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-14T08:22:50Z",
"details": "moderate"
}
],
"title": "CVE-2025-61985"
}
]
}
SUSE-SU-2025:21044-1
Vulnerability from csaf_suse - Published: 2025-11-14 09:46 - Updated: 2025-11-14 09:46Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssh",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssh fixes the following issues:\n\n- CVE-2025-61984: Fixed code execution via control characters in usernames when a ProxyCommand is used (bsc#1251198). \n- CVE-2025-61985: Fixed code execution via \u0027\\0\u0027 character in ssh:// URI when a ProxyCommand is used (bsc#1251199).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-521",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_21044-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:21044-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202521044-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:21044-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023391.html"
},
{
"category": "self",
"summary": "SUSE Bug 1251198",
"url": "https://bugzilla.suse.com/1251198"
},
{
"category": "self",
"summary": "SUSE Bug 1251199",
"url": "https://bugzilla.suse.com/1251199"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61984 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61984/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61985 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61985/"
}
],
"title": "Security update for openssh",
"tracking": {
"current_release_date": "2025-11-14T09:46:19Z",
"generator": {
"date": "2025-11-14T09:46:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:21044-1",
"initial_release_date": "2025-11-14T09:46:19Z",
"revision_history": [
{
"date": "2025-11-14T09:46:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openssh-9.6p1-4.1.aarch64",
"product": {
"name": "openssh-9.6p1-4.1.aarch64",
"product_id": "openssh-9.6p1-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-clients-9.6p1-4.1.aarch64",
"product": {
"name": "openssh-clients-9.6p1-4.1.aarch64",
"product_id": "openssh-clients-9.6p1-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-common-9.6p1-4.1.aarch64",
"product": {
"name": "openssh-common-9.6p1-4.1.aarch64",
"product_id": "openssh-common-9.6p1-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-fips-9.6p1-4.1.aarch64",
"product": {
"name": "openssh-fips-9.6p1-4.1.aarch64",
"product_id": "openssh-fips-9.6p1-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-server-9.6p1-4.1.aarch64",
"product": {
"name": "openssh-server-9.6p1-4.1.aarch64",
"product_id": "openssh-server-9.6p1-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-server-config-rootlogin-9.6p1-4.1.aarch64",
"product": {
"name": "openssh-server-config-rootlogin-9.6p1-4.1.aarch64",
"product_id": "openssh-server-config-rootlogin-9.6p1-4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-9.6p1-4.1.s390x",
"product": {
"name": "openssh-9.6p1-4.1.s390x",
"product_id": "openssh-9.6p1-4.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-clients-9.6p1-4.1.s390x",
"product": {
"name": "openssh-clients-9.6p1-4.1.s390x",
"product_id": "openssh-clients-9.6p1-4.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-common-9.6p1-4.1.s390x",
"product": {
"name": "openssh-common-9.6p1-4.1.s390x",
"product_id": "openssh-common-9.6p1-4.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-fips-9.6p1-4.1.s390x",
"product": {
"name": "openssh-fips-9.6p1-4.1.s390x",
"product_id": "openssh-fips-9.6p1-4.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-server-9.6p1-4.1.s390x",
"product": {
"name": "openssh-server-9.6p1-4.1.s390x",
"product_id": "openssh-server-9.6p1-4.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-server-config-rootlogin-9.6p1-4.1.s390x",
"product": {
"name": "openssh-server-config-rootlogin-9.6p1-4.1.s390x",
"product_id": "openssh-server-config-rootlogin-9.6p1-4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-9.6p1-4.1.x86_64",
"product": {
"name": "openssh-9.6p1-4.1.x86_64",
"product_id": "openssh-9.6p1-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-clients-9.6p1-4.1.x86_64",
"product": {
"name": "openssh-clients-9.6p1-4.1.x86_64",
"product_id": "openssh-clients-9.6p1-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-common-9.6p1-4.1.x86_64",
"product": {
"name": "openssh-common-9.6p1-4.1.x86_64",
"product_id": "openssh-common-9.6p1-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-fips-9.6p1-4.1.x86_64",
"product": {
"name": "openssh-fips-9.6p1-4.1.x86_64",
"product_id": "openssh-fips-9.6p1-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-server-9.6p1-4.1.x86_64",
"product": {
"name": "openssh-server-9.6p1-4.1.x86_64",
"product_id": "openssh-server-9.6p1-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-server-config-rootlogin-9.6p1-4.1.x86_64",
"product": {
"name": "openssh-server-config-rootlogin-9.6p1-4.1.x86_64",
"product_id": "openssh-server-config-rootlogin-9.6p1-4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-9.6p1-4.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:openssh-9.6p1-4.1.aarch64"
},
"product_reference": "openssh-9.6p1-4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-9.6p1-4.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:openssh-9.6p1-4.1.s390x"
},
"product_reference": "openssh-9.6p1-4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-9.6p1-4.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:openssh-9.6p1-4.1.x86_64"
},
"product_reference": "openssh-9.6p1-4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-9.6p1-4.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:openssh-clients-9.6p1-4.1.aarch64"
},
"product_reference": "openssh-clients-9.6p1-4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-9.6p1-4.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:openssh-clients-9.6p1-4.1.s390x"
},
"product_reference": "openssh-clients-9.6p1-4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-9.6p1-4.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:openssh-clients-9.6p1-4.1.x86_64"
},
"product_reference": "openssh-clients-9.6p1-4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-9.6p1-4.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:openssh-common-9.6p1-4.1.aarch64"
},
"product_reference": "openssh-common-9.6p1-4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-9.6p1-4.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:openssh-common-9.6p1-4.1.s390x"
},
"product_reference": "openssh-common-9.6p1-4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-9.6p1-4.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:openssh-common-9.6p1-4.1.x86_64"
},
"product_reference": "openssh-common-9.6p1-4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-9.6p1-4.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:openssh-fips-9.6p1-4.1.aarch64"
},
"product_reference": "openssh-fips-9.6p1-4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-9.6p1-4.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:openssh-fips-9.6p1-4.1.s390x"
},
"product_reference": "openssh-fips-9.6p1-4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-9.6p1-4.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:openssh-fips-9.6p1-4.1.x86_64"
},
"product_reference": "openssh-fips-9.6p1-4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-9.6p1-4.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:openssh-server-9.6p1-4.1.aarch64"
},
"product_reference": "openssh-server-9.6p1-4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-9.6p1-4.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:openssh-server-9.6p1-4.1.s390x"
},
"product_reference": "openssh-server-9.6p1-4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-9.6p1-4.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:openssh-server-9.6p1-4.1.x86_64"
},
"product_reference": "openssh-server-9.6p1-4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-rootlogin-9.6p1-4.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-4.1.aarch64"
},
"product_reference": "openssh-server-config-rootlogin-9.6p1-4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-rootlogin-9.6p1-4.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-4.1.s390x"
},
"product_reference": "openssh-server-config-rootlogin-9.6p1-4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-rootlogin-9.6p1-4.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-4.1.x86_64"
},
"product_reference": "openssh-server-config-rootlogin-9.6p1-4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61984",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61984"
}
],
"notes": [
{
"category": "general",
"text": "ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:openssh-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-clients-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-clients-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-clients-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-common-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-common-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-common-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-fips-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-fips-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-fips-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-server-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-server-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-server-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61984",
"url": "https://www.suse.com/security/cve/CVE-2025-61984"
},
{
"category": "external",
"summary": "SUSE Bug 1251198 for CVE-2025-61984",
"url": "https://bugzilla.suse.com/1251198"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:openssh-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-clients-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-clients-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-clients-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-common-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-common-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-common-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-fips-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-fips-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-fips-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-server-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-server-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-server-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:openssh-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-clients-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-clients-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-clients-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-common-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-common-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-common-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-fips-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-fips-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-fips-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-server-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-server-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-server-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-14T09:46:19Z",
"details": "moderate"
}
],
"title": "CVE-2025-61984"
},
{
"cve": "CVE-2025-61985",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61985"
}
],
"notes": [
{
"category": "general",
"text": "ssh in OpenSSH before 10.1 allows the \u0027\\0\u0027 character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:openssh-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-clients-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-clients-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-clients-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-common-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-common-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-common-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-fips-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-fips-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-fips-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-server-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-server-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-server-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61985",
"url": "https://www.suse.com/security/cve/CVE-2025-61985"
},
{
"category": "external",
"summary": "SUSE Bug 1251199 for CVE-2025-61985",
"url": "https://bugzilla.suse.com/1251199"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:openssh-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-clients-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-clients-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-clients-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-common-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-common-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-common-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-fips-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-fips-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-fips-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-server-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-server-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-server-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:openssh-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-clients-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-clients-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-clients-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-common-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-common-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-common-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-fips-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-fips-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-fips-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-server-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-server-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-server-9.6p1-4.1.x86_64",
"SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-4.1.aarch64",
"SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-4.1.s390x",
"SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-14T09:46:19Z",
"details": "moderate"
}
],
"title": "CVE-2025-61985"
}
]
}
SUSE-SU-2025:4112-1
Vulnerability from csaf_suse - Published: 2025-11-15 22:38 - Updated: 2025-11-15 22:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssh",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssh fixes the following issues:\n\n- CVE-2025-61984: Fixed code execution via control characters in usernames when a ProxyCommand is used (bsc#1251198)\n- CVE-2025-61985: Fixed code execution via \u0027\\0\u0027 character in ssh:// URI when a ProxyCommand is used (bsc#1251199)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4112,SUSE-SLE-Micro-5.3-2025-4112,SUSE-SLE-Micro-5.4-2025-4112,SUSE-SLE-Micro-5.5-2025-4112,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4112,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4112,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4112,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4112,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4112,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4112,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4112,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4112,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4112,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4112,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4112,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4112,SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4112,SUSE-SUSE-MicroOS-5.2-2025-4112,SUSE-Storage-7.1-2025-4112",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4112-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4112-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254112-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4112-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023293.html"
},
{
"category": "self",
"summary": "SUSE Bug 1251198",
"url": "https://bugzilla.suse.com/1251198"
},
{
"category": "self",
"summary": "SUSE Bug 1251199",
"url": "https://bugzilla.suse.com/1251199"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61984 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61984/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61985 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61985/"
}
],
"title": "Security update for openssh",
"tracking": {
"current_release_date": "2025-11-15T22:38:42Z",
"generator": {
"date": "2025-11-15T22:38:42Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4112-1",
"initial_release_date": "2025-11-15T22:38:42Z",
"revision_history": [
{
"date": "2025-11-15T22:38:42Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openssh-8.4p1-150300.3.57.1.aarch64",
"product": {
"name": "openssh-8.4p1-150300.3.57.1.aarch64",
"product_id": "openssh-8.4p1-150300.3.57.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"product": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"product_id": "openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-cavs-8.4p1-150300.3.57.1.aarch64",
"product": {
"name": "openssh-cavs-8.4p1-150300.3.57.1.aarch64",
"product_id": "openssh-cavs-8.4p1-150300.3.57.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-clients-8.4p1-150300.3.57.1.aarch64",
"product": {
"name": "openssh-clients-8.4p1-150300.3.57.1.aarch64",
"product_id": "openssh-clients-8.4p1-150300.3.57.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-common-8.4p1-150300.3.57.1.aarch64",
"product": {
"name": "openssh-common-8.4p1-150300.3.57.1.aarch64",
"product_id": "openssh-common-8.4p1-150300.3.57.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-fips-8.4p1-150300.3.57.1.aarch64",
"product": {
"name": "openssh-fips-8.4p1-150300.3.57.1.aarch64",
"product_id": "openssh-fips-8.4p1-150300.3.57.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"product": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"product_id": "openssh-helpers-8.4p1-150300.3.57.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-server-8.4p1-150300.3.57.1.aarch64",
"product": {
"name": "openssh-server-8.4p1-150300.3.57.1.aarch64",
"product_id": "openssh-server-8.4p1-150300.3.57.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-8.4p1-150300.3.57.1.i586",
"product": {
"name": "openssh-8.4p1-150300.3.57.1.i586",
"product_id": "openssh-8.4p1-150300.3.57.1.i586"
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.i586",
"product": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.i586",
"product_id": "openssh-askpass-gnome-8.4p1-150300.3.57.1.i586"
}
},
{
"category": "product_version",
"name": "openssh-cavs-8.4p1-150300.3.57.1.i586",
"product": {
"name": "openssh-cavs-8.4p1-150300.3.57.1.i586",
"product_id": "openssh-cavs-8.4p1-150300.3.57.1.i586"
}
},
{
"category": "product_version",
"name": "openssh-clients-8.4p1-150300.3.57.1.i586",
"product": {
"name": "openssh-clients-8.4p1-150300.3.57.1.i586",
"product_id": "openssh-clients-8.4p1-150300.3.57.1.i586"
}
},
{
"category": "product_version",
"name": "openssh-common-8.4p1-150300.3.57.1.i586",
"product": {
"name": "openssh-common-8.4p1-150300.3.57.1.i586",
"product_id": "openssh-common-8.4p1-150300.3.57.1.i586"
}
},
{
"category": "product_version",
"name": "openssh-fips-8.4p1-150300.3.57.1.i586",
"product": {
"name": "openssh-fips-8.4p1-150300.3.57.1.i586",
"product_id": "openssh-fips-8.4p1-150300.3.57.1.i586"
}
},
{
"category": "product_version",
"name": "openssh-helpers-8.4p1-150300.3.57.1.i586",
"product": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.i586",
"product_id": "openssh-helpers-8.4p1-150300.3.57.1.i586"
}
},
{
"category": "product_version",
"name": "openssh-server-8.4p1-150300.3.57.1.i586",
"product": {
"name": "openssh-server-8.4p1-150300.3.57.1.i586",
"product_id": "openssh-server-8.4p1-150300.3.57.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-8.4p1-150300.3.57.1.ppc64le",
"product": {
"name": "openssh-8.4p1-150300.3.57.1.ppc64le",
"product_id": "openssh-8.4p1-150300.3.57.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"product": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"product_id": "openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-cavs-8.4p1-150300.3.57.1.ppc64le",
"product": {
"name": "openssh-cavs-8.4p1-150300.3.57.1.ppc64le",
"product_id": "openssh-cavs-8.4p1-150300.3.57.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"product": {
"name": "openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"product_id": "openssh-clients-8.4p1-150300.3.57.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-common-8.4p1-150300.3.57.1.ppc64le",
"product": {
"name": "openssh-common-8.4p1-150300.3.57.1.ppc64le",
"product_id": "openssh-common-8.4p1-150300.3.57.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"product": {
"name": "openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"product_id": "openssh-fips-8.4p1-150300.3.57.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"product": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"product_id": "openssh-helpers-8.4p1-150300.3.57.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-server-8.4p1-150300.3.57.1.ppc64le",
"product": {
"name": "openssh-server-8.4p1-150300.3.57.1.ppc64le",
"product_id": "openssh-server-8.4p1-150300.3.57.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-8.4p1-150300.3.57.1.s390x",
"product": {
"name": "openssh-8.4p1-150300.3.57.1.s390x",
"product_id": "openssh-8.4p1-150300.3.57.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x",
"product": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x",
"product_id": "openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-cavs-8.4p1-150300.3.57.1.s390x",
"product": {
"name": "openssh-cavs-8.4p1-150300.3.57.1.s390x",
"product_id": "openssh-cavs-8.4p1-150300.3.57.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-clients-8.4p1-150300.3.57.1.s390x",
"product": {
"name": "openssh-clients-8.4p1-150300.3.57.1.s390x",
"product_id": "openssh-clients-8.4p1-150300.3.57.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-common-8.4p1-150300.3.57.1.s390x",
"product": {
"name": "openssh-common-8.4p1-150300.3.57.1.s390x",
"product_id": "openssh-common-8.4p1-150300.3.57.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-fips-8.4p1-150300.3.57.1.s390x",
"product": {
"name": "openssh-fips-8.4p1-150300.3.57.1.s390x",
"product_id": "openssh-fips-8.4p1-150300.3.57.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-helpers-8.4p1-150300.3.57.1.s390x",
"product": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.s390x",
"product_id": "openssh-helpers-8.4p1-150300.3.57.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-server-8.4p1-150300.3.57.1.s390x",
"product": {
"name": "openssh-server-8.4p1-150300.3.57.1.s390x",
"product_id": "openssh-server-8.4p1-150300.3.57.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-8.4p1-150300.3.57.1.x86_64",
"product": {
"name": "openssh-8.4p1-150300.3.57.1.x86_64",
"product_id": "openssh-8.4p1-150300.3.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"product": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"product_id": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-cavs-8.4p1-150300.3.57.1.x86_64",
"product": {
"name": "openssh-cavs-8.4p1-150300.3.57.1.x86_64",
"product_id": "openssh-cavs-8.4p1-150300.3.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-clients-8.4p1-150300.3.57.1.x86_64",
"product": {
"name": "openssh-clients-8.4p1-150300.3.57.1.x86_64",
"product_id": "openssh-clients-8.4p1-150300.3.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-common-8.4p1-150300.3.57.1.x86_64",
"product": {
"name": "openssh-common-8.4p1-150300.3.57.1.x86_64",
"product_id": "openssh-common-8.4p1-150300.3.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-fips-8.4p1-150300.3.57.1.x86_64",
"product": {
"name": "openssh-fips-8.4p1-150300.3.57.1.x86_64",
"product_id": "openssh-fips-8.4p1-150300.3.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"product": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"product_id": "openssh-helpers-8.4p1-150300.3.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-server-8.4p1-150300.3.57.1.x86_64",
"product": {
"name": "openssh-server-8.4p1-150300.3.57.1.x86_64",
"product_id": "openssh-server-8.4p1-150300.3.57.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy LTS 4.3",
"product": {
"name": "SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy-lts:4.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server LTS 4.3",
"product": {
"name": "SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server-lts:4.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-clients-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-clients-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-common-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-common-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-fips-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-fips-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-server-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-server-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-clients-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-clients-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-common-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-common-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-fips-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-fips-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-server-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-server-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-clients-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-clients-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-common-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-common-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-fips-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-fips-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-helpers-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-helpers-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-server-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-server-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-clients-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-clients-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-common-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-common-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-fips-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-fips-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-helpers-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-helpers-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-server-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-server-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-clients-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-clients-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-common-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-common-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-fips-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-fips-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-helpers-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-helpers-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-server-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-server-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:openssh-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:openssh-common-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:openssh-server-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.ppc64le as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:openssh-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.s390x as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:openssh-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:openssh-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.ppc64le as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.s390x as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.ppc64le as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:openssh-common-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.s390x as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:openssh-common-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:openssh-common-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.ppc64le as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.s390x as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.ppc64le as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.s390x as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.ppc64le as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:openssh-server-8.4p1-150300.3.57.1.ppc64le"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.s390x as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:openssh-server-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:openssh-server-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.57.1.s390x"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:openssh-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-8.4p1-150300.3.57.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:openssh-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:openssh-clients-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-8.4p1-150300.3.57.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:openssh-clients-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-clients-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:openssh-common-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-8.4p1-150300.3.57.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:openssh-common-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-common-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:openssh-fips-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-8.4p1-150300.3.57.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:openssh-fips-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-fips-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:openssh-helpers-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-8.4p1-150300.3.57.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:openssh-helpers-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:openssh-server-8.4p1-150300.3.57.1.aarch64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-8.4p1-150300.3.57.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:openssh-server-8.4p1-150300.3.57.1.x86_64"
},
"product_reference": "openssh-server-8.4p1-150300.3.57.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61984",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61984"
}
],
"notes": [
{
"category": "general",
"text": "ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-server-8.4p1-150300.3.57.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61984",
"url": "https://www.suse.com/security/cve/CVE-2025-61984"
},
{
"category": "external",
"summary": "SUSE Bug 1251198 for CVE-2025-61984",
"url": "https://bugzilla.suse.com/1251198"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-server-8.4p1-150300.3.57.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-server-8.4p1-150300.3.57.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-15T22:38:42Z",
"details": "moderate"
}
],
"title": "CVE-2025-61984"
},
{
"cve": "CVE-2025-61985",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61985"
}
],
"notes": [
{
"category": "general",
"text": "ssh in OpenSSH before 10.1 allows the \u0027\\0\u0027 character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-server-8.4p1-150300.3.57.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61985",
"url": "https://www.suse.com/security/cve/CVE-2025-61985"
},
{
"category": "external",
"summary": "SUSE Bug 1251199 for CVE-2025-61985",
"url": "https://bugzilla.suse.com/1251199"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-server-8.4p1-150300.3.57.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Enterprise Storage 7.1:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Enterprise Storage 7.1:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-askpass-gnome-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-askpass-gnome-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Proxy LTS 4.3:openssh-server-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-clients-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-common-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-common-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-common-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-fips-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-helpers-8.4p1-150300.3.57.1.x86_64",
"SUSE Manager Server LTS 4.3:openssh-server-8.4p1-150300.3.57.1.ppc64le",
"SUSE Manager Server LTS 4.3:openssh-server-8.4p1-150300.3.57.1.s390x",
"SUSE Manager Server LTS 4.3:openssh-server-8.4p1-150300.3.57.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-15T22:38:42Z",
"details": "moderate"
}
],
"title": "CVE-2025-61985"
}
]
}
SUSE-SU-2025:21128-1
Vulnerability from csaf_suse - Published: 2025-11-28 07:46 - Updated: 2025-11-28 07:46Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssh",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssh fixes the following issues:\n\n - CVE-2025-61984: code execution via control characters in usernames when a ProxyCommand is used (bsc#1251198).\n - CVE-2025-61985: code execution via \u0027\\0\u0027 character in ssh:// URI when a ProxyCommand is used (bsc#1251199).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SL-Micro-6.2-81",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_21128-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:21128-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202521128-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:21128-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023496.html"
},
{
"category": "self",
"summary": "SUSE Bug 1251198",
"url": "https://bugzilla.suse.com/1251198"
},
{
"category": "self",
"summary": "SUSE Bug 1251199",
"url": "https://bugzilla.suse.com/1251199"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61984 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61984/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61985 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61985/"
}
],
"title": "Security update for openssh",
"tracking": {
"current_release_date": "2025-11-28T07:46:20Z",
"generator": {
"date": "2025-11-28T07:46:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:21128-1",
"initial_release_date": "2025-11-28T07:46:20Z",
"revision_history": [
{
"date": "2025-11-28T07:46:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openssh-10.0p2-160000.3.1.aarch64",
"product": {
"name": "openssh-10.0p2-160000.3.1.aarch64",
"product_id": "openssh-10.0p2-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-clients-10.0p2-160000.3.1.aarch64",
"product": {
"name": "openssh-clients-10.0p2-160000.3.1.aarch64",
"product_id": "openssh-clients-10.0p2-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-common-10.0p2-160000.3.1.aarch64",
"product": {
"name": "openssh-common-10.0p2-160000.3.1.aarch64",
"product_id": "openssh-common-10.0p2-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-server-10.0p2-160000.3.1.aarch64",
"product": {
"name": "openssh-server-10.0p2-160000.3.1.aarch64",
"product_id": "openssh-server-10.0p2-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"product": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"product_id": "openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-10.0p2-160000.3.1.ppc64le",
"product": {
"name": "openssh-10.0p2-160000.3.1.ppc64le",
"product_id": "openssh-10.0p2-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-clients-10.0p2-160000.3.1.ppc64le",
"product": {
"name": "openssh-clients-10.0p2-160000.3.1.ppc64le",
"product_id": "openssh-clients-10.0p2-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-common-10.0p2-160000.3.1.ppc64le",
"product": {
"name": "openssh-common-10.0p2-160000.3.1.ppc64le",
"product_id": "openssh-common-10.0p2-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-server-10.0p2-160000.3.1.ppc64le",
"product": {
"name": "openssh-server-10.0p2-160000.3.1.ppc64le",
"product_id": "openssh-server-10.0p2-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"product": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"product_id": "openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-10.0p2-160000.3.1.s390x",
"product": {
"name": "openssh-10.0p2-160000.3.1.s390x",
"product_id": "openssh-10.0p2-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-clients-10.0p2-160000.3.1.s390x",
"product": {
"name": "openssh-clients-10.0p2-160000.3.1.s390x",
"product_id": "openssh-clients-10.0p2-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-common-10.0p2-160000.3.1.s390x",
"product": {
"name": "openssh-common-10.0p2-160000.3.1.s390x",
"product_id": "openssh-common-10.0p2-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-server-10.0p2-160000.3.1.s390x",
"product": {
"name": "openssh-server-10.0p2-160000.3.1.s390x",
"product_id": "openssh-server-10.0p2-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"product": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"product_id": "openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-10.0p2-160000.3.1.x86_64",
"product": {
"name": "openssh-10.0p2-160000.3.1.x86_64",
"product_id": "openssh-10.0p2-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-clients-10.0p2-160000.3.1.x86_64",
"product": {
"name": "openssh-clients-10.0p2-160000.3.1.x86_64",
"product_id": "openssh-clients-10.0p2-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-common-10.0p2-160000.3.1.x86_64",
"product": {
"name": "openssh-common-10.0p2-160000.3.1.x86_64",
"product_id": "openssh-common-10.0p2-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-server-10.0p2-160000.3.1.x86_64",
"product": {
"name": "openssh-server-10.0p2-160000.3.1.x86_64",
"product_id": "openssh-server-10.0p2-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64",
"product": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64",
"product_id": "openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.2",
"product": {
"name": "SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:transactional"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-10.0p2-160000.3.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-10.0p2-160000.3.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-10.0p2-160000.3.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-10.0p2-160000.3.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-10.0p2-160000.3.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-clients-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-10.0p2-160000.3.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-clients-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-10.0p2-160000.3.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-clients-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-10.0p2-160000.3.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-clients-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-10.0p2-160000.3.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-common-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-10.0p2-160000.3.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-common-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-10.0p2-160000.3.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-common-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-10.0p2-160000.3.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-common-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-10.0p2-160000.3.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-server-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-10.0p2-160000.3.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-server-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-10.0p2-160000.3.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-server-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-10.0p2-160000.3.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-server-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61984",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61984"
}
],
"notes": [
{
"category": "general",
"text": "ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.x86_64",
"SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.x86_64",
"SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.x86_64",
"SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.x86_64",
"SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61984",
"url": "https://www.suse.com/security/cve/CVE-2025-61984"
},
{
"category": "external",
"summary": "SUSE Bug 1251198 for CVE-2025-61984",
"url": "https://bugzilla.suse.com/1251198"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.x86_64",
"SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.x86_64",
"SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.x86_64",
"SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.x86_64",
"SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.x86_64",
"SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.x86_64",
"SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.x86_64",
"SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.x86_64",
"SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T07:46:20Z",
"details": "moderate"
}
],
"title": "CVE-2025-61984"
},
{
"cve": "CVE-2025-61985",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61985"
}
],
"notes": [
{
"category": "general",
"text": "ssh in OpenSSH before 10.1 allows the \u0027\\0\u0027 character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.x86_64",
"SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.x86_64",
"SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.x86_64",
"SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.x86_64",
"SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61985",
"url": "https://www.suse.com/security/cve/CVE-2025-61985"
},
{
"category": "external",
"summary": "SUSE Bug 1251199 for CVE-2025-61985",
"url": "https://bugzilla.suse.com/1251199"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.x86_64",
"SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.x86_64",
"SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.x86_64",
"SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.x86_64",
"SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-10.0p2-160000.3.1.x86_64",
"SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-clients-10.0p2-160000.3.1.x86_64",
"SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-common-10.0p2-160000.3.1.x86_64",
"SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-server-10.0p2-160000.3.1.x86_64",
"SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"SUSE Linux Micro 6.2:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T07:46:20Z",
"details": "moderate"
}
],
"title": "CVE-2025-61985"
}
]
}
SUSE-SU-2025:4067-1
Vulnerability from csaf_suse - Published: 2025-11-12 08:03 - Updated: 2025-11-12 08:03Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssh",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssh fixes the following issues:\n\n- CVE-2025-61984: Fixed code execution via control characters in usernames when a ProxyCommand is used (bsc#1251198)\n- CVE-2025-61985: Fixed code execution via \u0027\\0\u0027 character in ssh:// URI when a ProxyCommand is used (bsc#1251199)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4067,SUSE-SLE-Module-Basesystem-15-SP6-2025-4067,SUSE-SLE-Module-Basesystem-15-SP7-2025-4067,SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-4067,SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-4067,openSUSE-SLE-15.6-2025-4067",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4067-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4067-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254067-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4067-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023268.html"
},
{
"category": "self",
"summary": "SUSE Bug 1251198",
"url": "https://bugzilla.suse.com/1251198"
},
{
"category": "self",
"summary": "SUSE Bug 1251199",
"url": "https://bugzilla.suse.com/1251199"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61984 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61984/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61985 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61985/"
}
],
"title": "Security update for openssh",
"tracking": {
"current_release_date": "2025-11-12T08:03:27Z",
"generator": {
"date": "2025-11-12T08:03:27Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4067-1",
"initial_release_date": "2025-11-12T08:03:27Z",
"revision_history": [
{
"date": "2025-11-12T08:03:27Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openssh-9.6p1-150600.6.34.1.aarch64",
"product": {
"name": "openssh-9.6p1-150600.6.34.1.aarch64",
"product_id": "openssh-9.6p1-150600.6.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64",
"product": {
"name": "openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64",
"product_id": "openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-cavs-9.6p1-150600.6.34.1.aarch64",
"product": {
"name": "openssh-cavs-9.6p1-150600.6.34.1.aarch64",
"product_id": "openssh-cavs-9.6p1-150600.6.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-clients-9.6p1-150600.6.34.1.aarch64",
"product": {
"name": "openssh-clients-9.6p1-150600.6.34.1.aarch64",
"product_id": "openssh-clients-9.6p1-150600.6.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-common-9.6p1-150600.6.34.1.aarch64",
"product": {
"name": "openssh-common-9.6p1-150600.6.34.1.aarch64",
"product_id": "openssh-common-9.6p1-150600.6.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-fips-9.6p1-150600.6.34.1.aarch64",
"product": {
"name": "openssh-fips-9.6p1-150600.6.34.1.aarch64",
"product_id": "openssh-fips-9.6p1-150600.6.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-helpers-9.6p1-150600.6.34.1.aarch64",
"product": {
"name": "openssh-helpers-9.6p1-150600.6.34.1.aarch64",
"product_id": "openssh-helpers-9.6p1-150600.6.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-server-9.6p1-150600.6.34.1.aarch64",
"product": {
"name": "openssh-server-9.6p1-150600.6.34.1.aarch64",
"product_id": "openssh-server-9.6p1-150600.6.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64",
"product": {
"name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64",
"product_id": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-9.6p1-150600.6.34.1.i586",
"product": {
"name": "openssh-9.6p1-150600.6.34.1.i586",
"product_id": "openssh-9.6p1-150600.6.34.1.i586"
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-9.6p1-150600.6.34.1.i586",
"product": {
"name": "openssh-askpass-gnome-9.6p1-150600.6.34.1.i586",
"product_id": "openssh-askpass-gnome-9.6p1-150600.6.34.1.i586"
}
},
{
"category": "product_version",
"name": "openssh-cavs-9.6p1-150600.6.34.1.i586",
"product": {
"name": "openssh-cavs-9.6p1-150600.6.34.1.i586",
"product_id": "openssh-cavs-9.6p1-150600.6.34.1.i586"
}
},
{
"category": "product_version",
"name": "openssh-clients-9.6p1-150600.6.34.1.i586",
"product": {
"name": "openssh-clients-9.6p1-150600.6.34.1.i586",
"product_id": "openssh-clients-9.6p1-150600.6.34.1.i586"
}
},
{
"category": "product_version",
"name": "openssh-common-9.6p1-150600.6.34.1.i586",
"product": {
"name": "openssh-common-9.6p1-150600.6.34.1.i586",
"product_id": "openssh-common-9.6p1-150600.6.34.1.i586"
}
},
{
"category": "product_version",
"name": "openssh-fips-9.6p1-150600.6.34.1.i586",
"product": {
"name": "openssh-fips-9.6p1-150600.6.34.1.i586",
"product_id": "openssh-fips-9.6p1-150600.6.34.1.i586"
}
},
{
"category": "product_version",
"name": "openssh-helpers-9.6p1-150600.6.34.1.i586",
"product": {
"name": "openssh-helpers-9.6p1-150600.6.34.1.i586",
"product_id": "openssh-helpers-9.6p1-150600.6.34.1.i586"
}
},
{
"category": "product_version",
"name": "openssh-server-9.6p1-150600.6.34.1.i586",
"product": {
"name": "openssh-server-9.6p1-150600.6.34.1.i586",
"product_id": "openssh-server-9.6p1-150600.6.34.1.i586"
}
},
{
"category": "product_version",
"name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.i586",
"product": {
"name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.i586",
"product_id": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-9.6p1-150600.6.34.1.ppc64le",
"product": {
"name": "openssh-9.6p1-150600.6.34.1.ppc64le",
"product_id": "openssh-9.6p1-150600.6.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le",
"product": {
"name": "openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le",
"product_id": "openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-cavs-9.6p1-150600.6.34.1.ppc64le",
"product": {
"name": "openssh-cavs-9.6p1-150600.6.34.1.ppc64le",
"product_id": "openssh-cavs-9.6p1-150600.6.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-clients-9.6p1-150600.6.34.1.ppc64le",
"product": {
"name": "openssh-clients-9.6p1-150600.6.34.1.ppc64le",
"product_id": "openssh-clients-9.6p1-150600.6.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-common-9.6p1-150600.6.34.1.ppc64le",
"product": {
"name": "openssh-common-9.6p1-150600.6.34.1.ppc64le",
"product_id": "openssh-common-9.6p1-150600.6.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-fips-9.6p1-150600.6.34.1.ppc64le",
"product": {
"name": "openssh-fips-9.6p1-150600.6.34.1.ppc64le",
"product_id": "openssh-fips-9.6p1-150600.6.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-helpers-9.6p1-150600.6.34.1.ppc64le",
"product": {
"name": "openssh-helpers-9.6p1-150600.6.34.1.ppc64le",
"product_id": "openssh-helpers-9.6p1-150600.6.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-server-9.6p1-150600.6.34.1.ppc64le",
"product": {
"name": "openssh-server-9.6p1-150600.6.34.1.ppc64le",
"product_id": "openssh-server-9.6p1-150600.6.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le",
"product": {
"name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le",
"product_id": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-9.6p1-150600.6.34.1.s390x",
"product": {
"name": "openssh-9.6p1-150600.6.34.1.s390x",
"product_id": "openssh-9.6p1-150600.6.34.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x",
"product": {
"name": "openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x",
"product_id": "openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-cavs-9.6p1-150600.6.34.1.s390x",
"product": {
"name": "openssh-cavs-9.6p1-150600.6.34.1.s390x",
"product_id": "openssh-cavs-9.6p1-150600.6.34.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-clients-9.6p1-150600.6.34.1.s390x",
"product": {
"name": "openssh-clients-9.6p1-150600.6.34.1.s390x",
"product_id": "openssh-clients-9.6p1-150600.6.34.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-common-9.6p1-150600.6.34.1.s390x",
"product": {
"name": "openssh-common-9.6p1-150600.6.34.1.s390x",
"product_id": "openssh-common-9.6p1-150600.6.34.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-fips-9.6p1-150600.6.34.1.s390x",
"product": {
"name": "openssh-fips-9.6p1-150600.6.34.1.s390x",
"product_id": "openssh-fips-9.6p1-150600.6.34.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-helpers-9.6p1-150600.6.34.1.s390x",
"product": {
"name": "openssh-helpers-9.6p1-150600.6.34.1.s390x",
"product_id": "openssh-helpers-9.6p1-150600.6.34.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-server-9.6p1-150600.6.34.1.s390x",
"product": {
"name": "openssh-server-9.6p1-150600.6.34.1.s390x",
"product_id": "openssh-server-9.6p1-150600.6.34.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x",
"product": {
"name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x",
"product_id": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-9.6p1-150600.6.34.1.x86_64",
"product": {
"name": "openssh-9.6p1-150600.6.34.1.x86_64",
"product_id": "openssh-9.6p1-150600.6.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64",
"product": {
"name": "openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64",
"product_id": "openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-cavs-9.6p1-150600.6.34.1.x86_64",
"product": {
"name": "openssh-cavs-9.6p1-150600.6.34.1.x86_64",
"product_id": "openssh-cavs-9.6p1-150600.6.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-clients-9.6p1-150600.6.34.1.x86_64",
"product": {
"name": "openssh-clients-9.6p1-150600.6.34.1.x86_64",
"product_id": "openssh-clients-9.6p1-150600.6.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-common-9.6p1-150600.6.34.1.x86_64",
"product": {
"name": "openssh-common-9.6p1-150600.6.34.1.x86_64",
"product_id": "openssh-common-9.6p1-150600.6.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-fips-9.6p1-150600.6.34.1.x86_64",
"product": {
"name": "openssh-fips-9.6p1-150600.6.34.1.x86_64",
"product_id": "openssh-fips-9.6p1-150600.6.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-helpers-9.6p1-150600.6.34.1.x86_64",
"product": {
"name": "openssh-helpers-9.6p1-150600.6.34.1.x86_64",
"product_id": "openssh-helpers-9.6p1-150600.6.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-server-9.6p1-150600.6.34.1.x86_64",
"product": {
"name": "openssh-server-9.6p1-150600.6.34.1.x86_64",
"product_id": "openssh-server-9.6p1-150600.6.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64",
"product": {
"name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64",
"product_id": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-desktop-applications:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-desktop-applications:15:sp7"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-9.6p1-150600.6.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-9.6p1-150600.6.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-9.6p1-150600.6.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-9.6p1-150600.6.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-9.6p1-150600.6.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-clients-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-9.6p1-150600.6.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-clients-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-9.6p1-150600.6.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-clients-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-9.6p1-150600.6.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-clients-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-9.6p1-150600.6.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-common-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-9.6p1-150600.6.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-common-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-9.6p1-150600.6.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-common-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-9.6p1-150600.6.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-common-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-9.6p1-150600.6.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-fips-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-9.6p1-150600.6.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-fips-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-9.6p1-150600.6.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-fips-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-9.6p1-150600.6.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-fips-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-9.6p1-150600.6.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-helpers-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-9.6p1-150600.6.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-helpers-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-9.6p1-150600.6.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-helpers-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-9.6p1-150600.6.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-helpers-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-9.6p1-150600.6.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-server-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-9.6p1-150600.6.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-server-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-9.6p1-150600.6.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-server-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-9.6p1-150600.6.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-server-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-9.6p1-150600.6.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-9.6p1-150600.6.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-9.6p1-150600.6.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-9.6p1-150600.6.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-9.6p1-150600.6.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-clients-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-9.6p1-150600.6.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-clients-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-9.6p1-150600.6.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-clients-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-9.6p1-150600.6.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-clients-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-9.6p1-150600.6.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-common-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-9.6p1-150600.6.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-common-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-9.6p1-150600.6.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-common-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-9.6p1-150600.6.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-common-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-9.6p1-150600.6.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-fips-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-9.6p1-150600.6.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-fips-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-9.6p1-150600.6.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-fips-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-9.6p1-150600.6.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-fips-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-9.6p1-150600.6.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-helpers-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-9.6p1-150600.6.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-helpers-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-9.6p1-150600.6.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-helpers-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-9.6p1-150600.6.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-helpers-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-9.6p1-150600.6.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-server-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-9.6p1-150600.6.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-server-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-9.6p1-150600.6.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-server-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-9.6p1-150600.6.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-server-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-9.6p1-150600.6.34.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-9.6p1-150600.6.34.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-9.6p1-150600.6.34.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-9.6p1-150600.6.34.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-9.6p1-150600.6.34.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-cavs-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-9.6p1-150600.6.34.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-cavs-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-9.6p1-150600.6.34.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-cavs-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-9.6p1-150600.6.34.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-cavs-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-9.6p1-150600.6.34.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-clients-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-9.6p1-150600.6.34.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-clients-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-9.6p1-150600.6.34.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-clients-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-9.6p1-150600.6.34.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-clients-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-9.6p1-150600.6.34.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-common-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-9.6p1-150600.6.34.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-common-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-9.6p1-150600.6.34.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-common-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-9.6p1-150600.6.34.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-common-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-9.6p1-150600.6.34.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-fips-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-9.6p1-150600.6.34.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-fips-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-9.6p1-150600.6.34.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-fips-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-fips-9.6p1-150600.6.34.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-fips-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-9.6p1-150600.6.34.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-helpers-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-9.6p1-150600.6.34.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-helpers-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-9.6p1-150600.6.34.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-helpers-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-9.6p1-150600.6.34.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-helpers-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-9.6p1-150600.6.34.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-server-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-9.6p1-150600.6.34.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-server-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-9.6p1-150600.6.34.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-server-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-9.6p1-150600.6.34.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-server-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64"
},
"product_reference": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le"
},
"product_reference": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x"
},
"product_reference": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64"
},
"product_reference": "openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61984",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61984"
}
],
"notes": [
{
"category": "general",
"text": "ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61984",
"url": "https://www.suse.com/security/cve/CVE-2025-61984"
},
{
"category": "external",
"summary": "SUSE Bug 1251198 for CVE-2025-61984",
"url": "https://bugzilla.suse.com/1251198"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-12T08:03:27Z",
"details": "moderate"
}
],
"title": "CVE-2025-61984"
},
{
"cve": "CVE-2025-61985",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61985"
}
],
"notes": [
{
"category": "general",
"text": "ssh in OpenSSH before 10.1 allows the \u0027\\0\u0027 character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61985",
"url": "https://www.suse.com/security/cve/CVE-2025-61985"
},
{
"category": "external",
"summary": "SUSE Bug 1251199 for CVE-2025-61985",
"url": "https://bugzilla.suse.com/1251199"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-clients-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-common-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-fips-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-helpers-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-clients-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-common-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-fips-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-helpers-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-askpass-gnome-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-cavs-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-clients-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-common-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-fips-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-helpers-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-server-9.6p1-150600.6.34.1.x86_64",
"openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.aarch64",
"openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.ppc64le",
"openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.s390x",
"openSUSE Leap 15.6:openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-12T08:03:27Z",
"details": "moderate"
}
],
"title": "CVE-2025-61985"
}
]
}
SUSE-SU-2025:21161-1
Vulnerability from csaf_suse - Published: 2025-11-28 07:46 - Updated: 2025-11-28 07:46Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssh",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssh fixes the following issues:\n\n - CVE-2025-61984: code execution via control characters in usernames when a ProxyCommand is used (bsc#1251198).\n - CVE-2025-61985: code execution via \u0027\\0\u0027 character in ssh:// URI when a ProxyCommand is used (bsc#1251199).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-81",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_21161-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:21161-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202521161-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:21161-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023505.html"
},
{
"category": "self",
"summary": "SUSE Bug 1251198",
"url": "https://bugzilla.suse.com/1251198"
},
{
"category": "self",
"summary": "SUSE Bug 1251199",
"url": "https://bugzilla.suse.com/1251199"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61984 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61984/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61985 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61985/"
}
],
"title": "Security update for openssh",
"tracking": {
"current_release_date": "2025-11-28T07:46:20Z",
"generator": {
"date": "2025-11-28T07:46:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:21161-1",
"initial_release_date": "2025-11-28T07:46:20Z",
"revision_history": [
{
"date": "2025-11-28T07:46:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openssh-10.0p2-160000.3.1.aarch64",
"product": {
"name": "openssh-10.0p2-160000.3.1.aarch64",
"product_id": "openssh-10.0p2-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"product": {
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"product_id": "openssh-askpass-gnome-10.0p2-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-cavs-10.0p2-160000.3.1.aarch64",
"product": {
"name": "openssh-cavs-10.0p2-160000.3.1.aarch64",
"product_id": "openssh-cavs-10.0p2-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-clients-10.0p2-160000.3.1.aarch64",
"product": {
"name": "openssh-clients-10.0p2-160000.3.1.aarch64",
"product_id": "openssh-clients-10.0p2-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-common-10.0p2-160000.3.1.aarch64",
"product": {
"name": "openssh-common-10.0p2-160000.3.1.aarch64",
"product_id": "openssh-common-10.0p2-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-helpers-10.0p2-160000.3.1.aarch64",
"product": {
"name": "openssh-helpers-10.0p2-160000.3.1.aarch64",
"product_id": "openssh-helpers-10.0p2-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-server-10.0p2-160000.3.1.aarch64",
"product": {
"name": "openssh-server-10.0p2-160000.3.1.aarch64",
"product_id": "openssh-server-10.0p2-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"product": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"product_id": "openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-10.0p2-160000.3.1.ppc64le",
"product": {
"name": "openssh-10.0p2-160000.3.1.ppc64le",
"product_id": "openssh-10.0p2-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"product": {
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"product_id": "openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-cavs-10.0p2-160000.3.1.ppc64le",
"product": {
"name": "openssh-cavs-10.0p2-160000.3.1.ppc64le",
"product_id": "openssh-cavs-10.0p2-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-clients-10.0p2-160000.3.1.ppc64le",
"product": {
"name": "openssh-clients-10.0p2-160000.3.1.ppc64le",
"product_id": "openssh-clients-10.0p2-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-common-10.0p2-160000.3.1.ppc64le",
"product": {
"name": "openssh-common-10.0p2-160000.3.1.ppc64le",
"product_id": "openssh-common-10.0p2-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-helpers-10.0p2-160000.3.1.ppc64le",
"product": {
"name": "openssh-helpers-10.0p2-160000.3.1.ppc64le",
"product_id": "openssh-helpers-10.0p2-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-server-10.0p2-160000.3.1.ppc64le",
"product": {
"name": "openssh-server-10.0p2-160000.3.1.ppc64le",
"product_id": "openssh-server-10.0p2-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"product": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"product_id": "openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-10.0p2-160000.3.1.s390x",
"product": {
"name": "openssh-10.0p2-160000.3.1.s390x",
"product_id": "openssh-10.0p2-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"product": {
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"product_id": "openssh-askpass-gnome-10.0p2-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-cavs-10.0p2-160000.3.1.s390x",
"product": {
"name": "openssh-cavs-10.0p2-160000.3.1.s390x",
"product_id": "openssh-cavs-10.0p2-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-clients-10.0p2-160000.3.1.s390x",
"product": {
"name": "openssh-clients-10.0p2-160000.3.1.s390x",
"product_id": "openssh-clients-10.0p2-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-common-10.0p2-160000.3.1.s390x",
"product": {
"name": "openssh-common-10.0p2-160000.3.1.s390x",
"product_id": "openssh-common-10.0p2-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-helpers-10.0p2-160000.3.1.s390x",
"product": {
"name": "openssh-helpers-10.0p2-160000.3.1.s390x",
"product_id": "openssh-helpers-10.0p2-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-server-10.0p2-160000.3.1.s390x",
"product": {
"name": "openssh-server-10.0p2-160000.3.1.s390x",
"product_id": "openssh-server-10.0p2-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"product": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"product_id": "openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-10.0p2-160000.3.1.x86_64",
"product": {
"name": "openssh-10.0p2-160000.3.1.x86_64",
"product_id": "openssh-10.0p2-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"product": {
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"product_id": "openssh-askpass-gnome-10.0p2-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-cavs-10.0p2-160000.3.1.x86_64",
"product": {
"name": "openssh-cavs-10.0p2-160000.3.1.x86_64",
"product_id": "openssh-cavs-10.0p2-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-clients-10.0p2-160000.3.1.x86_64",
"product": {
"name": "openssh-clients-10.0p2-160000.3.1.x86_64",
"product_id": "openssh-clients-10.0p2-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-common-10.0p2-160000.3.1.x86_64",
"product": {
"name": "openssh-common-10.0p2-160000.3.1.x86_64",
"product_id": "openssh-common-10.0p2-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-helpers-10.0p2-160000.3.1.x86_64",
"product": {
"name": "openssh-helpers-10.0p2-160000.3.1.x86_64",
"product_id": "openssh-helpers-10.0p2-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-server-10.0p2-160000.3.1.x86_64",
"product": {
"name": "openssh-server-10.0p2-160000.3.1.x86_64",
"product_id": "openssh-server-10.0p2-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64",
"product": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64",
"product_id": "openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-10.0p2-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-10.0p2-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-10.0p2-160000.3.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-10.0p2-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-10.0p2-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-cavs-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-10.0p2-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-cavs-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-10.0p2-160000.3.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-cavs-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-10.0p2-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-cavs-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-10.0p2-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-clients-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-10.0p2-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-clients-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-10.0p2-160000.3.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-clients-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-10.0p2-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-clients-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-10.0p2-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-common-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-10.0p2-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-common-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-10.0p2-160000.3.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-common-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-10.0p2-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-common-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-10.0p2-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-helpers-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-10.0p2-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-helpers-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-10.0p2-160000.3.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-helpers-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-10.0p2-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-helpers-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-10.0p2-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-server-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-10.0p2-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-server-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-10.0p2-160000.3.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-server-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-10.0p2-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-server-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-10.0p2-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-10.0p2-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-10.0p2-160000.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-10.0p2-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-10.0p2-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-10.0p2-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-cavs-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-10.0p2-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-cavs-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-10.0p2-160000.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-cavs-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-cavs-10.0p2-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-cavs-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-10.0p2-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-clients-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-10.0p2-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-clients-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-10.0p2-160000.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-clients-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-10.0p2-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-clients-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-10.0p2-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-common-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-10.0p2-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-common-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-10.0p2-160000.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-common-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-common-10.0p2-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-common-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-10.0p2-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-helpers-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-10.0p2-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-helpers-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-10.0p2-160000.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-helpers-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-helpers-10.0p2-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-helpers-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-10.0p2-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-server-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-10.0p2-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-server-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-10.0p2-160000.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-server-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-10.0p2-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-server-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64"
},
"product_reference": "openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le"
},
"product_reference": "openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x"
},
"product_reference": "openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
},
"product_reference": "openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61984",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61984"
}
],
"notes": [
{
"category": "general",
"text": "ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61984",
"url": "https://www.suse.com/security/cve/CVE-2025-61984"
},
{
"category": "external",
"summary": "SUSE Bug 1251198 for CVE-2025-61984",
"url": "https://bugzilla.suse.com/1251198"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T07:46:20Z",
"details": "moderate"
}
],
"title": "CVE-2025-61984"
},
{
"cve": "CVE-2025-61985",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61985"
}
],
"notes": [
{
"category": "general",
"text": "ssh in OpenSSH before 10.1 allows the \u0027\\0\u0027 character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61985",
"url": "https://www.suse.com/security/cve/CVE-2025-61985"
},
{
"category": "external",
"summary": "SUSE Bug 1251199 for CVE-2025-61985",
"url": "https://bugzilla.suse.com/1251199"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-cavs-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-clients-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-common-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-helpers-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-server-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-askpass-gnome-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-cavs-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-clients-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-common-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-helpers-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-10.0p2-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:openssh-server-config-rootlogin-10.0p2-160000.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T07:46:20Z",
"details": "moderate"
}
],
"title": "CVE-2025-61985"
}
]
}
MSRC_CVE-2025-61985
Vulnerability from csaf_microsoft - Published: 2025-10-02 00:00 - Updated: 2025-10-08 01:02Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61985 ssh in OpenSSH before 10.1 allows the \u0027\\0\u0027 character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-61985.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "ssh in OpenSSH before 10.1 allows the \u0027\\0\u0027 character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.",
"tracking": {
"current_release_date": "2025-10-08T01:02:00.000Z",
"generator": {
"date": "2025-10-22T22:49:11.227Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-61985",
"initial_release_date": "2025-10-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-10-08T01:02:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "azl3 openssh 9.8p1-4",
"product": {
"name": "azl3 openssh 9.8p1-4",
"product_id": "2"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 openssh 8.9p1-8",
"product": {
"name": "\u003ccbl2 openssh 8.9p1-8",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 openssh 8.9p1-8",
"product": {
"name": "cbl2 openssh 8.9p1-8",
"product_id": "20199"
}
}
],
"category": "product_name",
"name": "openssh"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 openssh 9.8p1-4 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 openssh 8.9p1-8 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 openssh 8.9p1-8 as a component of CBL Mariner 2.0",
"product_id": "20199-17086"
},
"product_reference": "20199",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61985",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"20199-17086"
],
"known_affected": [
"17084-2",
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61985 ssh in OpenSSH before 10.1 allows the \u0027\\0\u0027 character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-61985.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-08T01:02:00.000Z",
"details": "8.9p1-9:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.6,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"environmentalsScore": 0.0,
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 3.6,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"17084-2",
"17086-1"
]
}
],
"title": "ssh in OpenSSH before 10.1 allows the \u0027\\0\u0027 character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used."
}
]
}
CERTFR-2025-AVI-0899
Vulnerability from certfr_avis - Published: 2025-10-20 - Updated: 2025-10-20
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | cbl2 gdb 11.2-7 | ||
| Microsoft | N/A | cbl2 binutils 2.37-16 | ||
| Microsoft | N/A | cbl2 redis 6.2.20-1 | ||
| Microsoft | N/A | cbl2 redis 6.2.18-3 | ||
| Microsoft | N/A | azl3 python3 3.12.9-4 versions antérieures à 3.12.9-5 | ||
| Microsoft | N/A | cbl2 crash 8.0.1-4 | ||
| Microsoft | N/A | cbl2 binutils 2.37-17 | ||
| Microsoft | N/A | cbl2 pytorch 2.0.0-9 | ||
| Microsoft | N/A | azl3 kernel 6.6.96.2-2 | ||
| Microsoft | N/A | azl3 binutils 2.41-7 | ||
| Microsoft | N/A | cbl2 qt5-qtsvg 5.12.11-6 versions antérieures à 5.12.11-7 | ||
| Microsoft | N/A | cbl2 python3 3.9.19-14 | ||
| Microsoft | N/A | azl3 openssh 9.8p1-4 | ||
| Microsoft | N/A | cbl2 kernel 5.15.186.1-1 | ||
| Microsoft | N/A | cbl2 rubygem-elasticsearch 8.3.0-1 | ||
| Microsoft | N/A | azl3 kernel 6.6.104.2-1 | ||
| Microsoft | N/A | cbl2 python3 3.9.19-15 versions antérieures à 3.9.19-16 | ||
| Microsoft | N/A | cbl2 qemu 6.2.0-24 | ||
| Microsoft | N/A | azl3 qemu 8.2.0-19 | ||
| Microsoft | N/A | cbl2 gdb 11.2-6 | ||
| Microsoft | N/A | cbl2 openssh 8.9p1-8 versions antérieures à 8.9p1-9 | ||
| Microsoft | N/A | azl3 valkey 8.0.4-1 versions antérieures à 8.0.6-1 | ||
| Microsoft | N/A | azl3 rubygem-elasticsearch 8.9.0-1 | ||
| Microsoft | N/A | azl3 pytorch 2.2.2-7 | ||
| Microsoft | N/A | azl3 ruby 3.3.5-5 | ||
| Microsoft | N/A | cbl2 redis 6.2.18-3 versions antérieures à 6.2.20-1 | ||
| Microsoft | N/A | azl3 qtsvg 6.6.1-2 versions antérieures à 6.6.1-3 | ||
| Microsoft | N/A | azl3 valkey 8.0.4-1 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "cbl2 gdb 11.2-7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 binutils 2.37-16",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 redis 6.2.20-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 redis 6.2.18-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 python3 3.12.9-4 versions ant\u00e9rieures \u00e0 3.12.9-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 crash 8.0.1-4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 binutils 2.37-17",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 pytorch 2.0.0-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kernel 6.6.96.2-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 binutils 2.41-7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 qt5-qtsvg 5.12.11-6 versions ant\u00e9rieures \u00e0 5.12.11-7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 python3 3.9.19-14",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 openssh 9.8p1-4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kernel 5.15.186.1-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 rubygem-elasticsearch 8.3.0-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kernel 6.6.104.2-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 python3 3.9.19-15 versions ant\u00e9rieures \u00e0 3.9.19-16",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 qemu 6.2.0-24",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 qemu 8.2.0-19",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 gdb 11.2-6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 openssh 8.9p1-8 versions ant\u00e9rieures \u00e0 8.9p1-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 valkey 8.0.4-1 versions ant\u00e9rieures \u00e0 8.0.6-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 rubygem-elasticsearch 8.9.0-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 pytorch 2.2.2-7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 ruby 3.3.5-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 redis 6.2.18-3 versions ant\u00e9rieures \u00e0 6.2.20-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 qtsvg 6.6.1-2 versions ant\u00e9rieures \u00e0 6.6.1-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 valkey 8.0.4-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-49069",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49069"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-39947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39947"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-11234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11234"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-49844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49844"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-39990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39990"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2025-46819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46819"
},
{
"name": "CVE-2024-53234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53234"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2025-39940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39940"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2025-46817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46817"
},
{
"name": "CVE-2024-39508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39508"
},
{
"name": "CVE-2022-49133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49133"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-39981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39981"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2022-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49124"
},
{
"name": "CVE-2024-53687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53687"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-11495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11495"
},
{
"name": "CVE-2025-39938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39938"
},
{
"name": "CVE-2025-39982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39982"
},
{
"name": "CVE-2025-39965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39965"
},
{
"name": "CVE-2025-39932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39932"
},
{
"name": "CVE-2025-11414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11414"
},
{
"name": "CVE-2025-21629",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21629"
},
{
"name": "CVE-2022-50502",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50502"
},
{
"name": "CVE-2025-39964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39964"
},
{
"name": "CVE-2024-49568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49568"
},
{
"name": "CVE-2024-53196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53196"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2024-46717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46717"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2024-56641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
},
{
"name": "CVE-2025-11413",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11413"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2025-37727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37727"
},
{
"name": "CVE-2025-10729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10729"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2024-53195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53195"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-46818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46818"
},
{
"name": "CVE-2025-11412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11412"
},
{
"name": "CVE-2022-48816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48816"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2020-8130",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8130"
},
{
"name": "CVE-2024-56592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56592"
}
],
"initial_release_date": "2025-10-20T00:00:00",
"last_revision_date": "2025-10-20T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0899",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39967",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39967"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39940",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39940"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-11412",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11412"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39994",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39994"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39947",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39947"
},
{
"published_at": "2025-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-53687",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-53687"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39931",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39931"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39942",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39942"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-55551",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55551"
},
{
"published_at": "2025-10-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-50502",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50502"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-42321",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42321"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-53195",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-53195"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-39508",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39508"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-53234",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-53234"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39981",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39981"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-46818",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-46818"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39998",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39998"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39972",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39972"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39953",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39953"
},
{
"published_at": "2025-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-49133",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49133"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39934",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39934"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39968",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39968"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39932",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39932"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-49844",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49844"
},
{
"published_at": "2025-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-56709",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-56709"
},
{
"published_at": "2025-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39965",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39965"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39985",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39985"
},
{
"published_at": "2025-10-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-11234",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11234"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39970",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39970"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39980",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39980"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39977",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39977"
},
{
"published_at": "2025-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39964",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39964"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39938",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39938"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-11495",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11495"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-56641",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-56641"
},
{
"published_at": "2025-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2020-8130",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-8130"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-8291",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8291"
},
{
"published_at": "2025-10-18",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-21645",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21645"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39982",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39982"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39987",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39987"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-40989",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40989"
},
{
"published_at": "2025-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49568",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49568"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-37727",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37727"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-49069",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49069"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-46817",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-46817"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-46717",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46717"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39961",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39961"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-55552",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55552"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-41079",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41079"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39969",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39969"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-40966",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40966"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61985",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61985"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39949",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39949"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-11414",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11414"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-46819",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-46819"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39945",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39945"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61984",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61984"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-48816",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48816"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39955",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39955"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39937",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39937"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-55554",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55554"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-56592",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-56592"
},
{
"published_at": "2025-10-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-10729",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-10729"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-11413",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11413"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39929",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39929"
},
{
"published_at": "2025-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-49124",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49124"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39946",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39946"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39973",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39973"
},
{
"published_at": "2025-10-18",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-21629",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21629"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-53196",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-53196"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39990",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39990"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39971",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39971"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39957",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39957"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis - Published: 2025-11-06 - Updated: 2025-11-06
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
CERTFR-2025-AVI-0899
Vulnerability from certfr_avis - Published: 2025-10-20 - Updated: 2025-10-20
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | cbl2 gdb 11.2-7 | ||
| Microsoft | N/A | cbl2 binutils 2.37-16 | ||
| Microsoft | N/A | cbl2 redis 6.2.20-1 | ||
| Microsoft | N/A | cbl2 redis 6.2.18-3 | ||
| Microsoft | N/A | azl3 python3 3.12.9-4 versions antérieures à 3.12.9-5 | ||
| Microsoft | N/A | cbl2 crash 8.0.1-4 | ||
| Microsoft | N/A | cbl2 binutils 2.37-17 | ||
| Microsoft | N/A | cbl2 pytorch 2.0.0-9 | ||
| Microsoft | N/A | azl3 kernel 6.6.96.2-2 | ||
| Microsoft | N/A | azl3 binutils 2.41-7 | ||
| Microsoft | N/A | cbl2 qt5-qtsvg 5.12.11-6 versions antérieures à 5.12.11-7 | ||
| Microsoft | N/A | cbl2 python3 3.9.19-14 | ||
| Microsoft | N/A | azl3 openssh 9.8p1-4 | ||
| Microsoft | N/A | cbl2 kernel 5.15.186.1-1 | ||
| Microsoft | N/A | cbl2 rubygem-elasticsearch 8.3.0-1 | ||
| Microsoft | N/A | azl3 kernel 6.6.104.2-1 | ||
| Microsoft | N/A | cbl2 python3 3.9.19-15 versions antérieures à 3.9.19-16 | ||
| Microsoft | N/A | cbl2 qemu 6.2.0-24 | ||
| Microsoft | N/A | azl3 qemu 8.2.0-19 | ||
| Microsoft | N/A | cbl2 gdb 11.2-6 | ||
| Microsoft | N/A | cbl2 openssh 8.9p1-8 versions antérieures à 8.9p1-9 | ||
| Microsoft | N/A | azl3 valkey 8.0.4-1 versions antérieures à 8.0.6-1 | ||
| Microsoft | N/A | azl3 rubygem-elasticsearch 8.9.0-1 | ||
| Microsoft | N/A | azl3 pytorch 2.2.2-7 | ||
| Microsoft | N/A | azl3 ruby 3.3.5-5 | ||
| Microsoft | N/A | cbl2 redis 6.2.18-3 versions antérieures à 6.2.20-1 | ||
| Microsoft | N/A | azl3 qtsvg 6.6.1-2 versions antérieures à 6.6.1-3 | ||
| Microsoft | N/A | azl3 valkey 8.0.4-1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "cbl2 gdb 11.2-7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 binutils 2.37-16",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 redis 6.2.20-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 redis 6.2.18-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 python3 3.12.9-4 versions ant\u00e9rieures \u00e0 3.12.9-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 crash 8.0.1-4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 binutils 2.37-17",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 pytorch 2.0.0-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kernel 6.6.96.2-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 binutils 2.41-7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 qt5-qtsvg 5.12.11-6 versions ant\u00e9rieures \u00e0 5.12.11-7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 python3 3.9.19-14",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 openssh 9.8p1-4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kernel 5.15.186.1-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 rubygem-elasticsearch 8.3.0-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kernel 6.6.104.2-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 python3 3.9.19-15 versions ant\u00e9rieures \u00e0 3.9.19-16",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 qemu 6.2.0-24",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 qemu 8.2.0-19",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 gdb 11.2-6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 openssh 8.9p1-8 versions ant\u00e9rieures \u00e0 8.9p1-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 valkey 8.0.4-1 versions ant\u00e9rieures \u00e0 8.0.6-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 rubygem-elasticsearch 8.9.0-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 pytorch 2.2.2-7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 ruby 3.3.5-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 redis 6.2.18-3 versions ant\u00e9rieures \u00e0 6.2.20-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 qtsvg 6.6.1-2 versions ant\u00e9rieures \u00e0 6.6.1-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 valkey 8.0.4-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-49069",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49069"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-39947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39947"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-11234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11234"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-49844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49844"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-39990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39990"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2025-46819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46819"
},
{
"name": "CVE-2024-53234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53234"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2025-39940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39940"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2025-46817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46817"
},
{
"name": "CVE-2024-39508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39508"
},
{
"name": "CVE-2022-49133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49133"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-39981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39981"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2022-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49124"
},
{
"name": "CVE-2024-53687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53687"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-11495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11495"
},
{
"name": "CVE-2025-39938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39938"
},
{
"name": "CVE-2025-39982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39982"
},
{
"name": "CVE-2025-39965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39965"
},
{
"name": "CVE-2025-39932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39932"
},
{
"name": "CVE-2025-11414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11414"
},
{
"name": "CVE-2025-21629",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21629"
},
{
"name": "CVE-2022-50502",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50502"
},
{
"name": "CVE-2025-39964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39964"
},
{
"name": "CVE-2024-49568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49568"
},
{
"name": "CVE-2024-53196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53196"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2024-46717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46717"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2024-56641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
},
{
"name": "CVE-2025-11413",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11413"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2025-37727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37727"
},
{
"name": "CVE-2025-10729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10729"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2024-53195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53195"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-46818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46818"
},
{
"name": "CVE-2025-11412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11412"
},
{
"name": "CVE-2022-48816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48816"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2020-8130",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8130"
},
{
"name": "CVE-2024-56592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56592"
}
],
"initial_release_date": "2025-10-20T00:00:00",
"last_revision_date": "2025-10-20T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0899",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39967",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39967"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39940",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39940"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-11412",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11412"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39994",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39994"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39947",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39947"
},
{
"published_at": "2025-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-53687",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-53687"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39931",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39931"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39942",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39942"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-55551",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55551"
},
{
"published_at": "2025-10-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-50502",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50502"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-42321",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42321"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-53195",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-53195"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-39508",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39508"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-53234",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-53234"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39981",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39981"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-46818",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-46818"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39998",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39998"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39972",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39972"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39953",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39953"
},
{
"published_at": "2025-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-49133",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49133"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39934",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39934"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39968",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39968"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39932",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39932"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-49844",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49844"
},
{
"published_at": "2025-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-56709",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-56709"
},
{
"published_at": "2025-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39965",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39965"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39985",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39985"
},
{
"published_at": "2025-10-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-11234",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11234"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39970",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39970"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39980",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39980"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39977",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39977"
},
{
"published_at": "2025-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39964",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39964"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39938",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39938"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-11495",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11495"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-56641",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-56641"
},
{
"published_at": "2025-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2020-8130",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-8130"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-8291",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8291"
},
{
"published_at": "2025-10-18",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-21645",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21645"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39982",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39982"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39987",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39987"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-40989",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40989"
},
{
"published_at": "2025-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49568",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49568"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-37727",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37727"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-49069",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49069"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-46817",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-46817"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-46717",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46717"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39961",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39961"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-55552",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55552"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-41079",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41079"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39969",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39969"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-40966",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40966"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61985",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61985"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39949",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39949"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-11414",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11414"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-46819",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-46819"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39945",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39945"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61984",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61984"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-48816",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48816"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39955",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39955"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39937",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39937"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-55554",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55554"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-56592",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-56592"
},
{
"published_at": "2025-10-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-10729",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-10729"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-11413",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11413"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39929",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39929"
},
{
"published_at": "2025-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-49124",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49124"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39946",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39946"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39973",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39973"
},
{
"published_at": "2025-10-18",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-21629",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21629"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-53196",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-53196"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39990",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39990"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39971",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39971"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39957",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39957"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis - Published: 2025-11-06 - Updated: 2025-11-06
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
GHSA-8GMF-R74V-362P
Vulnerability from github – Published: 2025-10-06 21:30 – Updated: 2025-10-06 21:30ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.
{
"affected": [],
"aliases": [
"CVE-2025-61985"
],
"database_specific": {
"cwe_ids": [
"CWE-158"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-10-06T19:15:36Z",
"severity": "LOW"
},
"details": "ssh in OpenSSH before 10.1 allows the \u0027\\0\u0027 character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.",
"id": "GHSA-8gmf-r74v-362p",
"modified": "2025-10-06T21:30:45Z",
"published": "2025-10-06T21:30:45Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61985"
},
{
"type": "WEB",
"url": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2"
},
{
"type": "WEB",
"url": "https://www.openssh.com/releasenotes.html#10.1p1"
},
{
"type": "WEB",
"url": "https://www.openwall.com/lists/oss-security/2025/10/06/1"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2025-2212
Vulnerability from csaf_certbund - Published: 2025-10-06 22:00 - Updated: 2026-01-06 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "niedrig"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "OpenSSH ist eine Open Source Implementierung des Secure Shell Protokolls.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen in OpenSSH ausnutzen, um beliebigen Programmcode auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2212 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2212.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2212 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2212"
},
{
"category": "external",
"summary": "OpenSSH Release Notes vom 2025-10-06",
"url": "https://www.openssh.com/releasenotes.html#10.1p1"
},
{
"category": "external",
"summary": "EU Vulnerability Database vom 2025-10-06",
"url": "https://euvd.enisa.europa.eu/enisa/EUVD-2025-32589"
},
{
"category": "external",
"summary": "EU Vulnerability Database vom 2025-10-06",
"url": "https://euvd.enisa.europa.eu/enisa/EUVD-2025-32590"
},
{
"category": "external",
"summary": "PoC vom 2025-10-06",
"url": "https://dgl.cx/2025/10/bash-a-newline-ssh-proxycommand-cve-2025-61984#_"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4067-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023268.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4098-1 vom 2025-11-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023284.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4097-1 vom 2025-11-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023285.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4112-1 vom 2025-11-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023293.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21044-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023391.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025-20122-1 vom 2025-12-01",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJLTRWC35U722TGNRKELCMRGSX2WKOPT/"
},
{
"category": "external",
"summary": "Meinberg Security Advisory MBGSA-2025.07 vom 2025-12-02",
"url": "https://www.meinberg.de/german/news/meinberg-security-advisory-mbgsa-2025-07-lantime-firmware-v7-10-006.htm"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21161-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023505.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21128-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023496.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23481 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23481"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23479 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23479"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-23479 vom 2025-12-18",
"url": "https://linux.oracle.com/errata/ELSA-2025-23479.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:23481 vom 2025-12-18",
"url": "https://errata.build.resf.org/RLSA-2025:23481"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-23480 vom 2025-12-18",
"url": "https://linux.oracle.com/errata/ELSA-2025-23480.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-23481 vom 2025-12-19",
"url": "https://linux.oracle.com/errata/ELSA-2025-23481.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7256328 vom 2026-01-06",
"url": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory20.asc"
}
],
"source_lang": "en-US",
"title": "OpenSSH: Mehrere Schwachstellen erm\u00f6glichen Codeausf\u00fchrung",
"tracking": {
"current_release_date": "2026-01-06T23:00:00.000+00:00",
"generator": {
"date": "2026-01-07T07:36:49.336+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2212",
"initial_release_date": "2025-10-06T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-10-06T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-16T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-27T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-01T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-12-02T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Meinberg aufgenommen"
},
{
"date": "2025-12-10T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-17T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-12-18T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-01-06T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von IBM aufgenommen"
}
],
"status": "final",
"version": "10"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7.3",
"product": {
"name": "IBM AIX 7.3",
"product_id": "1139691",
"product_identification_helper": {
"cpe": "cpe:/o:ibm:aix:7.3"
}
}
},
{
"category": "product_version",
"name": "7.2",
"product": {
"name": "IBM AIX 7.2",
"product_id": "434967",
"product_identification_helper": {
"cpe": "cpe:/o:ibm:aix:7.2"
}
}
}
],
"category": "product_name",
"name": "AIX"
},
{
"branches": [
{
"category": "product_version",
"name": "3.1",
"product": {
"name": "IBM VIOS 3.1",
"product_id": "1039165",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:vios:3.1"
}
}
},
{
"category": "product_version",
"name": "4.1",
"product": {
"name": "IBM VIOS 4.1",
"product_id": "1522854",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:vios:4.1"
}
}
}
],
"category": "product_name",
"name": "VIOS"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.10.006",
"product": {
"name": "Meinberg LANTIME \u003c7.10.006",
"product_id": "T049022"
}
},
{
"category": "product_version",
"name": "7.10.006",
"product": {
"name": "Meinberg LANTIME 7.10.006",
"product_id": "T049022-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:meinberg:lantime:7.10.006"
}
}
}
],
"category": "product_name",
"name": "LANTIME"
}
],
"category": "vendor",
"name": "Meinberg"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.1",
"product": {
"name": "Open Source OpenSSH \u003c10.1",
"product_id": "T047422"
}
},
{
"category": "product_version",
"name": "10.1",
"product": {
"name": "Open Source OpenSSH 10.1",
"product_id": "T047422-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:openbsd:openssh:10.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.1p1",
"product": {
"name": "Open Source OpenSSH \u003c10.1p1",
"product_id": "T047423"
}
},
{
"category": "product_version",
"name": "10.1p1",
"product": {
"name": "Open Source OpenSSH 10.1p1",
"product_id": "T047423-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:openbsd:openssh:10.1p1"
}
}
}
],
"category": "product_name",
"name": "OpenSSH"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61984",
"product_status": {
"known_affected": [
"1139691",
"T002207",
"T049022",
"67646",
"434967",
"1039165",
"T027843",
"1522854",
"T004914",
"T047423",
"T032255",
"T047422"
]
},
"release_date": "2025-10-06T22:00:00.000+00:00",
"title": "CVE-2025-61984"
},
{
"cve": "CVE-2025-61985",
"product_status": {
"known_affected": [
"1139691",
"T002207",
"T049022",
"67646",
"434967",
"1039165",
"T027843",
"1522854",
"T004914",
"T047423",
"T032255",
"T047422"
]
},
"release_date": "2025-10-06T22:00:00.000+00:00",
"title": "CVE-2025-61985"
}
]
}
FKIE_CVE-2025-61985
Vulnerability from fkie_nvd - Published: 2025-10-06 19:15 - Updated: 2025-10-08 19:38| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ssh in OpenSSH before 10.1 allows the \u0027\\0\u0027 character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used."
}
],
"id": "CVE-2025-61985",
"lastModified": "2025-10-08T19:38:32.610",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.6,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.0,
"impactScore": 2.5,
"source": "cve@mitre.org",
"type": "Secondary"
}
]
},
"published": "2025-10-06T19:15:36.357",
"references": [
{
"source": "cve@mitre.org",
"url": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2"
},
{
"source": "cve@mitre.org",
"url": "https://www.openssh.com/releasenotes.html#10.1p1"
},
{
"source": "cve@mitre.org",
"url": "https://www.openwall.com/lists/oss-security/2025/10/06/1"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-158"
}
],
"source": "cve@mitre.org",
"type": "Secondary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.